Should CISO’s consider adding an army of robots to their defenses?
How different are they? The benchmark testing below against Metasploitable 2 (MSF2) tells you all:
- Among the top 15 designed vulnerabilities, RidgeBot™ has the most findings;
- RidgeBot™ is able to exploit 14 vulnerabilities and shows the Proof of Concept result;
- Scanners have less findings and are not able to exploit the vulnerabilities for validation.
![](https://ridgesecurity.ai/wp-content/uploads/Ridgebot-vs-scanners-1-update.png)
Exploit Example 1: RidgeBot™ exploited Samba “username map script” Command Execution vulnerability and successfully gain an access to the web-console
![](https://ridgesecurity.ai/wp-content/uploads/scanners-vs-ridgebot-2.png)
Exploit Example 2: RidgeBot™ exploited PHP CGI Argument Injection vulnerability, and get access to the web-console
![](https://ridgesecurity.ai/wp-content/uploads/scanners-vs-ridgebot-3.png)
Download RidgeBot™ full test report now to learn more.