From: Automating threat modeling using an ontology framework
Source | Method | Data description |
---|---|---|
Windows 2012 Server | Powershell cmdlet | Installed software |
Red Hat Enterprise Linux 7 | yum list | Installed software |
Nessus | Scanning | Vulnerability data, operating system names |
Nexpose | Scanning | Vulnerability data, operating system names |
Nmap | Scanning | Service names, operating system names |
p0f | Passive capture | Data flows, operating system names |
Wireshark | Passive capture | Data flows |