-->

Wednesday, March 21, 2018

A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for known weaknesses. In plain words, these scanners are used to discover the weak points or poorly constructed parts. It's utilized for the identification and detection of vulnerabilities relating to mis-configured assets or flawed software that resides on a network-based asset such as a firewall, router, web server, application server, etc. Modern vulnerability scanners will allow for both authenticated and unauthenticated scans to occur. Modern scanners are typically available as SaaS (Software as a Service) by providers over the internet as a web application and the amount of host information is vast. The modern vulnerability scanner has the capabilities to customize vulnerability reports, installed software, open ports, certificates and much other host information that can be queried by users to increase network security.

  • Authenticated scans allow for the scanner to directly access network based assets using remote administrative protocols such as secure shell (SSH) or remote desktop protocol (RDP) and authenticate using provided system credentials. This allows the vulnerability scanner to access low-level data, such as specific services and configuration details of the host operating system. It’s then able to provide detailed and accurate information about the operating system and installed software, including configuration issues and missing security patches.
  • Unauthenticated scans is a method that can result in a high number of false positives and is unable to provide detailed information about the assets operating system and installed software. This method is typically used by threat actors or security analyst trying determine the security posture of externally accessible assets.

Types




Sparta Scan Network Vulnerability | Kali Linux - Hello I'm back ==================================================================================== WARNING: For Educational Purposes Only! BE AWARE Of This! I'm not responsible how you use...

  • Port scanner (e.g. Nmap)
  • Network vulnerability scanner (e.g. Nessus, Qualys, SAINT, OpenVAS, INFRA Security Scanner, Nexpose)
  • Web application security scanner (e.g. Nikto, Qualys, Sucuri, High-Tech Bridge, Burp Suite, OWASP ZAP, w3af)
  • Database security scanner
  • Host based vulnerability scanner (Lynis)
  • ERP security scanner
  • Single vulnerability tests

See also


Vulnerability Scanner | LIVE HACKING
Vulnerability Scanner | LIVE HACKING. Source : www.livehacking.com

  • Browser security
  • Computer emergency response team
  • Information security
  • Internet security
  • Mobile security

References


GFI LanGuard -Network security scanner & patch management | PNL Tools
GFI LanGuard -Network security scanner & patch management | PNL Tools. Source : www.pnltools.com

External links


Network Security, Network Monitor and Network scanner with ...
Network Security, Network Monitor and Network scanner with .... Source : www.gfi.com

  • Vulnerability Scanning Tools, list at OWASP
  • National Institute of Standards and Technology (NIST) Publication of their Security Content Automation Protocol (SCAP) outline.
  • Modern Vulnerability Scanners Examples.(Qualys, Tenable)



Top Rated Vulnerability Management Software | Rapid7
Top Rated Vulnerability Management Software | Rapid7. Source : www.rapid7.com

 
Sponsored Links