Network Security Testing Flashcards
Vulnerability Scanners
A vulnerability scanner assesses computers, computer systems, networks or applications for weaknesses.
Vulnerability scanners can help to automate security auditing by scanning the network for security risks and producing a prioritized list to address vulnerabilities.
What types of vulnerabilities do scanners look for?
- Use of default passwords (common passwords)
- Missing patches
- Open ports
- Misconfiguration in operating systems and software
- Active IP addresses, including any unexpected devices connected
What are some commonly used vulnerability scanners on the market?
- Nessus
- Retina
- Core Impact
- GFI LanGuard
Categories of scanners
- Network scanners
- Application scanners
- Web application scanners
Network scanners
Probe hosts for open ports, enumerate information about users and groups and look for vulnerabilities on the network.
Application Scanners
Access application source code to test an application from the inside.
Web application scanners
Identify vulnerabilities in web applications
Intrusive scans
Try to exploit vulnerabilities and may even crash the target.
Non-intrusive scan
Will try not to cause any harm to the target.
credentialed scan
usernames and passwords provide authorised access to a system, allowing the system to harvest more information.
Non-credentialed scan
less invasive and give an outsider’s point of view.