• The Importance Of Using A Vulnerability Scanner For Security

    by  • June 1, 2016 • Network Security • 11 Comments

    One aspect of network security that is often overlooked is checking a network for issues using a vulnerability scanner. Vulnerabilities are issues, weaknesses or misconfiguration in software that an attacker can exploit to gain unauthorized access to his victim’s system. Through the use of a vulnerability scanner, these issues are pinpointed and reported to the administrator.

    Perhaps the primary reason why vulnerability scanning is taken for granted is because vulnerabilities are considered to be issues which are fixed through patch management. It is a common misconception that with a patch management strategy, the vulnerabilities found on the network are also being taken care of. This is partially true when considering how a chunk of vulnerabilities are in fact software issues that are fixed by patching, however it is not always the case. Vulnerabilities can be caused by mis-configurations, software that is inherently problematic or even software issues for which the vendor has not yet released a patch.

    What can we do about vulnerabilities?

    The first step is to see if your system does in fact have any vulnerability. For this you need to use a vulnerability scanner or, although not recommended if your budget is limited, you can run a vulnerability scan manually.

    Running a vulnerability scan manually:

    It is possible to do a vulnerability assessment without the use of any software, although this will have an intrinsic amount of inaccuracy and will be very time consuming. In order to determine if there are vulnerabilities on your network through a manual vulnerability scan, you should first get a list of applications / services installed on your network. Once the list is available, check each software’s official site to see if there are any issues / insecurities reported by the vendor. Some vendors will also offer guides on how their application should be configured securely. Generally, such guides will also contain information on what configuration options to avoid. This information is very useful and it is definitely a good idea to read them. The next step is to check vulnerability database sites for the latest lists. Sites like the National Vulnerability Database and Bugtraq are a central location for known vulnerabilities – checking these sites regularly in relation to what software is running on your network is highly important.

    Running a vulnerability scan using a vulnerability scanner:

    A more effective way to do vulnerability scanning is through the use of a vulnerability scanner. These scanners will have a database of vulnerabilities that is automatically updated by the vulnerability scanner vendor whenever a new vulnerability is discovered. An administrator can set up the scanner to automatically scan the network periodically and issue reports when a new vulnerability is detected. It might also offer remediation options or a detailed description of what is causing the vulnerability and what should be done to fix that vulnerability.

    Regardless of whether you run a vulnerability scan manually or using a vulnerability scanner, your network should be monitored for vulnerabilities.  Most vulnerabilities will lead to a system compromise of some degree which in turn can result in serious consequences for the business.  Vulnerability scanning is a preventive measure that can potentially save your business’s reputation and assets.


    This guest post was provided by Emmanuel Carabott on behalf of GFI Software Ltd. GFI is a leading software developer that provides a single source for network administrators to address their network security, content security and messaging needs. More information: GFI vulnerability scanner

    *All product and company names herein may be trademarks of their respective owners.




    Author is a Tech blogger & loves to share his work on web by writing guidelines for Ethical Hacking students & Security professionals. Performing various types of hacking from pen test to smartphone hacking – He enjoys hacking just for personal research purpose. Working with more of 'grey as well as black hat' hackers for learning advanced hacking as well as defending techniques & share them with learners. His prime area of research is Cyber Criminals & currently working on a Video Product Development to teach hacking & Pen Testing for absolute beginners.


    • Good post!

    • hackerz

      Please Read my new post at hungry hackers

    • Rajneesh Singh

      Post contain nice security related information

    • Rajneesh Singh


    • Benabeseaa

      Nice. I can relate because I also hack PSPs.  My site is http://www.psp-hacker.com.

    • Bill Chipman

      interested in purchasing new restaurant chairs or restaurant tables are often
      pleasantly surprised to realize the vast amount of choices available in restaurant furniture. Restaurant furniture is designed in a vast array of themes, styles and
      colors. The variety available can make it a bit daunting for the customer to
      sort through the various options. This article covers many of the categories
      offered in restaurant chairs at Missouri
      Table and Chair and
      some brief information regarding each. For more details visit @ http://www.gotable.com/ 

    • Bestfreelancejob

      is the contract work marketplace where clients post contract jobs and freelance
      programmers, graphic designers, translators, consultants and other
      professionals bid for those jobs.


      For more
      details visit at:  http://www.bestfreelancejob.com/

      Engine Optimization & Freelance Programming

    • S Gabri3l

      Good post. 
      We have SEO Experts at http://seoxl.eu/ 
      We have link wheel and link trundle (new) services,
      Check us out at http://seoxl.eu/

    • Nice Post

    • Thanks Rajneesh, I am glad that you like it!

    • Vrtl33

      good post