Practical scenarios to max out the tools and features on Pentest-Tools.com when evaluating a network’s security
Depending on what you want to achieve, you can start a network vulnerability assessment in one of the following ways:
1. Semi-automated: Port discovery + Vulnerability scan
Focus only on network and port discovery first and, after analyzing the results, do a vulnerability scan:
- TCP Scanner – ports 1-65535
- UDP Scanner – top 1000 ports
- Based on the results, start the Network Vulnerability Scan with OpenVAS and check for open ports
- SSL/TLS Scanner on HTTPS ports (if needed).
2. Fully automated: Port Scan + Vulnerability scan
Try a scan template that runs multiple tools at the same time. Include the following tools in your scan template, with the configuration below:
- TCP Scanner – ports 1-65535
- UDP Scanner – top 1000 ports
- OpenVAS TCP (Full Scan) – ports 1-65535
- OpenVAS UDP (Full Scan) – top 1000
- OpenVAS TCP (Light Scan) – ports 1-65535 (based on Nmap Vulnerability Scan)
In some cases, when the network has limited bandwidth, the scanners might return false negative or false positive results. If you know a port is opened on a host, we recommend rescanning the host(s).
Extra check - Password Auditor
For applications that require authentication, check if weak credentials are being used by trying the usernames and passwords from the input wordlists. One of the unique advantages of the Password Auditor is that it automatically detects web forms in web applications and it attempts to log in with the given credentials by itself. It has the capability to detect if a web form authentication is successful or not, making your workflow smoother by removing manual checks.