Get started with Network Vulnerability Assessment
Practical scenarios to max out the tools and features on Pentest-Tools.com when evaluating a network’s security
Depending on what you want to achieve, you can start a network vulnerability assessment in one of the following ways:
Port discovery + Vulnerability scan
Focus only on network and port discovery first and, after analyzing the results, do a vulnerability scan:
- TCP Scanner – ports 1-65535
- UDP Scanner – top 1000 ports
- Based on the results, start the Network Vulnerability Scan with OpenVAS and check for open ports
- SSL/TLS Scanner on HTTPS ports (if needed).
In some cases, when the network has limited bandwidth, the scanners might return false negative or false positive results. If you know a port is opened on a host, we recommend rescanning the host(s).
Extra check - Password Auditor
For applications that require authentication, check if weak credentials are being used by trying the usernames and passwords from the input wordlists. One of the unique advantages of the Password Auditor is that it automatically detects web forms in web applications and it attempts to log in with the given credentials by itself. It has the capability to detect if a web form authentication is successful or not, making your workflow smoother by removing manual checks.