摘要 |
Disclosed is a method of and apparatus for ascertaining system vulnerabiliti es of shareable devices, such as servers in a network, starting with only a lis t of all assigned addresses used by the system (204). A query is sent consecutively to each address on the list. Those addresses from which a response is not received are filtered from the list and used to generate an "unused" list (210). By checking the response received from the remaining addresses, non shareable devices may be ascertained and likewise filtered fr om the list while being used to generate a "non shareable" list (216). The remaining addresses thus all relate to shareable devices (215) which can the n be efficiently scanned for system vulnerabilities and a report generated as to data revealed when a report is desired.
|