Scanning for vulnerabilities is one of the best understood periodic activities security teams take up on their computers. There are well-documented strategies and best practices for doing regular scanning for vulnerabilities in computers, networks, operating system software, and application software:
- Basic network scans
- Credentials patch audit
- Correlating system information with known vulnerabilities
With networked systems, this type of scanning is usually executed from a connected host that has the right kind of permissions to scan for security issues.
One of the most popular vulnerability scanning tools is Nessus. Nessus started as a network vulnerability scanning tool, but now incorporates features such as the following:
- Port scanning
- Network vulnerability scanning
- Web application-specific scanning
- Host-based vulnerability...