Introduction
What?
Finding security issues in the design, implementation, and maintenance of servers, workstations, and network services: misconfigured software, firewalls, and operating systems; outdated software and operating systems; Insecure protocols; unnecessary exposures.
Why?
To identify vulnerabilities that could be exploited by hackers.