Scanner (sicurezza informatica): differenze tra le versioni

Contenuto cancellato Contenuto aggiunto
Guignol (discussione | contributi)
Nessun oggetto della modifica
Guignol (discussione | contributi)
Nessun oggetto della modifica
Riga 2:
Gli scanner possono essere malevoli o amichevoli. Quelli amichevoli solitamente si interrompono allo step 2 e occasionalmente al 3, ma non vanno mai allo step 4.
 
== Tipi di scanner ==
A '''vulnerability scanner''' is a [[computer program]] designed to search for and map systems for weaknesses in an application, computer or network. Step 1, typically the scanner will first look for active IP addresses, open ports, OSes and any applications running. Step 2, It may at this point create a report or move to the next step. Step 3, try to determine the patch level of the OS or applications. In this process the scanner can cause an exploit of the vulnerability such as crash the OS or application. Step 4, the final phase the scanner may attempt to exploit the vulnerability. Scanners may either be malicious or friendly. Friendly scanners usually stop at step 2 and occasionally step 3 but never go to step 4.
* Port scanner
 
*[[ Network Scanner]]scanner
== Types of vulnerability scanners ==
* Web application security scanner
*[[port scanner | Port Scanner]]
*[[ Computer worm]]
*[[Network Scanner]]
*[[Web Application Security Scanner]]
*[[Computer worm]]
 
Friendly types of vulnerability scanners: