Image

This week, research and describe one vulnerability scanner; mention the function

This week, research and describe one vulnerability scanner; mention the functionality of it that you like and think is particularly useful. Try to identify some limitations of the scanner. Additionally, describe the pros/cons of performing credentialed vs non-credentialed scans.