Vulnerability scanning tools
By now, we have discussed different kinds of tools for scanning, including IP address scanning, port scanning, and some enumeration. However, these scans do not provide the operator with what there is beyond identifying a common service or operating system. They do not tell you much, if anything, about the security of what was scanned. This is where the actual vulnerability scanner comes in; these scanners have the code and logic to detect vulnerabilities, weaknesses, and insecurities in the target operating system, network device, software, and applications. These tools use known vulnerabilities, such as what is outlined in the Common Vulnerabilities and Exposures (CVE) database, to inspect target systems to solicit information from them and decide if they are vulnerable.
The most common vulnerability scanning tools include the following:
- Nessus: https://www.tenable.com/products/nessus
- OpenVAS: https://www.openvas.org/
- Nexpose: https...