Vulnerability Scanners
A vulnerability scanner assesses computers, computer systems, networks or applications for weaknesses.
Vulnerability scanners can help to automate security auditing by scanning the network for security risks and producing a prioritized list to address vulnerabilities.
What types of vulnerabilities do scanners look for?
What are some commonly used vulnerability scanners on the market?
Categories of scanners
Network scanners
Probe hosts for open ports, enumerate information about users and groups and look for vulnerabilities on the network.
Application Scanners
Access application source code to test an application from the inside.
Web application scanners
Identify vulnerabilities in web applications
Intrusive scans
Try to exploit vulnerabilities and may even crash the target.
Non-intrusive scan
Will try not to cause any harm to the target.
credentialed scan
usernames and passwords provide authorised access to a system, allowing the system to harvest more information.
Non-credentialed scan
less invasive and give an outsider’s point of view.