Popis: |
Network scanning and vulnerability testing rely on processes and tools to scan your network and its devices for vulnerabilities. It helps improve an organization’s security policy by identifying vulnerabilities and ensures that the security measures taken actually provide the protection an organization expects and needs. Administrators should perform regular vulnerability scans to find network vulnerabilities that allow exploits to compromise or destroy data or devices. Different network scanning implementations and tools have different capabilities and different types of results. The heterogeneity of these results usually makes subsequent analysis difficult. In this paper, we consider two basic open-source scanners as NMAP. We show how to integrate these two scanners into a well-structured GUI to provide reliable information. Based on the obstacles of NMAP, another tool was developed that combines the strengths of both devices and overcomes some of their shortcomings. A network scanner developed for this paper scans the network to identify active hosts, remote hosts’ operating systems, and programs installed on those hosts. You can find open ports, list services running on a host, and identify active hosts. Further vulnerability scanning is conducted by comparing the information gathered from the network scan to a database of vulnerability signatures to create a group of suspected vulnerabilities that exist on the network. In addition to performing network scans and vulnerability assessments, the new tool also added an automated scanning mechanism to test whether a device has been compromised. This paper examines the capabilities of the new tool. That is, various formats are used to display network maps, vulnerabilities, and configuration errors. Furthermore, a simple methodology is characterized by shortening the output period of weakness. |