Vulnerability
Vulnerability is a mistake that allows a person to go in and get access right into the targeted computer (the target). Usually vulnerability is a weakness that caused the error or ignorance administratorsettings.There are many types of vulnerability, There is a misconfiguration in the setupservice, or service programming flaw.
>> Service is a program that runs on port Internet hosts. Each service is a programthat responds to commands - certain commands.
>> Misconfiguration setup cause 'wiz' or 'debug' command operating on the old version of sendmail, or an error setting permissions on the FTP server directory so that people can download the password file. In this case, the vulnerability is not amistake when writing the program, but tend to be on how the program is configured.
Vulnerability scanner software is used to automatically detect software vulnerabilitieswithout having to look one by one manually.
Vulnerability scanners are different types with different advantages of each. Somevulnerability scanners are:
1.
GFI Lan guard scanner (http://www.gfi.com/lanetscan)
2. Nessus security scanner (www.nessus.com)
3. Retina (www.eeye.com/html/products/retina/index.html)
4. ISS Internet scanner (www.iss.net)
5. Sara (www.-arc.com/sara
6. Nikto (www.cirt.net/code/nikto.shtml)
7. Webinspect (www.spidynamics.com/products/webinspect)
8. Whisker (www.wiretrip.net/rfp)
9. Wikto (www.sensepost.com/research/wikto)
10. N-stalker (www.nstalker.com/products)
2. Nessus security scanner (www.nessus.com)
3. Retina (www.eeye.com/html/products/retina/index.html)
4. ISS Internet scanner (www.iss.net)
5. Sara (www.-arc.com/sara
6. Nikto (www.cirt.net/code/nikto.shtml)
7. Webinspect (www.spidynamics.com/products/webinspect)
8. Whisker (www.wiretrip.net/rfp)
9. Wikto (www.sensepost.com/research/wikto)
10. N-stalker (www.nstalker.com/products)
Tidak ada komentar:
Posting Komentar