Vulnerability scanner

From Wikipedia, the free encyclopedia

A vulnerability scanner is a computer program designed to search for and map systems for weaknesses in an application, computer or network. Step 1, typically the scanner will first look for active IP addresses, open ports, OSes and any applications running. Step 2, It may at this point create a report or move to the next step. Step 3, try to determine the patch level of the OS or applications. In this process the scanner can cause an exploit of the vulnerability such as crash the OS or application. Step 4, the final phase the scanner may attempt to exploit the vulnerability. Scanners may either be malicious or friendly. Friendly scanners usually stop at step 2 and occasionally step 3 but never go to step 4.

Contents

[edit] Types of vulnerability scanners

Friendly types of vulnerability scanners:

  • CGI Scanner (usually restricted to banner checking; cgi scanners can find vulnerable scripts but usually don't exploit them)[1]

[edit] Network reconnaissance

Vulnerability Scanners can be used to conduct network reconnaissance, which is typically carried out by a remote attacker attempting to gain information or access to a network on which he is not authorized or allowed. Network reconnaissance is increasingly being used to exploit various network standards and automated communication methods in order to determine what types of computers are present, along with additional information about those computers, such as the type and version of its operating system. This information can be analyzed for known or recently discovered vulnerabilities that can be exploited to gain access to secure networks and computers. Network reconnaissance is possibly one of the most common applications of passive data analysis. Early generation techniques, such as TCP/IP passive fingerprinting, have accuracy issues that tended to make it ineffective. Today, numerous tools exist on the Internet that have been developed to make reconnaissance easier and more effective. [2] [3] [4]

[edit] References

[edit] Programs

[edit] External links