N.S.S Network Scan Tool to help you capture network vulnerabilities (1)
Source: Internet
Author: User
KeywordsSafe N.S.S.
"51cto.com expert feature" GFI Company's security products are many, including languard receptacle scanner can help us scan the network, look for security problems in the network, and help us solve some of the potential security risks. Can help the administrator to some extent to reduce the burden of work. The function of this software is divided into three parts, one is network scan, the other is network audit, the third is patch management, these three functions enable administrators to scan and protect their own network completely, it has the following three important features: according to Oval and Sans Company's 20 major loopholes, Using a vulnerability check database can confirm some system and network vulnerabilities. Audit all hardware and software installed in the system, allowing users to create a detailed component directory. In addition, by analyzing the configuration settings for anti-virus and Anti-spyware software, it can also check that the software is valid. This software allows users to automatically download the Microsoft operating system patch package and can be installed remotely. Even it supports downloading and installing some third-party software patches. Below we simply use its network scanning function to experience its role. Custom scans can be installed on the system in a normal way after downloading the tool from the www.gfi.com site, not much at this point. Only through the example to see its use method: 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' alt= ' "src=" http://new.51cto.com/files /uploadimg/20080616/1056400.gif "border=0> as shown in Figure 1 above, after starting the software, first see its main interface and a new scan scan window. In the New Scan Scan window, there are three choices, one is the local computer scan that is computer scan, the second is the full network scan that complete receptacle scan, and the third is custom scan, custom scan. At this point, we choose Custom scans for custom Scan. Then pop-up below figure 3,498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' alt= ' "src=" http://new.51cto.com/files/ Uploadimg/20080616/1056401.gif "Border=0> We can choose one of our favorite scans, but note that the first option" vulnerability scanning " You can enumerate all vulnerabilities, including patches, on the target computer. SubsectionTwo options "patching status" can only list all missing patches for the target computer. The third option, "receptacle and Software auditing", enumerates system information, but does not include bugs and missing patches. The fourth option "Complete/combination Scan" is one of the most time-consuming scans that can retrieve system information and enumerate all vulnerabilities and all missing patches. In this case, we select "Vulnerability scanning" and click "Next" to go to the next step, as shown in 3:498 below) this.width=498; ' OnMouseWheel = ' javascript:return big ( This) ' alt= ' src= ' http://new.51cto.com/files/uploadimg/20080616/1056402.gif ' border=0> here, we choose Trojan Ports is the Trojan port, let the tool scan for us, click Next to enter the next step, as shown in Figure 4:498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' alt= ' "Src=" Http://new.51cto.com/files/uploadimg/20080616/1056403.gif "border=0> here, we first select the first item, scan a computer, and click Next to go to the next step. As pictured 5:498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' alt= ' "src=" http://new.51cto.com/files/ Uploadimg/20080616/1056404.gif "border=0> The IP address of the computer you want to scan on the local network, click Next to go to the next step, as shown in Figure 6:498) this.width=498; ' OnMouseWheel = ' Javascript:return big (This) ' alt= ' src= ' http://new.51cto.com/files/uploadimg/20080616/1056405.gif ' border=0> when selecting a scan voucher, select it according to the description on the right. In this case, we select the first item, using theCredentials of the currently logged-on user. Click Scan to scan. At this point, the state of the system is shown in Figure 7:498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' alt= ' "src=" http://new.51cto.com/ Files/uploadimg/20080616/1056406.gif "Border=0> This figure shows that the scan did not check out the Trojan port in the system. 1 2 Next page >> content navigation 1th page: Custom Scan page 2nd: Full scan to force (0 votes) to tempt (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title party (0 Votes) passing (0 Votes) The original text: N.S.S Network scan Tool to help you capture network vulnerabilities (1) Back to the Network security home page
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.