Network Vulnerability Scanning: By:-Prachee Ratnaparkhi Msc-Ii, Roll - No. 17
Network Vulnerability Scanning: By:-Prachee Ratnaparkhi Msc-Ii, Roll - No. 17
Network Vulnerability Scanning: By:-Prachee Ratnaparkhi Msc-Ii, Roll - No. 17
CONTENTS
VULNERABILITY ASSESSMENT
A comprehensive check of the physical weaknesses in computers & networks as well as in work practices and procedures. WHAT IT DOES.??? Identifies potential risks and many exposures Develops strategies for dealing with them To protect your network To learn strengths and weaknesses To protect your commercial information To comply with data security standards.
VULNERABILITY SCANNING
Vulnerability scanning can be used by individuals or network administrators for security purposes, or it can be used by hackers attempting to gain unauthorized access to computer systems. Helps you to secure your own network or it can be used by the bad guys to
TOOLS USED
AVAILABLE VULNERABILTIY SCANNERS: Nessus Nmap Gui Lan Guard
NESSUS: STEP 1.
STEP 2.
STEP 3.
STEP 4.
STEP 5.
STEP 6.
NESSUS reports are still in controversy, and further research on its acceptability is still going on .. Another alternative which an intruder would use in finding out the open ports, is that of NMAP Lets see it
LIVE..!!!!!!
REFERENCES:
1.
2. 3. 4.
http://www.techopedia.com/definition/4160/vulnerability-scanning
http://netsecurity.about.com/cs/hackertools/a/aa030404.htm http://www.saintcorporation.com/solutions/vulnerabilityScan.html Network Security Assessment, Second Edition by Chris McNab
THANK YOU