CompTIA® Security+ Exam Notes : Explain Vulnerability Scanning Concepts

1. Threats, Attacks and Vulnerabilities

1.5 Explain vulnerability scanning concepts

There are several tools available for testing network hardening. Some of these are:

1. Nmap: Nmap stands for Network Mapper. It is used for security scanning of a single host to a large network. Nmap is an open-source software, and available free. It can be used to determine what hosts are available on the network, what services (ports) they are offering, what operating system they are running etc.

2. Security Administrator's Tool for Analyzing Networks (SATAN): It recognizes several commonly found networking-related security problems, and reports the problems without actually exploiting them.

3. Security Administrator's Integrated Network Tool (SAINT): It is an enhanced version of SATAN, and used for network security assessment.

4. Nessus: A security scanner that audits remotely a given network and determine whether hackers may break into it, or misuse it in some way.

5. Scanless: Scanless is a command-line utility to interface with websites that can perform port scans as part of a penetration test. When you use this tool, the source IP address for the scan is the website, not your testing machine.

6. theHarvester: theHarvester is a tool like sublist3r which is developed using Python. This tool can be used by penetration testers for gathering information of emails, sub-domains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database.

7. hping:An open-source packet generator and analyzer for the TCP/IP protocol that is used for security auditing and testing of firewalls and networks.

8. Netcat: Netcat is the network utility designed for Linux environments. It has been ported to Windows but is not regularly used in Windows environments. The actual command to invoke netcat is nc - options - address. The netcat utility is the tool of choice in Linux for reading from and writing to network connections using TCP or UDP.

9. Curl:Curl is a tool designed to transfer data to or from a server, without user interaction. Here's a simple example of using curl to simulate a GET request for a website URL: curl https://www.example.com

10. Sn1per: Sn1per is a Linux-based tool used by penetration testers. Sn1per is an automated scanner designed to collect a large amount of information while scanning for vulnerabilities. It runs a series of automated scripts to enumerate servers, open ports, and vulnerabilities.

11. IP scanners: IP scanners scan IP networks and can report on the status of IP addresses. There are a wide range of free and commercial scanning tools, and most come with significantly greater functionality than just reporting on address usage.

Some other network security scanning tools include SAFEsuite, and Tiger Tools TigerSuite. There is no tool by name Trittor.

Port scanner: Port scanner is a device that is used to verify any insecure ports. Spectrum analyzer is used for analyzing the frequency spectrum and not a correct choice. Cookie and backups are not relevant choices.

OVAL (Open Vulnerability and Assessment Language): OVAL is an information security community standard to promote open and publicly available security content, and to standardize the transfer of this information across security tools and services

Previous   Contents   Next


Security+ Cram Notes Contents
certexams ad

simulationexams ad