Vulnerability Scanning
Vulnerability Scanning
Vulnerability Scanning
LICENSE
CC BY 4.0
15-07-2022 / 20-07-2022
CITATION
DOI
10.36227/techrxiv.20317194.v1
Vulnerability Scanning
First A. Subhangani, Second B. Anita Chaudhary
are widely used today to find flaws. They are very important in
Abstract—The commercial value of web applications has the construction of attack graphs.
significantly increased in recent years. They progressed from simple
information-sharing platforms to more sophisticated business II. VULNERABILITY SCANNER
applications. Web-based apps, unlike most other technologies, are
always accessible from anywhere in the world. This makes them ideal
targets for malevolent cyberattacks. Scanners can identify and mitigate A vulnerability scanner is a computer program that scans
an organization's vulnerabilities. However, without a thorough computers, networks, and applications for known
awareness of a system's weaknesses, it would be difficult to undertake vulnerabilities. To put it another way, these scanners are
effective network defense in order to keep intruders out in the real utilized to find the flaws in a system. They are used to identify
world. As a result, vulnerability scanning is an important part of a
cybersecurity curriculum's success. In this paper, we'll look at the and discover vulnerabilities in network-based assets such as
present state of open-source vulnerability scanning technologies. A firewalls, routers, web servers, application servers, and so on
literature review of vulnerability assessment and reporting, that arise from misconfigurations or defective programming.
vulnerability scanning, vulnerability scanning technologies, security They're usually available as SaaS (Software as a Service),
vulnerabilities, system and application security, and malicious cyber- which means they're supplied as a web application via the
attacks reveals that a lot of work is being done in this area. This
internet. In order to generate a more thorough image of the
research provides an in-depth examination of vulnerability scanning
technologies. In this paper, we covered two important topics: system, most vulnerability scanners will attempt to log in to
vulnerability scanning and reporting. Then, after identifying gaps in computers using default or other credentials. Following the
relevant practices and presenting chosen findings, we emphasize future creation of an inventory, the vulnerability scanner compares
directions and bring this study to a conclusion. The top open-source each item in the inventory to one or more databases of known
network vulnerability scanning tools are described in detail. vulnerabilities to see if any of the objects are vulnerable. A
Keywords—Vulnerability assessment, Vulnerability, Security, systems vulnerability analysis is produced as a result of such a
Threat.
scan, revealing any known vulnerabilities that may require
threat and vulnerability management.
I. INTRODUCTION
F. A. Subhangani is with the Dronacharya College of Engineering S. B. Anita Chaudhary, was with Dronacharya College of Engineering
Gurgaon, Haryana,122001, (corresponding author, phone: 91-9891729455; e- Gurgaon, Haryana,122001, (e-mail: dceanita@ gmail.com)
mail: subhangani726@ gmail.com). .
classification system known as the Common Vulnerability
Scoring System (CVSS). The National Vulnerability Database's
CVSS scores include factors such as attack vector, complexity,
required privileges, user involvement, and the impact of
confidentiality, integrity, and availability.
TABLE 1
RISK LEVEL AND THEIR CVSS RANGE
RISK CVSS
LEVEL RANGE EXAMPLES
Fig.1 Vulnerability Scanning System Diagram
SQL Injection, Remote Code
Execution, and Command
Because security flaws can allow hackers to get access to IT Critical 10 Injections
systems and apps, it's critical for businesses to identify and fix
flaws before they're exploited. Companies can improve the Memory Corruption,
security of their systems by conducting a full vulnerability Distributed/Denial of Service,
High 7-9 Directory Traversal
assessment and implementing a management program.
Vulnerability Assessment and Penetration Testing are two Cryptographic Protocol,
approaches that are used in vulnerability analysis (VAPT). Medium 4-6 Command Injection
Vulnerability evaluations are crucial. Internal Information Disclosure,
A vulnerability assessment gives information on any security Low 1-3 Browsable Web Directory
flaws in an organization's environment. It also instructs on how
Informational 0 Software Version Disclosure
to evaluate the hazards connected with certain flaws. This
method gives the company a greater awareness of its assets,
security issues, and overall risk, lowering the chances of a B. How do vulnerability scanners work?
cybercriminal breaking into its systems and catching the
company off guard. Vulnerability scanning is an examination of a computer's or
network's potential points of exploit in order to find security
A. Types of a vulnerability scanner: weaknesses.
A security scan identifies and analyses system flaws in
Host-Based: Identifies problems with the host or system. The computers, networks, and communications equipment, as well
process is completed by using host-based scanners to identify as predicts how successful countermeasures will be. An
and diagnose vulnerabilities. The host-based tools will install a organization's IT department or a security service provider may
mediator program on the target machine, which will track the conduct a scan, maybe as a condition imposed by some
occurrence and alert the security analyst. authority. Attackers who are looking for points of entry also
Network-Based: It will discover open ports and identify any utilize vulnerability scanning.
unfamiliar services that are using them. It will then reveal any A vulnerability scanner runs from the person assessing the
potential vulnerabilities linked with these services. Network- attack surface in question to the end point of the scanner. Details
based Scanners are used in this process. about the targeted attack surface are compared to a database of
Database-Based: It will use tools and techniques to uncover known security weaknesses in services and ports, packet
security vulnerabilities in database systems and prevent SQL building irregularities, and potential paths to exploitable
Injections. (SQL Injections: - Malicious users inject SQL programs or scripts. Each found vulnerability is attempted to be
statements into a database, allowing them to read sensitive data exploited by the scanner program.
from the database and edit the data in the database.) Running a vulnerability scan has its own set of hazards
Wireless network scans of an organization's Wi-Fi networks because it is inherently intrusive to the running code on the
frequently concentrate on potential sites of attack in the target system. As a result, the scan may result in errors and
infrastructure. A wireless network scan can confirm that a reboots, lowering productivity.
company's network is safely configured in addition to
discovering rogue access points. C. What factors should consider while selecting a
Application scans examine websites for known software vulnerability scanning tool?
flaws and inappropriate network or web application setups.
Vulnerability scanners are software that scans a network's When looking into vulnerability scanners, find out how they
design, reports flaws, and gives recommendations on how to fix rank in terms of accuracy, as well as dependability, scalability,
them. Vulnerability scanners provide information on Common and reporting. If the scanner's accuracy isn't up to par, then have
Vulnerabilities and Exposures (CVE), which is a set of to run two separate scans in the hopes of finding vulnerabilities
standardized names for known vulnerabilities with a risk that the other overlooks. Scanning becomes more expensive and
time-consuming as a result of this. 4) OpenVAS: Greenbone Networks maintains OpenVAS, an
open-source vulnerability scanner. The scanner also features a
Vulnerability Scanners that are based on software include community feed with over 50,000 vulnerability testing that is
configuration auditing, target profiling, penetration testing, and updated on a regular basis. OpenVAS isn't the most user-
extensive vulnerability analysis are common features of these friendly scanner, but it's one of the most capable security
scanning programs. They operate with Microsoft System scanners available for free. It can scan tens of thousands of
Center and other Windows products to enable intelligent patch vulnerabilities and manages false-positive findings.
management, and some even work with mobile device Stages of Vulnerability Assessment
managers. They can scan virtual machines, BYOD mobile 1. Identify the scope of the project
devices, and databases in addition to traditional network - Servers, network devices, printers, IoT, workstations,
devices, servers, and workstations. databases, applications
Continuous, On-Demand Monitoring using Cloud-Based - Get approval, plan for the assessment
Vulnerability Scanners Software as a Service (SaaS) is a newer 2. Information gathering ( ServiceNow, Subnets, etc )
sort of vulnerability scanner that is given on-demand (SaaS). 3. Vulnerability Scanning- Nessus, Nexpose, Qualys, etc
On-demand scanners, like software-based scanners, include 4. Data analysis/ False positive/ Exceptions review
links for downloading vendor fixes and updates for discovered 5. Report Generation
vulnerabilities, which cuts down on remediation time. Scanning
thresholds are also included in these services to prevent devices
from becoming overloaded during the scanning process, which IV. EXPERIMENT WITH NESSUS AND NEXPOSE TOOLS
might cause them to crash.
For this research, I chose Nessus and Nexpose as my tools. I
looked at Nessus and Nexpose because they are both excellent
III. TOP VULNERABILITY SCANNING TOOLS tools for scanning IT infrastructure.
Vulnerability scanners employ a continually updated list of Nessus: Nessus is a remote security scanning application that
databases to find and classify flaws so that their solutions can examines a computer and alerts you if it finds any
be prioritized. Some vulnerability scanners even go so far as to vulnerabilities that malevolent hackers could exploit to obtain
automatically patch the flaw, relieving security professionals access to any computer on your network. It accomplishes this
and developers of the task. by doing over 1200 checks on a specific machine, determining
whether any of these assaults could be used to break into or
1) Nessus: Tenable Nessus runs lightning-fast, in-depth scans harm the computer.
to find vulnerabilities before they are discovered by an attacker. Nessus by Tenable Network Security. It is more than a
The solution takes a risk-based approach to identify and assess scanner; it is an integrated platform that delivers the most
vulnerabilities. As a result, it gives threat levels to each found comprehensive coverage for Vulnerability Management and
vulnerability based on how serious or minor the threat is to the configuration verification, CVE plugins and updates, SCADA
security of your system. With over two million downloads checks with a range of UNIX and Linux, and Regulations
worldwide, Nessus is one of the most popular vulnerability compliance all under the same license.
scanners. Nessus also offers thorough coverage, with over
59,000 CVEs scanned.
A. Who would utilize such a device?
2) Nexpose: Nexpose by Rapid7 captures data in real-time to
provide a continuous view of an organization's changing
network. Because the CVSS risk score scale is 1-10, this If you're the authority of a computer (or a collection of
vulnerability scanner created its own 1-1000 risk score scale to computers) that's linked to the internet, Nessus is an excellent
add more detail. It also determines vulnerability age, tool to use to keep your domains safe from the common
vulnerability proof, vulnerability solution, and public vulnerabilities that hackers and viruses seek.
exploits/malware kits.
3) Nmap: Nmap is a free, open-source security scanner that B. Exactly what Nessus isn't:
is also used by businesses for network discovery, inventory,
service upgrade schedule management, and host or service Nessus isn't a full-fledged security solution; rather, it's an
uptime monitoring. Nmap is popular because of its versatility, important component of a well-rounded security approach.
capacity, portability, and ease of use. Nmap is a versatile tool Nessus is a tool that scans your systems for weaknesses that
since it can map a network with packet filters, firewalls, routers, hackers could use. It does not actively prevent attacks. The
and other barriers. Nmap can be used to scan a network as large system administrator is responsible for patching these
as thousands of computer hosts or as tiny as a single host. Nmap vulnerabilities and creating remediation.
is portable since it runs on Linux, Microsoft Windows, and so
on. Nmap is included in several operating systems, including
BT5 and Kali Linux. C. Factors at work:
- Nessus does not make assumptions about your server setup
which can lead to serious vulnerabilities being missed.
- Nessus is incredibly expandable, with a scripting language
that allows you to develop tests that are specific to your system
once you've gotten to know the tool. It also has a plug-in
interface, and the Nessus plug-in site has a large number of free
plug-ins. These plugs are frequently designed to identify a
specific infection or vulnerability.
- New vulnerabilities and exploits are constantly being
discovered. The Nessus team updates the list of vulnerabilities Fig. 3 Basic Network Scan Page
to look for on a regular basis in order to reduce the time between
when an exploit is discovered in the wild and when you may - Credentials can be configured for a scan as an option. This
detect it with Nessus. permits certified scans to run, which can provide far more
- It's free and open-source. Nessus is free and open-source, detailed information and a more thorough assessment of your
which means you can look at and edit the code as you see fit. environment's vulnerabilities. Alternatively, you can save the
- When Nessus identifies a vulnerability, it will almost scan and run it later, or you can run it now.
always be able to propose the best method to mitigate it.
VIII. REFERENCES