Towards a Taxonomy of Network Security Assessment Techniques

Vulnerability assessment tools are coming into widespread use, but the methods that they use are not well understood. We present a taxonomy of methods for testing if a target is vulnerable to a particular attack.