SecPoint Vulnerability Scanning Profiles
SecPoint Vulnerability Scanning Profiles
Easily discover vulnerabilities on your network and choose the correct profile for scanning.
Quick Scan - Quick Web Scan - Normal Scan - Full Scan - Full Firewall Scan - Aggressive Scan - OWASP Top 10 - PCI-DSS Preparation for web applications - HIPAA.
Profile can help you to perform quick and fast scans that will give a brief overview of vulnerabilities.
You can also perform the recommended Normal Scan or more intensive Full Firewall Scan which are safe to run in production environments.
If you need to test the strength of your firewall and systems the Aggressive Scan profile can help with that.
If you are not sure which scanning profile is best in your network security environment just feel free to contact us to get support.
This scan profile is you just want a quick scan to get an idea about how vulnerable the target is.
Web Crawler Google Hack DB Joomla Security Scan Google Safe Browsing.
Firewall, DNS, FTP, Web, SSL, SSH, SQL, NetBIOS and much more.
Duration can be several hours depending on how many services are found during the scan.
It is designed to be non harmful and not flood the services by simulating the human behavior.
The normal scan will scan for all areas only limited to 10.000 most common ports.
Copyright © 1999-2017 SecPoint® - Partner Confidential Information Page 2 of 15
SecPoint® Penetrator™ Vulnerability Scanning Profiles
CMS Web Scan - Joomla, Wordpress, Drupal Web application vulnerability scanner.
Drupal Scan.
Web Interfaces.
Duration can be several hours depending on how many services are found during the scan.
It is designed to be non harmful and not flood the services by simulating the human behavior.
Scan Profile Quick Scan Top common popular ports for fast scan.
Firewall, DNS, FTP, Web, SSL, SSH, SQL, NetBIOS and much more.
Duration can be several hours depending on how many services are found during the scan.
It is designed to be non harmful and not flood the services by simulating the human behavior.
Scans the whole range of Common Firewall Ports. Performs 55.000+ checks.
Especially designed for firewalls, because tries to scan nodes even if they appear offline.
SQL Injection.
Command Execution.
Web Crawler.
Firewall, DNS, FTP, Web, SSL, SSH, SQL, NetBIOS and much more.
Duration can be several hours depending on how many services are found during the scan.
It is designed to be non harmful and not flood the services by simulating the human behavior.
SQL Injection
Command Execution
Web Crawler
Google Hack DB
Firewall, DNS, FTP, Web, SSL, SSH, SQL, NetBIOS and much more.
Duration can be several hours depending on how many services are found during the scan.
A1 - Injection
A5 - Security Misconfiguration
PCI does not allow self assessments, but requires an external vulnerability scan from an Authorized Scanning Vendor (ASV).
Secpoint Penetrator can be used to perform an Internet based scan as it would be done by an ASV.
Two new scan profiles are available: HIPAA and PCI-DSS Preparation for Web Applications.
The HIPAA profile will perform a scan on the requested targets to assess compatibility with the HIPAA security regulations.
This vulnerability scan should be considered as a part of the HIPAA Security Risk Analysis assessment (SRA).
The PCI-DSS Preparation for Web Applications is a vulnerability scan designed to prepare for a PCI-DSS certification.
It won’t provide any certification, but will provide important information about vulnerabilities that could potentially cause the PCI-DSS certification to fail.
'This scan will check if the audited target systems are exposed to risk or comply with the key HIPAA security regulations.
In the Full scan it will scan for all 65.535 TCP ports giving a slower but also more comprehensive scan.
Scan Profile Full Firewall Scan The Full scan will force the ports to be scanned even if port scanning blocking is in place.
Scan Profile Aggressive Scan The Aggressive Profile will launch Denial of Service DoS attacks & Exploit attacks.
This is only recommended on pre production systems since it can cause systems to crash.
This profile will carry out checks in the OWASP TOP 10.
For each of these profiles, when every target IP in a scan is audited with the same profile.
The Penetrator will automatically generate an extra page in the PDF reports with detailed information about the chosen scan type.
Then please choose a name for the Vulnerability Scan and please click Next.
You can also choose to scan a preconfigured group by clicking a Vulnerability Scan Template given.
A few improvements have been made to the Create New Scan, Create Scan Template and Create Schedule Scan functions.
• When a user has a predefined number of IPs to scan, it is possible to add them at once with the new Add all button.
• When a number of IPs have been added to the scan, it is possible to change their profiles at once with the new dropdown menu.
• A new button has been added to allow import multiple IPs from an external CSV file.
This button is normally hidden and can be displayed clicking on the link Import IP List from CSV file.
The Advanced Setup has been totally redesigned. In the page that summarizes the information of a Scan.
Scan Template or Scheduled Scan, an Advanced Setup button can be found next to each IP/Domain.
The Advanced Setup has been totally redesigned. In the page that summarizes the information of a Scan.
Scan Template or Scheduled Scan, an Advanced Setup button can be found next to each IP/Domain.
The advanced settings for that IP/domain are then shown in a unique page.
Here it’s possible to specify Ports, Directories, Virtual Hosts, Aggressive mode parameters.
Email address to be notified at the end of the scan, and some notes about the current target.
To do this, it’s possible to enter a list of usernames/passwords in the Advanced Setup of a scan.
Immediately before starting a scan, you may click on Advanced Setup and in the page that appears
you can enter multiple usernames and passwords that will be used by the scanner before starting the vulnerability assessment.
The vulnerability scanner will check for every possible combination of username/password among those entered here.
The same settings are available when creating a Schedule Scans and a Scan Templates.