The Penetrator can scan any system, Workstation, Server, Firewall, network embedded device, Linux, Microsoft, Tablets, Smartphones and or OS Operating System that is accessible to the Penetrator on a public or local IP address.
When it scans an IP address it will determine the services and OS type of checks to launch.
So for example if you scan a Linux OS host and it can be determined to be a Linux OS it wont launch Windows Checks.
For more details about the scanning checks please see Schematics datasheet:
https://www.secpoint.com/datasheet/Penetrator-Schematics_web.pdf
Comments
1 comment
Hi
Please sign in to leave a comment.