← Back|CYBERSECURITYβ€ΊSection 1/16
0 of 16 completed

Vulnerability scanning

Intermediate⏱ 14 min readπŸ“… Updated: 2026-02-17

Introduction

Un veedu la lock weak ah iruntha, nee dhaan first ah find panni fix pannuva, illana thief find pannuvan! Same concept dhaan vulnerability scanning. πŸ”


Vulnerability scanning = Un systems, networks, applications la weaknesses automatically find panradhu. Hackers find panna munna nee find pannanum β€” adhu dhaan goal!


Every organization ku mandatory. Un personal systems ku kooda useful. Let's learn how! πŸ›‘οΈ

What is a Vulnerability?

Vulnerability = Software, hardware, or configuration la irukku oru weakness β€” attacker exploit panna mudiyum.


Types of vulnerabilities:


TypeExampleRisk Level
Software bugsBuffer overflow, SQL injectionπŸ”΄ High
MisconfigurationsDefault passwords, open portsπŸ”΄ High
Outdated softwareUnpatched OS, old libraries🟑 Medium-High
Weak encryptionMD5 hashing, SSL v2🟑 Medium
Access control flawsExcessive permissionsπŸ”΄ High
Zero-dayUnknown, unpatched vulnerabilitiesπŸ”΄ Critical

CVE (Common Vulnerabilities and Exposures) = Global vulnerability database. Every known vulnerability ku oru unique ID irukku β€” like CVE-2024-12345.


CVSS Score (0-10) = Vulnerability severity measure pannuradhu:

  • 0.0-3.9: Low 🟒
  • 4.0-6.9: Medium 🟑
  • 7.0-8.9: High 🟠
  • 9.0-10.0: Critical πŸ”΄

Types of Vulnerability Scanning

Different scanning types β€” different purposes:


1. Network Scanning 🌐

  • Open ports, services, OS detection
  • Firewall misconfigurations find pannum
  • Tools: Nmap, Masscan

2. Web Application Scanning πŸ•ΈοΈ

  • SQL injection, XSS, CSRF vulnerabilities
  • OWASP Top 10 check pannum
  • Tools: OWASP ZAP, Burp Suite, Nikto

3. Host-based Scanning πŸ’»

  • Individual system la installed software, patches check
  • Registry, file permissions audit
  • Tools: Nessus, Qualys, OpenVAS

4. Database Scanning πŸ—„οΈ

  • Database misconfigurations, default credentials
  • Excessive privileges detect
  • Tools: DbProtect, AppDetectivePro

5. Cloud Scanning ☁️

  • Cloud misconfigurations (S3 buckets open, IAM issues)
  • Compliance check (CIS benchmarks)
  • Tools: ScoutSuite, Prowler, CloudSploit

Scan TypeTargetFrequency
NetworkInfraWeekly
Web AppApplicationsPer release
HostEndpointsMonthly
DatabaseDB serversMonthly
CloudCloud resourcesDaily

How Vulnerability Scanning Works

Scanning process step by step:


Step 1: Discovery πŸ”Ž

  • Network la alive hosts find pannum
  • Ping sweep, ARP scan use pannum
  • "Enna enna devices irukku?" β€” first question

Step 2: Port Scanning πŸšͺ

  • Each host la open ports identify
  • Services running on those ports detect
  • nmap -sV 192.168.1.0/24 β€” service version detection

Step 3: Vulnerability Detection πŸ›

  • Known CVEs against detected services match pannum
  • Version numbers compare β€” outdated ah check
  • Configuration checks run pannum

Step 4: Analysis & Reporting πŸ“Š

  • Findings categorize by severity
  • False positives filter pannum
  • Remediation recommendations provide pannum

Two approaches:

  • Credentialed scan β€” Login credentials use panni deep scan. More accurate, more findings. βœ…
  • Non-credentialed scan β€” Outside perspective, no login. Faster but surface-level only. ⚑

Vulnerability Management Architecture

πŸ—οΈ Architecture Diagram
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚         VULNERABILITY MANAGEMENT LIFECYCLE           β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                                                       β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”       β”‚
β”‚  β”‚ DISCOVER │───▢│  SCAN    │───▢│ ANALYZE  β”‚       β”‚
β”‚  β”‚ Assets   β”‚    β”‚ Vulns    β”‚    β”‚ Results  β”‚       β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”˜       β”‚
β”‚                                       β”‚              β”‚
β”‚                                       β–Ό              β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”       β”‚
β”‚  β”‚ VERIFY   │◀───│ REMEDIATE│◀───│PRIORITIZEβ”‚       β”‚
β”‚  β”‚ Fixed?   β”‚    β”‚ Patch/Fixβ”‚    β”‚ By Risk  β”‚       β”‚
β”‚  β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜       β”‚
β”‚       β”‚                                              β”‚
β”‚       β–Ό                                              β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”                                        β”‚
β”‚  β”‚  REPORT  β”‚  β†’ Dashboard, Compliance, Trends      β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜                                        β”‚
β”‚                                                       β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”             β”‚
β”‚  β”‚         SCANNING ENGINE             β”‚             β”‚
β”‚  β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚             β”‚
β”‚  β”‚  β”‚ Scanner β”‚  β”‚ Vulnerability DB β”‚  β”‚             β”‚
β”‚  β”‚  β”‚ (Nessus/β”‚  β”‚ (NVD/CVE feeds)  β”‚  β”‚             β”‚
β”‚  β”‚  β”‚ OpenVAS)β”‚  β”‚ Updated daily    β”‚  β”‚             β”‚
β”‚  β”‚  β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚             β”‚
β”‚  β”‚       β””β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”˜            β”‚             β”‚
β”‚  β”‚                β–Ό                    β”‚             β”‚
β”‚  β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”           β”‚             β”‚
β”‚  β”‚  β”‚ Targets:             β”‚           β”‚             β”‚
β”‚  β”‚  β”‚ 🌐 Network devices  β”‚           β”‚             β”‚
β”‚  β”‚  β”‚ πŸ’» Servers/Endpointsβ”‚           β”‚             β”‚
β”‚  β”‚  β”‚ πŸ•ΈοΈ Web applications β”‚           β”‚             β”‚
β”‚  β”‚  β”‚ ☁️ Cloud resources  β”‚           β”‚             β”‚
β”‚  β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜           β”‚             β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜             β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Nmap β€” Network Scanner King πŸ‘‘

Nmap (Network Mapper) = Most popular free network scanning tool.


Essential commands:


bash
# Basic host discovery
nmap -sn 192.168.1.0/24

# Port scan with service detection
nmap -sV -p 1-1000 target.com

# OS detection
nmap -O target.com

# Aggressive scan (OS + version + scripts)
nmap -A target.com

# Scan specific ports
nmap -p 80,443,22,3306 target.com

# Vulnerability scripts
nmap --script vuln target.com

# Stealth SYN scan
nmap -sS target.com

Nmap scan types:


FlagTypeDescription
-sSSYN ScanStealth, half-open connection
-sTTCP ConnectFull connection, noisy
-sUUDP ScanUDP ports check
-sVVersionService versions detect
-snPing ScanHost discovery only
-OOS DetectOperating system guess

Pro tip: nmap -sV --script vulners target.com β€” vulnerability database cross-reference panni results kaatdum! 🎯

OpenVAS β€” Free Vulnerability Scanner

πŸ’‘ Tip

πŸ†“ OpenVAS (Greenbone) = Enterprise-grade free vulnerability scanner!

Setup (Kali Linux la):

bash
sudo apt install openvas
sudo gvm-setup        # Initial setup
sudo gvm-start        # Start services

Features:

- 50,000+ vulnerability tests (NVTs)

- Scheduled scanning support

- Detailed reports with remediation

- Web-based dashboard (Greenbone Security Assistant)

- Credentialed and non-credentialed scans

Best practices:

- Weekly automatic scans schedule pannunga πŸ“…

- Credentialed scan use panna β€” 60% more vulnerabilities find aagum

- Custom scan policies create pannunga β€” un environment ku specific

- Results export panni tracking spreadsheet la maintain pannunga

Commercial alternatives: Nessus ($3,990/year), Qualys (cloud-based), Rapid7 InsightVM

Web Application Scanning

Web apps ku special scanning tools vennum β€” OWASP Top 10 vulnerabilities find panna.


OWASP ZAP (Zed Attack Proxy) β€” Free web app scanner:


What it finds:

  • πŸ’‰ SQL Injection β€” Database manipulation
  • πŸ“œ XSS (Cross-Site Scripting) β€” Malicious script injection
  • πŸ”“ Broken Authentication β€” Session/login flaws
  • πŸ“‚ Directory Traversal β€” Unauthorized file access
  • πŸ”‘ Sensitive Data Exposure β€” Unencrypted data
  • βš™οΈ Security Misconfigurations β€” Headers, cookies

Scanning modes:

  1. Passive Scan β€” Traffic observe pannum, modify pannadu. Safe! βœ…
  2. Active Scan β€” Actually attack payloads send pannum. Risky! ⚠️
  3. Spider/Crawl β€” All pages discover pannum
  4. Ajax Spider β€” JavaScript-heavy apps crawl pannum

Important headers to check:


HeaderPurposeMissing = Risk
Content-Security-PolicyXSS preventionπŸ”΄ High
X-Frame-OptionsClickjacking block🟑 Medium
Strict-Transport-SecurityForce HTTPS🟑 Medium
X-Content-Type-OptionsMIME sniffing block🟒 Low

Vulnerability Prioritization

Scan results la 1000+ vulnerabilities varum β€” ellaam fix panna mudiyaadhu. Prioritize pannanum! 🎯


Risk-based prioritization formula:

Risk = Severity Γ— Exploitability Γ— Asset Value


Priority matrix:


CVSS ScoreExploitable?Asset Critical?Priority
9.0+YesYesπŸ”΄ Fix NOW
9.0+YesNo🟠 Fix in 24h
7.0-8.9YesYes🟠 Fix in 48h
7.0-8.9NoYes🟑 Fix in 1 week
4.0-6.9YesYes🟑 Fix in 2 weeks
4.0-6.9NoNo🟒 Fix in 30 days
0.0-3.9AnyAny🟒 Next cycle

Key factors:

  • EPSS (Exploit Prediction Scoring) β€” Probability of exploitation in next 30 days
  • CISA KEV β€” Known Exploited Vulnerabilities catalog. Idhu la iruntha = immediate fix! 🚨
  • Asset exposure β€” Internet-facing vs internal
  • Compensating controls β€” Firewall/WAF already protect pannudhaa?

Handling False Positives

⚠️ Warning

⚠️ False positives = Scanner says vulnerability irukku, but actually illai!

Common causes:

- Version detection inaccurate β€” backported patches detect aagaadhu

- Generic signature match β€” context illama flag pannum

- Environmental differences β€” scanner's assumptions wrong

How to handle:

1. Verify manually β€” Actually exploit try pannunga (lab la!)

2. Cross-reference β€” Multiple tools use panni confirm

3. Check patches β€” OS vendor backported fix apply panniruppanga

4. Document exceptions β€” False positive confirm aana, exception create with justification

False positive rate benchmarks:

- Good scanner: 5-15% false positives

- Average scanner: 15-30%

- Bad scanner: 30%+ ❌

Tip: Credentialed scans = less false positives. Scanner actual installed versions check panna mudiyadhu without credentials!

Remediation Strategies

Vulnerability find aachchu β€” ippo fix pannanum! πŸ”§


Remediation options:


1. Patch 🩹 β€” Best solution

  • Software update install pannunga
  • Vendor-released security patches apply
  • Test first in staging, then production

2. Mitigate πŸ›‘οΈ β€” Can't patch? Reduce risk

  • Firewall rules add to block exploit path
  • WAF rules for web vulnerabilities
  • Network segmentation β€” isolate vulnerable system
  • Disable vulnerable feature if not needed

3. Accept πŸ“ β€” Risk accept with documentation

  • CVSS low + no exploit available + internal only
  • Business justification document pannunga
  • Management sign-off vaanganum
  • Re-evaluate periodically

4. Transfer πŸ“‹ β€” Risk transfer

  • Cyber insurance
  • Third-party managed service

Patch management best practices:

  • Test patches in lab environment first βœ…
  • Schedule regular patch windows (monthly) πŸ“…
  • Emergency patches for critical CVEs β€” 24-48h ⚑
  • Track patch compliance β€” 95%+ target 🎯
  • Rollback plan always ready β€” patch breaks something? Revert! πŸ”„

Continuous Vulnerability Management

One-time scan podhaadhu β€” continuous ah pannanum!


Why continuous?

  • New CVEs daily publish aagum (50+ per day!)
  • Systems change constantly β€” new software, configs
  • Attackers don't wait for your monthly scan

Continuous scanning pipeline:


  1. πŸ“‹ Asset Inventory β€” Know what you have (you can't protect what you don't know!)
  2. πŸ” Automated Scanning β€” Daily/weekly scheduled scans
  3. πŸ”” Alert Integration β€” Critical findings β†’ Slack/Teams/PagerDuty
  4. πŸ“Š Dashboard β€” Real-time vulnerability posture view
  5. 🎫 Ticketing β€” Auto-create Jira tickets for findings
  6. βœ… Verification β€” Re-scan after fix to confirm
  7. πŸ“ˆ Metrics β€” Track MTTD (Mean Time to Detect) and MTTR (Mean Time to Remediate)

Key metrics to track:


MetricTargetWhy
Scan coverage100% assetsNo blind spots
MTTD< 24 hoursFast detection
MTTR (Critical)< 48 hoursFast fix
MTTR (High)< 7 daysReasonable
False positive rate< 15%Efficiency
Patch compliance> 95%Hygiene

βœ… Summary & Key Takeaways

Vulnerability scanning essentials recap:


βœ… Vulnerability = Weakness that can be exploited by attackers

βœ… Scanning types β€” Network, Web App, Host, Database, Cloud

βœ… Tools β€” Nmap (network), OpenVAS (free), OWASP ZAP (web), Nessus (commercial)

βœ… Prioritize by CVSS + Exploitability + Asset Value

βœ… Remediate β€” Patch > Mitigate > Accept > Transfer

βœ… Continuous scanning, not one-time β€” new CVEs daily!

βœ… Credentialed scans find 60% more than non-credentialed

βœ… Track metrics β€” MTTD, MTTR, coverage, compliance


Remember: Vulnerability scanning is defense β€” nee find pannanum before hacker find pannan! πŸ”πŸ›‘οΈ

🏁 Mini Challenge

Challenge: Comprehensive Vulnerability Assessment


3-4 weeks time la vulnerability scanning end-to-end practice pannunga:


  1. Nmap Port Scan β€” Target system (lab environment) scan pannunga: nmap -sV -A 192.168.1.100. Open ports, services, OS detection β€” document pannunga.

  1. OpenVAS Scan β€” OpenVAS install pannunga (free, open-source). Vulnerable VM (Metasploitable) scan pannunga. Vulnerabilities identify, severity levels understand pannunga.

  1. Web Application Scan β€” OWASP ZAP download pannunga. Local web app scan pannunga. SQL injection, XSS, CSRF vulnerabilities find panna practice.

  1. Nuclei Templates β€” Nuclei tool install pannunga (modern vulnerability scanner). OWASP Top 10 templates use panni scan pannunga.

  1. Vulnerability Remediation β€” Each vulnerability analyze pannunga. Fix priority (CVSS score), implementation difficulty assess pannunga. Patches apply pannunga, rescan pannunga.

  1. Report Generation β€” Professional vulnerability assessment report create pannunga. Executive summary, detailed findings, remediation roadmap β€” include pannunga.

  1. Metrics Tracking β€” Scan results track pannunga (Excel spreadsheet). MTTD (mean time to detect), MTTR (mean time to remediate) calculate pannunga.

Certificate: Nee vulnerability assessment expert! πŸ”βš οΈ

Interview Questions

Q1: Vulnerability scanning vs penetration testing β€” difference?

A: Scanning = automated tools, point-in-time snapshot, identify vulnerabilities. Penetration testing = manual, extensive, exploitation attempt, business impact. Scanning = baseline, pentest = deep dive. Both important.


Q2: False positives vulnerability scanning la β€” epdhi manage?

A: Validation important β€” scanner result verify pannunga manually. Custom rules create pannunga false positives reduce panni. Whitelisting deprecated/false vulnerabilities. Regular tool updates. Experienced analyst review pannunga.


Q3: CVSS score β€” epdhi prioritize?

A: CVSS 9+: Critical, immediate fix. CVSS 7-8: High, weeks la fix. CVSS 4-6: Medium, months la address. CVSS <4: Low, routine patching. But context matter β€” critical system la medium vulnerability kuda high priority.


Q4: Credentialed vs non-credentialed scanning?

A: Non-credentialed = attacker view (external). Credentialed = internal view (employees). Both needed β€” 60% more vulnerabilities credentialed la find aagum. Scanning frequency β€” monthly minimum, weekly ideal for critical systems.


Q5: Vulnerability management program β€” enterprise level setup?

A: Asset inventory maintain pannunga. Scanning policy establish pannunga. Prioritization framework (risk-based). Remediation process define pannunga. Metrics track pannunga. Regular reporting executive level la. Continuous improvement.

Frequently Asked Questions

❓ Vulnerability scanning vs penetration testing enna difference?
Vulnerability scanning automated tool use panni weaknesses find pannum. Penetration testing la actual ah exploit panni attack simulate pannuvanga. Scanning = finding locks, Pentesting = trying to pick them.
❓ Evlo frequently scan pannanum?
Minimum monthly once full scan pannanum. Critical systems ku weekly recommended. Major changes (new server, update) ku appove scan pannunga.
❓ Free vulnerability scanners irukka?
Aamaa! OpenVAS (free, open source), Nmap (network scanning), Nikto (web servers), OWASP ZAP (web apps) β€” ivanga ellam free and powerful.
❓ Scan pannina legal ah?
Un own systems and authorized systems mattum scan pannunga. Permission illama vera systems scan pannuradhu illegal β€” Computer Misuse laws apply aagum!
🧠Knowledge Check
Quiz 1 of 2

CVSS score 9.5, actively exploited in the wild, internet-facing server β€” what should you do?

0 of 2 answered