Hacking Class 6 – Vulnerability Scanning And Tools

In my previous class I have discussed about OS fingerprinting i.e finding that which OS the Victim is using.
Now We move further in scanning phase and now we will scan the systems for vulnerabilities i.e finding the weakness in security ,OS,database and so on..

What is Vulnerability???

As I have Told in First class that Vulnerability is weakness in the network,system,database etc… We can call vulnerability as the Loophole i.e through which victim can be attacked.. We first analyze the loophole and then try to use it to best to Hack the System of victim or oraganisation or website…

1. Nessus
2. Retina

The Nessus® vulnerability scanner, is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks.

Hacking Class 6 - Vulnerability Scanning And Tools


~ Plug-in-architecture
~ NASL (Nessus Attack Scripting Language)
~ Can test unlimited number of hosts simultaneously
~ Smart service recognition
~ Client-server architecture
~ Smart plug-ins
~ Up-to-date security vulnerability database


Hacking Class 6 - Vulnerability Scanning And Tools


Retina Network Security Scanner, the industry and government standard for multi-platform vulnerability management, identifies known and zero day vulnerabilities plus provides security risk assessment, enabling security best practices, policy enforcement, and regulatory audits.

Hacking Class 6 - Vulnerability Scanning And Tools


~ Retina network security scanner is a network vulnerability assessment scanner.
~ It can scan every machine on the target network, including a variety of operating system platforms, networking devices, databases, and third party or custom applications.
~ It has the most comprehensive and up-to-date vulnerability database and scanning technology.


Hacking Class 6 - Vulnerability Scanning And Tools


Now After Scanning the Systems for Vulnerabilites .. We will Now Going to attack the Systems but before this we should know the Risk . This risk can be reduced to great extent by using Proxies.. In Next Class We will Discuss what are Proxies and How they work and how they are going to Help us and some undetectable and untraceable Proxy servers…
So wait For Next Class…. And Keep Learning…

If you Have Any Queries You can Ask In form Of Comments!

Author Bio

Lokesh Singh

Hey Friends, This is Lokesh Singh. Your friend, who loves to share knowledge with friends as i believe in "Sharing is Caring". If you like our tutorials then you can send your gratitude by saying thanks or clicking any of our Sponsor ads.

  1. Meghraj

    October 23, 2009 at 12:32 pm

    Hei Lokesh The said..EBOMB virus is seems to b still there.. how can i get rid of it….

  2. Meghraj

    October 23, 2009 at 12:40 pm

    Good post on system scanning… Thanx Bro

  3. Lokesh@Admin

    October 23, 2009 at 12:57 pm

    Hey you can scan your sytem through spyware terminator and avira itz a best combination…
    I am using this from 4 yrs and never got infected..try it…

  4. Anonymous

    October 23, 2009 at 2:47 pm

    Nice post..keep it up..

  5. Anonymous

    October 23, 2009 at 3:31 pm

    Lokesh we need to talk, how do i contact you. its confidential.

  6. Anonymous

    October 23, 2009 at 5:45 pm

    keeep it up bro……..

  7. Anonymous

    October 23, 2009 at 5:46 pm

    hey can u teach me how to get WEP key

  8. Meghraj

    October 24, 2009 at 12:12 am

    Thanx man… hey it would be better if the softwares u stated above could be downloaded from some another server like hotfile. it too sluggy going to the official sites….

  9. Lokesh@Admin

    October 24, 2009 at 10:17 am

    yes there is software to recover formatted partitions…try this ..

  10. Lokesh Singh

    October 25, 2009 at 2:00 am

    @ mercy
    Its a spyware…download any good anti spyware program and run a through scan…It will remove that spyware…Hope this solve ur problem.

  11. mercy

    October 25, 2009 at 7:34 am


Leave a Reply

Your email address will not be published. Required fields are marked *

3 × five =

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>