SCENARIO-BASED TESTS
Automated vulnerability scan
Do you only have a requirement for a simple vulnerability scan and do not need manual testing methods? Then commission a cost-effective vulnerability scan.
Do you only have a requirement for a simple vulnerability scan and do not need manual testing methods? Then commission a cost-effective vulnerability scan.
With this type of test, our experts check your IT systems with automated vulnerability scanners. The results of the vulnerability scanners are then validated, their risk assessed and adjusted for false positives. At the end, you will receive a final report incl. a catalog of measures to rectify the findings.
Exemplary vulnerability scanners in use:
Commercial vulnerability scanner with many scanning methods and plugins
Free, open-source vulnerability scanner based on community templates
Free, open-source vulnerability scanner
An automated vulnerability scan has nothing to do with a comprehensive penetration test. A human pentesting expert finds more than a robot.
The results of an automated vulnerability scan usually contain false positives and an inadequate risk assessment. These must be corrected manually.
Automated scanners can only identify vulnerabilities that are known in advance and enable automated identification. But what about all the other weak points?
An automated vulnerability scan is not a penetration test. The test procedure is fully automated and only vulnerabilities that are publicly known in advance, and can be easily identified using automated tests, can be identified.
As a rule, the resulting findings are based on so-called “low-hanging fruits”, i.e. vulnerabilities that can be found very easily by attackers or automated tools. Such results are not comparable with the results of a manual, comprehensive penetration test.
Nevertheless, automated vulnerability scans, especially when performed regularly, provide a solid foundation for vulnerability management. IT systems or larger IT infrastructures can be automatically checked for common vulnerabilities so that these can be rectified promptly. This can already greatly reduce the attack surface and provides a good overview of typical vulnerability areas such as patch management and SSL/TLS.
By commissioning an automated vulnerability scan, our experts examine your IT systems using various vulnerability scanners. These include, for example, Nessus Professional and Nuclei. The scanners are professionally configured by our experts and adjusted to your target systems. The resulting findings are validated, false-positive findings are corrected and all results are documented in detail in a final report, including the results of the audit. catalog of measures.