You can help expand this article with text translated from the corresponding article in French. (June 2020) Click [show] for important translation instructions.
View a machine-translated version of the French article.
Machine translation, like DeepL or Google Translate, is a useful starting point for translations, but translators must revise errors as necessary and confirm that the translation is accurate, rather than simply copy-pasting machine-translated text into the English Wikipedia.
Consider adding a topic to this template: there are already 6,092 articles in the main category, and specifying|topic= will aid in categorization.
Do not translate text that appears unreliable or low-quality. If possible, verify the text with references provided in the foreign-language article.
You must provide copyright attribution in the edit summary accompanying your translation by providing an interlanguage link to the source of your translation. A model attribution edit summary is Content in this edit is translated from the existing French Wikipedia article at [[:fr:Scanner de vulnérabilité]]; see its history for attribution.
You should also add the template {{Translated|fr|Scanner de vulnérabilité}} to the talk page.
For more guidance, see Wikipedia:Translation.
A vulnerability scanner is a computer program designed to assess computers, networks or applications for known weaknesses. These scanners are used to discover the weaknesses of a given system. They are utilized in the identification and detection of vulnerabilities arising from mis-configurations or flawed programming within a network-based asset such as a firewall, router, web server, application server, etc. Modern vulnerability scanners allow for both authenticated and unauthenticated scans. Modern scanners are typically available as SaaS (Software as a Service); provided over the internet and delivered as a web application. The modern vulnerability scanner often has the ability to customize vulnerability reports as well as the installed software, open ports, certificates and other host information that can be queried as part of its workflow.
Authenticated scans allow for the scanner to directly access network based assets using remote administrative protocols such as secure shell (SSH) or remote desktop protocol (RDP) and authenticate using provided system credentials. This allows the vulnerability scanner to access low-level data, such as specific services and configuration details of the host operating system. It's then able to provide detailed and accurate information about the operating system and installed software, including configuration issues and missing security patches.[1]
Unauthenticated scans is a method that can result in a high number of false positives and is unable to provide detailed information about the assets operating system and installed software. This method is typically used by threat actors or security analyst trying determine the security posture of externally accessible assets.[1]
Vulnerability scanners should be able to detect the risks in open-source dependencies. However, since developers will usually re-bundle the OSS, the same code will appear in different dependencies, which will then impact the performance and ability of scanners to detect the vulnerable OSS.[2]
The CIS Critical Security Controls for Effective Cyber Defense designates continuous vulnerability scanning as a critical control for effective cyber defense.
Part of a server log, showing attempts by a scanner to find the administration page.
^ abNational Institute of Standards and Technology (September 2008). "Technical Guide to Information Security Testing and Assessment" (PDF). NIST. Retrieved 2017-10-05.
^Dann, Andreas; Plate, Henrik; Hermann, Ben; Ponta, Serena Elisa; Bodden, Eric (2022-09-01). "Identifying Challenges for OSS Vulnerability Scanners - A Study & Test Suite". IEEE Transactions on Software Engineering. 48 (9): 3613–3625. doi:10.1109/TSE.2021.3101739. ISSN 0098-5589. S2CID 238808679.
and 22 Related for: Vulnerability scanner information
A vulnerabilityscanner is a computer program designed to assess computers, networks or applications for known weaknesses. These scanners are used to...
Retinal scanner Fingerprint scanner Full body scanner Port scanner, in computer networking Virus scannerVulnerabilityscanner, a computer program that probes...
OpenVAS (Open Vulnerability Assessment Scanner, originally known as GNessUs) is the scanner component of Greenbone Vulnerability Management (GVM), a software...
assessment. Vulnerabilities can be discovered with a vulnerabilityscanner, which analyzes a computer system in search of known vulnerabilities, such as...
discovered the attack have also created a vulnerabilityscanner to determine whether an SSH server or client is vulnerable. The attack has been given the CVE...
whether the vulnerable heartbeat is enabled Heartbleed checker hosted by LastPass Online network range scanner for Heartbleed vulnerability by Pentest-Tools...
Administrator Tool for Analyzing Networks (SATAN) was a free software vulnerabilityscanner for analyzing networked computers. SATAN captured the attention...
Framework) is an open-source web application security scanner. The project provides a vulnerabilityscanner and exploitation tool for Web applications. It provides...
Nmap. Vulnerabilityscanners such as Nessus, and OpenVAS can detect target system vulnerabilities. Metasploit can import vulnerabilityscanner data and...
unknown vulnerabilities can be discovered through penetration testing or via a vulnerabilityscanner. A web application vulnerabilityscanner, also known...
researcher and programmer who was a pioneer in the development of vulnerabilityscanners for Unix operating systems and computer networks. Farmer developed...
security. Vulnerabilities can be discovered with a vulnerabilityscanner, which analyzes a computer system in search of known vulnerabilities, such as...
are very common in Web site and Web domain hacking. Vulnerabilityscanner A vulnerabilityscanner is a tool used to quickly check computers on a network...
regional or national level.: 1195–1199 Vulnerability Vulnerability index VulnerabilityscannerVulnerability assessment (computing) Handbook of International...
release of the Nikto vulnerabilityscanner. In December 2002 Johnny Long began to collect Google search queries that uncovered vulnerable systems and/or sensitive...
discovering security vulnerabilities and are required to comply with various regulatory requirements. Web application scanners can look for a wide variety...
Application Security Testing (DAST, often called Vulnerabilityscanners) automatically detects vulnerabilities by crawling and analyzing websites. This method...
that is used by vulnerabilityscanners like Nessus and OpenVAS. With NASL specific attacks can be automated, based on known vulnerabilities. Tens of thousands...
A port scanner is an application designed to probe a server or host for open ports. Such an application may be used by administrators to verify security...