Vulnerability Scans

A vulnerability scan is one a common tactic used by a hacker to gain intelligence about potential targets on a network, whether these be PCs, routers, servers or websites.

A good comprehensive scan of an internal network, followed by some initial investigation and summarised in a report can provide invaluable input for an IT administrator or support provider to help harden your network.

The reporting in and of itself is also useful documentation to keep for compliance purposes, demonstrating as it does that your organisation has taken a proactive approach to security.

Basic External Vulnerability Scan

The most basic scan is performed from outside your network on a regular basis, for example quarterly, to scan for any weaknesses or vulnerabilities that can be seen publicly (via the Internet).

Internal Vulnerability Scan

An internal scan will be conducted on your network, generally using multiple tools with analysis and further probing done by a penetration tester.

This is an excellent way of finding vulnerability that a hacker could exploit, after they have breached the perimeter.

  • Network Wide Scan

    A full scan is performed of your network, probing all network-connected devices to determine OS versions, etc. and scanning ports to determine services.

  • Basic Level Investigation

    Using the results of the initial scan, further investigatory work will be performed to ‘chase down’ potential vulnerabilities, resulting in either verified vulnerabilities or items marked as false positives.

  • External Scans

    Externally facing assets will be scanned, including websites, web applications and publicly visible IP addresses.