Vulnerability scanning explained
LevelBlue Completes Acquisition of Cybereason. Learn more
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
LevelBlue Completes Acquisition of Cybereason. Learn more
This blog was written by a third party author
Vulnerability scanning is the process of detecting and classifying potential points of exploitation in network devices, computer systems, and applications. This is done by inspecting the same attack areas used by both internal and external threat actors—such as firewalls, applications, and services that are deployed either internally or externally—to gain unauthorized access to an organization’s network and assets. Scans are compared against a database of known vulnerabilities to see security gaps in networks, systems, and applications to be identified—and fixed—quickly.
Scans are performed by internal IT security teams or managed security service providers (MSSPs), as part of a vulnerability assessment that should be a part of a greater vulnerability management program. In some cases, scans are mandated by compliance regulations and require external providers certified to perform them. A good example is the Payment Card Industry Data Security Standard (PCI DSS), which requires Approved Scanning Vendors (ASV) to perform the external vulnerability scans to provide they align with PCI standards. The reason these various groups regularly perform vulnerability scans is that external and internal threat actors do as well, as part of scoping out their attack strategy.
Vulnerability scans involve looking for either the lack of patching, open ports, or any other conceived method to maliciously gain access. The following list covers the various types of vulnerability scans used today:
Rapidly scan systems and applications to help detect weaknesses caused by technical vulnerabilities or misconfigurations.
Learn moreThe scanning methods mentioned above use one of two authentication approaches to vulnerability scanning: authenticated and unauthenticated. Scans that are performed without the benefit of authentication to the target are called “unauthenticated”. These scans will largely find vulnerabilities that can be used in attacks that do not require user credentials and can succeed without trusted access. Authenticated scans—such as in host scans—require the person performing the test to authenticate as a network user. This method helps to expose any vulnerabilities accessible to a “trusted” user, whether it’s a true employee of the organization or a threat actor who has compromised a set of user credentials.
Vulnerability scans identify those systems, devices, and applications whose current state includes known vulnerabilities. While this identification process can include some level of exploitation, vulnerabilities scans are not equivalent to penetration tests. Rather, most full-scale penetration tests will include a vulnerability scan as a part of the broader procedure. In essence, vulnerability scans seek to identify exploitable conditions and act as the groundwork or early phase of a penetration test, where the tester behaves like a threat actor and attempts to compromise a device, system, service, or application.
LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.