Vulnerability Scanner

Vulnerability scanners are computer programs that explore the target systems for the presence of known security vulnerabilities.

The scanner makes use of databases containing information on various security issues such as

  • Use or presence of unsafe or non- necessary services (Services)
  • Shared or poorly validated shares (shares)
  • Errors in the configuration or use of your password and user policies
  • Open Ports
  • Inadequate patch levels of computer programs and services ( services)

The use Vulnerability Scanner can be done two different ways of working:

  • Without authentication on the target system The target system is examined only through the network ( from the outside) for vulnerabilities. In this procedure, detailed tests such as can Verification of patch levels of the operating system components or operating system -related components are not performed.
  • With authentication on the target system The scanner logs on to the target system with the stored in the scanner to the target system credentials and can thus perform an advanced exam.

Vulnerability Scanner can use it as opposed to port scanners examine not only achievable on the target system services and, if necessary, their versions on vulnerabilities, but also allow a check on actually existing vulnerabilities of the operating system used and the services offered.

In addition to scanners that perform a holistic examination of a target system for vulnerabilities, there are a number of specialized scanners check the detailed aspects. Particularly noteworthy in this context Web application scanners and test methods to applications that use Web -based methods, optimized.

Because of the complexity can be personalized with Vulnerability scanners false positive detections not completely ruled out.