Sie sind auf Seite 1von 14

NETWORK VULNERABILITY SCANNING

By:Prachee Ratnaparkhi MSc-II, Roll.No. 17

CONTENTS

Vulnerability Assessment Vulnerability Scanning Types of Vulnerability Scanning Tools used

VULNERABILITY ASSESSMENT
A comprehensive check of the physical weaknesses in computers & networks as well as in work practices and procedures. WHAT IT DOES.??? Identifies potential risks and many exposures Develops strategies for dealing with them To protect your network To learn strengths and weaknesses To protect your commercial information To comply with data security standards.

VULNERABILITY SCANNING
Vulnerability scanning can be used by individuals or network administrators for security purposes, or it can be used by hackers attempting to gain unauthorized access to computer systems. Helps you to secure your own network or it can be used by the bad guys to

identify weaknesses in your system to mount an attack against.


The idea is for you to use these tools to identify and fix these weaknesses before the bad guys use them against you.

The goal of running a vulnerability scanner is to identify devices on your


network that are open to known vulnerabilities. Different scanners accomplish this goal through different means. Some work better than others.

TYPES OF VULNERABILITY SCANNERS


Port Scanner: Probes a server or host for open ports Network Enumerator: A computer program used to retrieve information about users and groups on networked computers Network Vulnerability Scanner: A system that proactively scans for network vulnerabilities Web Application Security Scanner: A program that communicates with a Web application to find potential vulnerabilities within the application or its architecture Computer Worm: A type of self-replicated computer malware, which can be used to find out vulnerabilities Common Gateway Interface (CGI) Scanner: An automated security program that scans Web servers and application software for vulnerabilities

TOOLS USED
AVAILABLE VULNERABILTIY SCANNERS: Nessus Nmap Gui Lan Guard

COMMERCIAL VULNERABILITY SCANNER packages:


ISS Internet Scanner (http://www.iss.net) eEye Retina (http://www.eeye.com) Qualys Guard (http://www.qualys.com) Matta Colossus (http://www.trustmatta.com) SAINT Scanner (http://www.saintcorporation.com/solutions/vulnerabilityScan.html)

NESSUS: STEP 1.

STEP 2.

STEP 3.

STEP 4.

STEP 5.

STEP 6.

NESSUS reports are still in controversy, and further research on its acceptability is still going on .. Another alternative which an intruder would use in finding out the open ports, is that of NMAP Lets see it

LIVE..!!!!!!

REFERENCES:
1.
2. 3. 4.

http://www.techopedia.com/definition/4160/vulnerability-scanning
http://netsecurity.about.com/cs/hackertools/a/aa030404.htm http://www.saintcorporation.com/solutions/vulnerabilityScan.html Network Security Assessment, Second Edition by Chris McNab

THANK YOU

Das könnte Ihnen auch gefallen