Open In App

What is Vulnerability Scanning in Kali Linux?

Last Updated : 10 May, 2020
Improve
Improve
Like Article
Like
Save
Share
Report

To understand, first, it is important to know what is a vulnerability. So, in the field of Cyber Security, the vulnerability can be defined as the weakness of the computer system which can be exploited by attacking the system to perform unauthorized actions and for gaining unauthorized access to a system. The attacker can be do almost anything with the system such as data breaching(stealing sensitive information), installing malware on the system, etc.

Now, let us understand what is Vulnerability Scanning. Vulnerability Scanning is the process of searching for vulnerabilities in a computer system. It is done by a Vulnerability Scanner. A vulnerability scanner is a software designed for testing applications or computers for vulnerabilities. It identifies and creates a directory for each process connected to the system(eg. firewalls, servers, networks, etc). Vulnerabilities are identified from misconfigurations and flawed programming within a given network. The probability of risks in a system is identified by the vulnerabilities present.

Working of Vulnerability Scanning

The vulnerability scanning works on a three-step procedure. They are as follows:

  • Vulnerabilities Identification
  • Analysis of the risk possessed by vulnerabilities found
  • Operations against the identifies Vulnerability

1. Vulnerabilities Identification: Vulnerabilities can be identified by the Vulnerability Scanner. The efficiency of the vulnerability scanner depends on the ability to gather information on the system, identify the open ports, devices, etc.

2. Analysis of the risk possessed by vulnerabilities found: This step is very crucial for the team who are performing the vulnerability scanning. This step decides:

  • The critical impact on the system if the vulnerability is exploited.
  • The Easiness in exploiting the vulnerability
  • Whether the security measures that are already present are sufficient for reducing the risk of vulnerability

3. Operations against the identified Vulnerability: The vulnerabilities identified by the scanner must be patched or fixed so that they can no longer harm the system or can be exploited by the attacker. But, a simple fix is not available for the vulnerability, therefore, we have two choices:

  • The vulnerability can be ignored. This can be done when risk is low.
  • The second option can is the vulnerable system can be ceased, or other security measures can be added so that the vulnerability cannot be exploited.

Types of Scanning

1. External Vulnerability Scanning: This type of scanning is carried out from outside the network of an organization. This scan targets the areas that are connected to the internet or the applications that are needed by external users or customers.

2. Internal Vulnerability Scanning: This type of scan is carried out from inside the organization. Its target is to successfully identify and detect vulnerabilities that can be exploited by an attacker. An attacker can be anyone who wants to gain unauthorized access or can be employees from inside the organization who have access to the sensitive information of the organization.

3. Unauthorized Scanning: This type of scanning searches for vulnerabilities within an organization’s network perimeter.

4. Authorized Scanning: This type of scanning allows the vulnerability scanners to probe inside a network by providing them with privileged credentials to check for weak passwords, misconfigured, or flawed programming of applications, or misconfigured database.

Security Measures

Here, are the security measures that are taken by the cybersecurity team to ensure that malware and vulnerabilities are less likely to be identified by any kind of attack.

1. Breach and Attack Simulation(BAS) Technology: To test network defenses, the BAS technology itself tends to be an attacker. The tools run various scans and attacks to check for the capabilities for the prevention, detection, and efficiency of the defense of the targeted network.

2. Application Security Testing: This type of testing is done to ensure the correct working of the application, to prevent critical data from exposing to external threats, to check the misconfiguration in the application’s code. It is done to check the security of the application, weaknesses, and vulnerabilities. It helps to identify and prevent vulnerabilities exploitation,

Vulnerability Scanners

Listed below are some of the open-source Vulnerability Scanners.

  • OpenVAS
  • Nexpose Community
  • Metasploit Framework
  • Wireshark
  • Aircrack -ng
  • Nikto
  • Retina

Like Article
Suggest improvement
Previous
Next
Share your thoughts in the comments

Similar Reads