1
3.9kviews
Explain Traffic Probe in Vulnerability Scanning.
1 Answer
| written 3.6 years ago by | • modified 3.6 years ago |
Solution
Services aren’t always so extroverted that they immediately announce themselves. However, lots of them will if you just ask.
For example, a web service will not respond until it receives data from the client. The following command makes a valid HTTP request using the HEAD method:
$ echo -e …