Penetration Testing mailing list archives
RE: Vulnerability scanners
From: "Ken Smith" <ksmith () akibia com>
Date: Thu, 27 Mar 2003 18:38:21 -0500
We have run Qualys test on a network using the Intranet scanning appliance, and it did indeed wreak havoc with a terminal server and a RAS server. This is possible with any vulnerability scanning tool, so I would not assume that Qualys is immune. There are so many variables that can cause a device or system to misbehave, which may end up being due to the way the target host was configured. For example, eEye prides themselves on being the safest assessment scanner that will not crash target systems. During our first lab tests we were able to crash a server we were testing. Back to Qualys: The reporting includes baseline and trending functionality that is pretty good. They have put quite an effort into data management. -----Original Message----- From: Chris Sharp [mailto:illectro2001 () yahoo com] Sent: Thursday, March 27, 2003 5:06 PM To: oherrera () prodigy net mx; dan.lynch () placer ca gov; pen-test () securityfocus com Subject: Re: Vulnerability scanners They don't do active tests, so they don't exploit known bugs and crash servers during testing. top spam and e-mail risk at the gateway. SurfControl E-mail Filter puts the brakes on spam & viruses and gives you the reports to prove it. See exactly how much junk never even makes it in the door. Free 30-day trial: http://www.surfcontrol.com/go/zsfptl1
Current thread:
- RE: Vulnerability scanners, (continued)
- RE: Vulnerability scanners Rosado, Rafael (Rafael) (Mar 27)
- RE: Vulnerability scanners Rosado, Rafael (Rafael) (Mar 27)
- Re: Vulnerability scanners Jeff Williams @ Aspect (Mar 27)
- Re: Vulnerability scanners Chris Sharp (Mar 27)
- Re: Vulnerability scanners R. DuFresne (Mar 27)
- Re: Vulnerability scanners Paris Stone (Mar 27)
- RE: Vulnerability scanners Michael Welch (Mar 27)
- RE: Vulnerability scanners Derrick Johnson (Mar 28)
- Re: Vulnerability scanners Roman Medina (Mar 28)
- RE: Vulnerability scanners David Nester (Mar 28)
- RE: Vulnerability scanners Michael Welch (Mar 27)
