Vulnerability Scanning is a process of proactively identifying network , application and security vulnerabilities. The scanning process includes detecting and classifying system weaknesses in networks, communications equipment, and computers. In addition to identifying security holes, the vulnerability scans also predict how effective countermeasures are in case of a threat or attack. A vulnerability scanning service uses piece of software running from the standpoint of the person or organization inspecting the attack surface in question. The vulnerability scanner uses a database to compare details about the target attack surface.
A vulnerability scanner allows early detection and handling of know security problems. A new device or even a new system may be connected to the network without authorization. A vulnerability scanner helps to verify inventory of all devices on the network.
There are different type of vulnerability Identification And Assessment techniques :-
1. Port Scanner:-
A port scanner is an application designed to probe a server or host for open ports . Such an application may be used by administrators to verify security policies of their network and by attackers to identify network services running on a host and exploit vulnerabilities.
A. nmap:-
Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages.
For More Information:-https://nmap.org/
2. Network Vulnerability Scanner:-
Network Vulnerability Scanning is an inspection of the potential point of exploit on a network to identify security holes.
A. Scapy:-
Scapy is a packet manipulation tool for computer networks, originally written in Python by Philippe Biondi. It can forge or decode packets, send them on the wire, capture them, and match requests and replies. It can also handle tasks like scanning, tracerouting, probing, unit tests, attacks, and network discovery. It also performs very well at a lot of other specific tasks that most other tools can’t handle, like sending invalid frames, injecting your own 802.11 frames, combining technics.
For More Information: - https://scapy.net/
B. Nessus:-
Nessus is a remote security scanning tool ,which scans a computer and raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access to any computer you have connected to network . It does this by running over 1200 checks on a given computer testing to see if any of these attacks could be used to break into the computer or otherwise harm it. Nessus is a paid vulnerabilities scanner.
For More Information :- https://www.tenable.com/products/nessus
C.SAINT:-
Security Administrator's Integrated Network Tool is computer software used for scanning computer networks for security vulnerabilities and exploiting found vulnerabilities .SAINT scanner screens every live system on a network for TCP and UDP services. For each service it finds running it launch a set of probes designed to detect anything that could allow attacker to gain unauthorized access create a denial of service or gain sensitive information about the network.
For More Information:-https://en.wikipedia.org/wiki/SAINT_(software)
D. OpenVAS :-
OpenVAS is a software framework of several services and tools offering vulnerability scanning and vulnerability management. All OpenVAS products are free software, and most components are licensed under the GNU General Public License. Plugins for OpenVAS are written in the Nessus Attack Scripting Language, NASL.
For More Information:-https://www.openvas.org/
3.Web Application Security Scanner:-
Web Application Security Scanner are automated tools that scan web application, normally from the outside, to look for security vulnerabilities such as Cross-site scripting, SQL Injection, Command Injection, Path Traversal and insecure server configuration.
A. Nikto :-
Nikto is a free software command-line vulnerability scanner that scans webservers for dangerous files/CGIs, outdated server software and other problems. It performs generic and server type specific checks. It also captures and prints any cookies received.
For More Information:-https://cirt.net/Nikto2
B. w3af:-
w3af is an open-source web application security scanner. The project provides a vulnerability scanner and exploitation tool for Web applications. It provides information about security vulnerabilities for use in penetration testing engagements.
For More Information :- https://w3af.org/
4.Database Security Scanner :-
Database Security in which user have to secure data from hacker there are different tools which we can use for Database Security .
A. Scuba Database Scanner :-
Scuba is free database security software tool from the vendor Imperva that is used for analyzing more than 2,000 common problems such as weak passwords, known configuration risks, and missing patches on a range of database platforms. Scuba is being used across enterprises as a database patch up enhancer.
B. MSSQL Datamask:-
MSSQL Data Mask provides developers the ability to mask data for development, testing, or outsourcing projects, involving the SQL Server databases. MSSQL Data Mask has tools that are categorized for data masking and is used for protecting data that is classified as personally identifiable data, sensitive personal data or commercially sensitive data.
For More Information:-https://download.cnet.com/MSSQL-DataMask/3000-2144_4-75185204.html
5. Host Based Vulnerability Scanner :-
A host based scanner is installed on every host on the system that you want to monitor. Host-based vulnerability assessment tools can provide an insight into the potential damage that can be done by insiders and outsiders once some level of access is granted or taken on a system.
A. Lynis :-
Lynis is a battle-tested security tool for systems running Linux, macOS, or Unix-based operating system. It performs an extensive health scan of your systems to support system hardening and compliance testing. The project is open source software with the GPL license and available since 2007.
For More Information :- https://cisofy.com/lynis/
B. ovaldi :-
The OVAL Interpreter is a freely available reference implementation that demonstrates the evaluation of OVAL Definitions. Based on a set of OVAL Definitions the interpreter collects system information, evaluates it, and generates a detailed OVAL Results file.
For More Information:-https://oval.mitre.org/
6.ERP security scanner :-
ERP system is a computer software that serves to unify the information intended to manage the organization including Production, Supply Chain Management, Financial Management, Human Resource Management, Customer Relationship Management, Enterprise Performance Management.
A. ERPScan :-
ERPScan SAP Pentesting Tool is a freeware intended for pentesters and security professionals. With the help of it you can conduct penetration testing and vulnerability assessment of SAP systems using Black Box testing methodologies. You do not need to have any information or credentials of the target system. All the necessary data will be collected by SAP Pentesting tool.
For More Information :-https://erpscan.io/research/free-pentesting-tools-for-sap-and-oracle/'
No comments:
Post a Comment