The Penetrator vulnerability scanning software engine is designed to have the best, most intelligent & most effective scanning capability based on the presented scanning methodology in this document.
Using the same approach, techniques while scanning as real attackers/hackers & black hat hackers would deploy to compromise a target system or systems.
The vulnerability scanning software engine don’t just rely on attacker’s black hat approach it is also optimized for government & corporate environments to give the customer the most optimal scanning process.
Utilizing scanning feedback & requirements from thousands of customers across more than 100 countries allows the penetrator software to get a better result than traditional scanning solutions.
The Penetratror Vulnerability Scanner & Assessment product methodology is build up in the same way as a real attacker would target a system.
It uses advanced techniques for information discovery juts like an attacker would do it.
The Penetrator Scanning engine is updated with the latest advanced scanning modules to comply with the scanning tasks.
Optimized with an intelligent scanning backbone structure to maximize overall performance, data traffic, scan speed & scan results.
Taking advantage of detected services for faster results.
The scanning engine modules can utilize threads for faster but accurate scans results. This can increase overall performance when scanning large network segments.
Checking if the target system is alive & information gathering.
To consume data, use the most optimized scanning the Penetrator will determine if the target IP address must be scanned.
It uses different techniques for this to also detect firewalled systems or otherwise hard to detect a pulse from.
One technique is to probe for open TCP & UDP ports.
Popular ports includes but not limited to TCP Ports 1-111,135,139,443,445 & more.
For UDP 53,111,135,137,161 & 500. It is also possible to customize the profile to add other ports.
A scan can also be forced even if the target appear to be offline or not alive.
Determine if the target system is behind a firewall, IDS or IPS system.
Some systems appear to be offline where in reality they are just firewalled off & can still be wide open to attack.
In the Firewall detection module it can use different techniques to detect firewalling/filtering/IPSed devices.
The test will also gather more network information from the infrastructure when doing TCP & UDP port probing.
TCP & UDP port scanning to determine open ports & services.
Depending on the chosen profile there can be scanned the most common 2000 ports or more.
In the full profiles all 65.535 TCP & UDP ports will be probed & scanned.
In most setups using the best scan profile can be recommended to save time & network bandwidth.
For more in-depth analysis the full scan profiles are recommended.
Services, OS & services version detection. Operating system detection & optimizing.
Once the TCP & UDP port scanning has completed, the Penetrator will use different techniques to identify operating system running on the target host.
Based on selection of one of the nine scanning profiles selected.
Right profile is applied for optimized Vulnerability Scanning results.
Launch scanning modules, exploits or Denial of Service (DoS) depending on which of 9 profile selected.
Reporting Generation in different formats and outputs risk analysis and remediation suggestion.
|➤ Related pages|
Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software
SecPoint is specialized to deliver the best IT security solutions and products.