Auditing Open Ports with Nessus®
by Mehul Revankar on May 4, 2015
Every major breach starts with a reconnaissance effort, which usually involves a port scan. It’s therefore safe to assume that port scans are the most likely precursor to an attack, and yet results from a port scan are rarely viewed with the same level of urgency as some other high profile vulnerabilities. It’s time to take a different approach and to have a policy-based approach for open ports.
The result from a port scan is just another result buried under a million other results