Network security scanner-blog

= Vulnerability scanners – SecTools Top Network Security Tools = Comprehensive security audits require detailed inspection of the perimeter of your public-facing network assets. Acunetix has integrated the popular OpenVAS scanner within Acunetix Online to provide a comprehensive perimeter network security scan that integrates seamlessly with your web application security testing, all from an easy to use simple cloud-based service. Scan Perimeter Network Services Insecure perimeter networks are still the cause of most data breaches. The perimeter is therefore one of the most important areas of your network to secure against vulnerabilities, misconfiguration and other security threats that could compromise security or availability of network services. Acunetix Online provides you with a perspective of your network’s perimeter just like an attacker would see it. Use it to: Discover open ports and running services. Test for over 50,000 known network vulnerabilities and misconfigurations.

Scan Perimeter Network Services Insecure perimeter networks are still the cause of most data breaches. The perimeter is therefore one of the most important areas of your network to secure against vulnerabilities, misconfiguration and other security threats that could compromise security or availability of network services. Acunetix Online provides you with a perspective of your network’s perimeter just like an attacker would see it. Use it to: Discover open ports and running services. Test for over 50,000 known network vulnerabilities and misconfigurations.

The quick scan is performed by a custom written security scanner which implements the tests described above. This scan is passive and non-intrusive, generating a maximum of 20 requests to the target application. The full scan is performed by the well known Nikto  Vulnerability Scanner  which can detect specific web vulnerabilities on your target server.Nikto implements multiple techniques for fingerprinting server software and for identifying server side vulnerabilities. It uses a signature database which is periodically updated and each signature contains a specific request that identifies an unique vulnerability. Nikto sends a significant amount of HTTP requests to the target server in order to probe each signature from the database. However, it does not have such power to generate a denial of service effect.

Online Vulnerability Scanners  Trusted testing tools to take you from attack surface discovery to vulnerability identification Trusted Tools Find security holes with trusted open source tools. Get access to tools used by penetration testers and security professionals around the world. Attacker Focused Scan for vulnerabilities from the attackers perspective. Simulating real world security events, testing vulnerabilities and incident response. Know your Network Discover the attack surface with tools and open source intelligence. Protect your network with improved understanding. Experience Over 1 million scans performed last year. Our vulnerability scanners have been testing Internet security since 2007. Find the Problem Fixing security issues requires you find them. Identify the issue, re-mediate the risk and test again to be sure. Performance Fast servers optimized for vulnerability scanning across the Internet. No maintenance or installation required.

Trusted Tools Find security holes with trusted open source tools. Get access to tools used by penetration testers and security professionals around the world. Attacker Focused Scan for vulnerabilities from the attackers perspective. Simulating real world security events, testing vulnerabilities and incident response. Know your Network Discover the attack surface with tools and open source intelligence. Protect your network with improved understanding. Experience Over 1 million scans performed last year. Our vulnerability scanners have been testing Internet security since 2007. Find the Problem Fixing security issues requires you find them. Identify the issue, re-mediate the risk and test again to be sure. Performance Fast servers optimized for vulnerability scanning across the Internet. No maintenance or installation required.

Though you first see just an online tool that appears to just do scanning via the Internet, if you enter a local IP or scan, it will prompt you to download a virtual scanner via a VMware or VirtualBox image. This allows you to do scanning of your local network. Once a scan is complete you can view interactive reports by threat or by patch.