Home page logo

pen-test logo Penetration Testing mailing list archives

RE: Features of a vulnerability scanner
From: "Blake Wiedman [Icons]" <bwiedman () iconsinc com>
Date: Mon, 1 Dec 2003 14:20:53 -0500

My major gripe is reporting, I would love a product that gives me full
extensibility in regards to the output of the report (in MSWord Format)

I would like to also see the possibility of out put being grouped by
vulnerability not by machine.

Level: Low
The following machines have remote RPC enabled:

By machine is good for small scans but becomes cumbersome for large
scans of hosts >=50.

Blake Wiedman
Icons Inc.
Security Technician
(732) 821-9100 x103

-----Original Message-----
From: Marc Ruef [mailto:maru () scip ch] 
Sent: Monday, December 01, 2003 5:27 AM
To: pen-test () securityfocus com
Cc: sectools () securityfocus com
Subject: Features of a vulnerability scanner

WARNING: Unsanitized content follows.
Hash: SHA1

Dear List

I would like to ask you pen-testers two generic questions about
vulnerability scanners:

1. Which features for you are very important or is the most important in
a vulnerability scanner software?
2. Which features are you missing in the existing vulnerability scanner

A vulnerability scanner in this context is a tool that looks automaticly
for potential security holes. There are for example Nessus, ISS Internet
Scanner, Symantec NetRecon, GFI LanGuard, SATAN, SAINT, Vigilante, Dante
Security Scanner, ... Port scanner and enumeration utilities like nmap,
N-Stealth, Whisker or Nikto are here not counted to vulnerability


Marc Ruef

- -- 
) scip AG (
Technoparkstr. 1
8005 Z├╝rich
T +41 1 445 18 18 
F +41 1 445 18 19

maru () scip ch

- - Pragmatisches Projektmanagement -

Version: PGP 8.0
Comment: http://www.scip.ch




  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]