Scanning for vulnerabilities is one of the best understood periodic activities security teams take up on their computers. There are well-documented strategies and best practices for doing regular scanning for vulnerabilities in computers, networks, operating system software, and application software:
- Basic network scansÂ
- Credentials patch audit
- Correlating system information with known vulnerabilities
With networked systems, this type of scanning is usually executed from a connected host that has the right kind of permissions to scan for security issues.Â
One of the most popular vulnerability scanning tools is Nessus. Nessus started as a network vulnerability scanning tool, but now incorporates features such as the following:Â
- Port scanning
- Network vulnerability scanning
- Web application-specific scanning
- Host-based vulnerability...