Nmap & Nessus | Network Scanning Tools
Nmap and nessus is network scaning tools
Nmap - is a port scanner used for large network scanning and low-level ICMP, TCP and UDP analysis. Nmap supports a large number of scanning techniques and also offers advanced features such as fingerprinting protocol service, IP fingerprinting, hidden scanning, and low-level traffic filtering analysis. Many system and network administrators use it to network inventory, manage service updates, and monitor the performance of this hosting service. The system works with what type of packet filters and firewalls are used on each host and lots of other information. It was designed to quickly scan large networks, but also works well on a single host system. Nmap works on all major computer operating systems. The classic command-line addition to Nmap has an advanced visual interface, results viewer (Zenmap), flexible data transfer, redirect and debugging tool (Ncat), scan results comparison utility (Ndiff), and packet generator and analysis tool (Nping). Nmap also offers the following features:
Host detection - identifies network hosts.
For example, a list of all hosts that respond to a TCP and / or ICMP request or have a specific port open.
Scan Ports - Record the ports opened on the target host.
Detect Versions - Query network services to find out the name and version of a remote device application.
Operating System Identification - Identifying the operating system characteristics and hardware of a network device.
Write interaction scripts with the target device - using Nmap Scripting Engine (NSE) and Lua programming language.
Nmap can provide additional information about network devices, e.g. Such as DNS names, device types, and MAC addresses
Nessus - is a vulnerability assessment package that can perform many automated tests on the target network, including ICMP, TCP and UDP scans, specific network device testing, and a good report of the security vulnerabilities obtained. Many organizations use Nessus for bulk network scanning and security assessment. After receiving the Nessus report, they start deeper testing, using special techniques and tools. Nessus consists of two components (Daemon and Client) and deployment in a distributed network, allowing us to cover network tests and efficient network management. Nessus gives the results of a complete report in most cases, but these reports often contain some false positive results and a lot of noise (sometimes bugs are not fully reported or one error is reported several times), so it is important for a security consultant to manually cover the Nessus result to qualify it. And make an accurate and concise manuscript account. Like many other tools Nessus uses the CVE reference to report errors. CVE is a detailed list of common defects produced by Miter Corporation. Nessus is designed for all available Tenable Security platforms and has a 7-day free trial.