SecPoint - Best IT Security
The best Innovative and powerful IT Security products

SecPoint Products / Penetrator /

Vulnerability Scanning & Assessment Methodology explained:

The Penetrator vulnerability scanning software engine is designed to have the best, most intelligent & most effective scanning capability based on the presented scanning methodology in this document.

Using the same approach, techniques while scanning as real attackers/hackers & black hat hackers would deploy to compromise a target system or systems.

The vulnerability scanning software engine don’t just rely on attacker’s black hat approach it is also optimized for government & corporate environments to give the customer the most optimal scanning process.

Utilizing scanning feedback & requirements from thousands of customers across more than 100 countries allows the penetrator software to get a better result than traditional scanning solutions.

The Penetratror Vulnerability Scanner & Assessment product methodology is build up in the same way as a real attacker would target a system.

It uses advanced techniques for information discovery juts like an attacker would do it.
The Penetrator Scanning engine is updated with the latest advanced scanning modules to comply with the scanning tasks.

Optimized with an intelligent scanning backbone structure to maximize overall performance, data traffic, scan speed & scan results.

Taking advantage of detected services for faster results.

The scanning engine modules can utilize threads for faster but accurate scans results. This can increase overall performance when scanning large network segments.

Vulnerability Scanning Methodology

Step One: Host Alive Status

Checking if the target system is alive & information gathering.
To consume data, use the most optimized scanning the Penetrator will determine if the target IP address must be scanned.
It uses different techniques for this to also detect firewalled systems or otherwise hard to detect a pulse from.
One technique is to probe for open TCP & UDP ports.

Popular ports includes but not limited to TCP Ports 1-111,135,139,443,445 & more.
For UDP 53,111,135,137,161 & 500. It is also possible to customize the profile to add other ports.
A scan can also be forced even if the target appear to be offline or not alive.

Step Two: Firewall Detection

Determine if the target system is behind a firewall, IDS or IPS system.
Some systems appear to be offline where in reality they are just firewalled off & can still be wide open to attack.

In the Firewall detection module it can use different techniques to detect firewalling/filtering/IPSed devices.
The test will also gather more network information from the infrastructure when doing TCP & UDP port probing.

Step Three: TCP UDP Portscan

TCP & UDP port scanning to determine open ports & services.
Depending on the chosen profile there can be scanned the most common 2000 ports or more.

In the full profiles all 65.535 TCP & UDP ports will be probed & scanned.
In most setups using the best scan profile can be recommended to save time & network bandwidth.
For more in-depth analysis the full scan profiles are recommended.

Step Four: OS & Service Detection

Services, OS & services version detection. Operating system detection & optimizing.
Once the TCP & UDP port scanning has completed, the Penetrator will use different techniques to identify operating system running on the target host.

Step Five: Profile Vulnerability Scanning 

Based on selection of one of the nine scanning profiles selected.
Right profile is applied for optimized Vulnerability Scanning results.
Launch scanning modules, exploits or Denial of Service (DoS) depending on which of 9 profile selected.

Step Six: Report Generation

Reporting Generation in different formats and outputs risk analysis and remediation suggestion.


➤ Related pages
About Vulnerability Assessment
Cloud Vulnerability Node Scan Distribution
How to connect Penetrator Vulnerability Scanning Appliance
Information Vulnerability Scanner
Latest Penetrator Change Log
Network Security Scanner
Network security vulnerabilities
On Demand Vulnerability Mgmt
Penetrator Awards and Reviews
Penetrator Comparison
Penetrator Models
Penetrator Questions FAQ
Penetrator Quick Setup Guide
Penetrator S7 Appliance
Penetrator Scanner Sitemap
Penetrator Scanner Visio Stencils
Pricing of a Vulnerability Scanner?
The Best #1 Security Scanner
Vulnerability Management Benefits
Vulnerability Scan Wordpress
Vulnerability Scanning Methodology
Vulnerability Scanning ROI

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef