← Back to Cybersecurity

Vulnerability Scanning

12 min read Cybersecurity

1. What is Vulnerability Scanning?

Vulnerability scanning is the automated process of identifying security weaknesses in computer systems, networks, and applications.

Key Objectives:

  • Identify known vulnerabilities
  • Detect misconfigurations
  • Assess patch levels
  • Evaluate security posture

2. Types of Vulnerability Scans

Scan TypeDescriptionUse Case
Network ScanScans network infrastructureRouters, switches, firewalls
Host ScanScans individual systemsServers, workstations
Web Application ScanScans web applicationsWebsites, APIs
Database ScanScans database systemsSQL Server, MySQL, Oracle
Authenticated ScanUses credentials for deeper accessInternal assessments

3. Vulnerability Probe

A vulnerability probe is a targeted test that attempts to exploit specific vulnerabilities to confirm their existence.

Probe vs Scan

  • Scan: Broad, automated detection of potential vulnerabilities
  • Probe: Targeted verification of specific vulnerabilities

4. Popular Vulnerability Scanners

ToolTypeLicense
OpenVASNetwork/HostOpen Source
NessusNetwork/HostCommercial
QualysCloud-basedCommercial
NiktoWeb ApplicationOpen Source
NmapNetwork DiscoveryOpen Source

5. Scanning Process

  1. Planning: Define scope and targets
  2. Discovery: Identify live hosts and services
  3. Enumeration: Gather detailed information
  4. Vulnerability Detection: Identify weaknesses
  5. Analysis: Review and prioritize findings
  6. Reporting: Document results

6. Best Practices

  • Scan regularly (weekly/monthly)
  • Use authenticated scans when possible
  • Keep scanner signatures updated
  • Validate findings to eliminate false positives
  • Prioritize remediation by risk level
  • Document and track vulnerabilities

Key Point:

Vulnerability scanning is a continuous process. Regular scans help identify new vulnerabilities as they emerge.