Introduction

What?

Finding security issues in the design, implementation, and maintenance of servers, workstations, and network services: misconfigured software, firewalls, and operating systems; outdated software and operating systems; Insecure protocols; unnecessary exposures.

Why?

To identify vulnerabilities that could be exploited by hackers.

How?