From the course: CompTIA PenTest (PT0-002) Cert Prep

Unlock this course with a free trial

Join today to access over 23,200 courses taught by industry experts.

Target considerations

Target considerations

- When we start running all of these different vulnerability scans, it's important to consider the various targets. And remember that it's extremely rare that any two targets will be identical. Now, there are the cases where you'll have cloned targets. Sometimes they're synchronized so that they are pretty much the same. But even in that case, the function is likely that one is going to be the primary and another is a secondary. So even if they are cloned, there might be subtle differences. In most cases, however, you'll find that targets are not going to at all be the same. So you've got to consider the different aspects of the different targets. So let's take a look at a few different aspects. First off, we are using virtual machines. That is a practice that is becoming more and more popular both in on-premises data centers as well as cloud-based service providers. So in many cases, you're going to encounter targets that are not physical machines like we used to have in the legacy…

Contents