vulnerability scanner
works on small and large networks
free license, non-commercial use
Steps of a Vulnerability Scan:
Port scanning
determine if target is alive.
identify open ports
Service detection
for every open port, probes are sent and to determine application name and version
Vulnerabilities Database Lookup
for every daemon, the scanner looks for a relevant vulnerability in its database
you can specify which vulnerabilities to look for during configuration
retrieve only OS vulns and not Web App vulns
Probing
this probing confirms the vulnerabilities
false positives are always a possibility