Back to all activities

Check Config Files

Summary

Examine configuration files for vulnerabilities using "hardening", or "common mistake" guides found online.

Walkthrough

    This will depend on the particular software or system you are examining. Use online guides and product documentation to check the security status of exiting configurations.