A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Types of Vulnerability

Database Security Scanner
Database Security Scanner

Omega DB Scanner - Standalone and FREE Edition - is a security auditing tool and vulnerability assessment scanner for Oracle databases. It features an out-of-box, software-only security and compliance solution that addresses the above requirement.

image: imperva.com
Host Based Vulnerability Scanner (Lynis)
Host Based Vulnerability Scanner (Lynis)

Open source vulnerability scanner for Linux. There are several open source vulnerability scanners for Linux, like OpenVAS. While tools like these are powerful as well, we will have a look at Lynis, our auditing tool to detect vulnerabilities of Linux and Unix systems.

Network Vulnerability Scanner (e
Network Vulnerability Scanner (e

Vulnerability scanning is an inspection of the potential points of exploit on a computer or network to identify security holes. A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures.

image: avxhm.se
Port Scanner (eg Nmap)
Port Scanner (eg Nmap)

TCP Port Scan with Nmap allows you to discover which TCP ports are open on your target host. Network ports are the entry points to a machine that is connected to the Internet. A service that listens on a port is able to receive data from a client application, process it and send a response back.

Web Application Security Scanner (e
Web Application Security Scanner (e

A web application security scanner is a program which communicates with a web application through the web front-end in order to identify potential security vulnerabilities in the web application and architectural weaknesses. It performs a black-box test.