Back to all activities
Check Config Files
Summary
Examine configuration files for vulnerabilities using "hardening", or "common mistake" guides found online.
Walk Through
This will depend on the particular software or system you are examining. Use online guides and product documentation to check the security status of exiting configurations.