Vulnerability Scanners

by Satyam Singh
Oct. 7, 2017 0 comments INFOSEC Institute Pen Testing & Audits

Vulnerability scanning refers to the scanning of systems, network component or application which may expose to the external world or hosted internally to detect the vulnerabilities or security weakness in them. Vulnerability scanners are the tool used to perform the vulnerability scanning. Vulnerability scanners have a database of vulnerabilities based on which it performs the check on the remote host. The vulnerability database contains all the information required (service, port, packet type, a potential path to exploit, etc.) to check the security issue. They can scan the network and websites against thousands of vulnerabilities, provide the list of issues based on the risk and suggest the remediation as well. Vulnerability scanners can be used by: The security auditors while doing the security assessment. Malicious attacker or hackers with the intention to harm the asset or to gain unauthorized access. Application development team before deploying the application in...

http://resources.infosecinstitute.com/vulnerability-scanners-2/