Penetration Testing — Vulnerability Scanning Explanation

Can Özkan
2 min readFeb 11, 2024

--

Vulnerability scanning is a proactive security technique used to identify and assess weaknesses, security flaws, misconfigurations, design flaws, and potential entry points in computer systems, networks, and applications. Vulnerability scanning aims to discover and address vulnerabilities before malicious actors can exploit them.

Objective

Vulnerability scanning primarily aims to identify, explore, and then quantify potential security risks within an organization’s IT and OT infrastructure. It helps security teams identify security risks associated with their assets and prioritize remediation efforts based on the company’s security policy, strengthening their overall security posture.

Types of Vulnerabilities Covered

Vulnerability scanning covers a broad range of vulnerabilities, including but not limited to:

  • Missing security patches
  • Misconfigurations
  • Weak or default passwords
  • Open ports and services (They are not necessarily vulnerabilities)
  • Outdated software versions
  • Known software vulnerabilities
  • Web-based vulnerabilities

Active vs Passive Scanning

Vulnerability scanning can be active or passive. Active scanning involves actively probing and interacting with systems to identify vulnerabilities, while passive scanning observes and analyzes network traffic for potential vulnerabilities without actively engaging with the systems.

Scanning Tools

Vulnerability scanning is often performed using automated tools such as Nessus (which will be a blog post itself), OpenVAS, Qualys, and others. These tools use a database of known vulnerabilities to assess the security configuration of systems and networks.

Host and Network-based Scanning

Vulnerability scanning can be performed at both the network and host levels. Network scanning assesses the security of devices and hosts on a network, while host-based scanning focuses on vulnerabilities specific to individual systems and endpoints.

Credential-based Scanning

Credential-based scanning involves providing the scanning tool with valid credentials (e.g., usernames and passwords) to assess the security of systems from an insider’s perspective. The tool first logs in to the system being evaluated and performs its security checks. This type of scanning provides more accurate and comprehensive results. On the other hand, in the scan where we do not use credentials, the results are less comprehensive.

Conclusion

To sum up, vulnerability scanning is a crucial component of a comprehensive cybersecurity strategy, providing organizations with insights into their security weaknesses and helping them take proactive measures to protect against potential threats. Regular scanning and timely remediation efforts contribute to building a robust and resilient security posture.

Thanks for reading.

Can Özkan

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Can Özkan
Can Özkan

Written by Can Özkan

Security Researcher, Penetration Tester, and Reverse Engineer

No responses yet

Write a response