WEBVTT

00:07.310 --> 00:13.790
Vulnerability scanners enhance the efficiency of identifying weaknesses within network systems and applications.

00:13.790 --> 00:19.490
They streamline the assessment process, which saves both time and resources compared to a manual assessment.

00:19.490 --> 00:25.610
Within the vulnerability scanning nature, we see different aspects of the software where it's really

00:25.640 --> 00:32.600
kind of scanning not just the web application or the web interface as much as it is scanning the assets

00:32.600 --> 00:34.280
involved in the network as a whole.

00:34.280 --> 00:38.480
This could be anything from firewalls to servers to switches.

00:38.600 --> 00:44.180
The variety of network hardware that is capable of scanning is very robust, depending on not just the

00:44.180 --> 00:47.720
tool you're utilizing, but the software it's interacting with.

00:47.750 --> 00:52.880
This helps to facilitate complex compliance and regulatory standards, and it also helps to integrate

00:52.880 --> 00:58.940
with other seamless tools where it provides an overall security posture and workflow, allowing us to

00:58.970 --> 01:04.460
really kind of get to the bottom of where our network lies and the vulnerability or weaknesses and even

01:04.460 --> 01:07.730
flaws that are associated with our network as a whole.

01:08.580 --> 01:11.430
The first such tool we can use is called Nessus.

01:11.460 --> 01:18.870
Now, Nessus is a paid version of a vulnerable vulnerability scanner developed by tenable and is designed

01:18.870 --> 01:23.820
to identify security vulnerabilities, misconfigurations, and compliance issues within our networks.

01:23.850 --> 01:30.510
This tool can scan different workstations, firewalls, different devices, and it is a credible, vast

01:30.510 --> 01:35.460
database that uses both unauthenticated and authenticated scanning options.

01:35.490 --> 01:41.250
It allows for a deeper analysis with administrative controls, both local agents and endpoints, and

01:41.250 --> 01:44.370
it provides a detailed report to identify those vulnerabilities.

01:44.400 --> 01:52.020
It uses a priority list to base on severity of the weaknesses it finds, and it also provides a prioritization

01:52.020 --> 01:53.520
to remediation efforts.

01:53.550 --> 01:59.340
It also supports integration with other security tools and platforms like your Soar or even your SEM,

01:59.340 --> 02:01.710
and enhances our overall security posture.

02:01.740 --> 02:06.150
Now, the great thing about Nessus is that it is a very easy to use tool.

02:06.150 --> 02:09.240
You plug in some IP addresses or a range of IP addresses.

02:09.240 --> 02:15.060
It goes to town and you identify exactly how you want to configure the tool, and it just works.

02:15.150 --> 02:20.980
It's incredibly easy to use, incredibly efficient, and incredibly user friendly when it comes down

02:20.980 --> 02:21.430
to it.

02:21.460 --> 02:27.940
It also, with that vast database, is able to identify and pinpoint specific vulnerabilities that are

02:27.940 --> 02:30.940
kept up to date by developers on a day to day basis.

02:31.540 --> 02:33.220
The other tool is Open Boss.

02:33.250 --> 02:38.740
Now, Open Boss is the Open Vulnerability Assessment System, which is an open source vulnerability

02:38.770 --> 02:43.870
tool or scanning device that detects vulnerabilities within systems and networks as a whole.

02:43.900 --> 02:52.240
It's to identify or use to identify weaknesses such as Misconfigurations outdated software vulnerabilities,

02:52.420 --> 02:56.290
all of which can be used by attackers to attack the system or the network as a whole.

02:56.290 --> 03:01.030
While it's not a paid version, which means that it doesn't have the constant ongoing support that something

03:01.030 --> 03:06.730
like Nessus does, it still provides a great database of different vulnerabilities or flaws within the

03:06.730 --> 03:13.150
system, and is kept fairly well up to date, as open source developers continue to add to the database

03:13.150 --> 03:16.720
and search for specific vulnerabilities associated with it.

03:16.750 --> 03:21.670
However, because it's free, it's not as easy to use as something like Nessus, and we'll see that

03:21.670 --> 03:23.680
when we go through the tool step by step.
