Please explain in deep, how vulnerabilities are detected in Systems/Networks?
Pavi your question is too broad. Vulnerabilities are tested and identified in numerous ways and based off the type of vulnerability. Some can be detected via port scanning, some require authentication and parsing registry hives for specific keys, some are based on version of software installed etc. etc.
I recommend reviewing these resources, which will give you a solid grounding on how Qualys Suite performs vulnerability assessments on systems and networks:
Thanks a lot for your response. Need to know on what basis and how vulnerabilities are detected?
Hello Red Beard,
Thanks for your detailed info.
Retrieving data ...