.

Tuesday, October 8, 2019

Network Scanning Packages Essay Example | Topics and Well Written Essays - 750 words

Network Scanning Packages - Essay Example This is because they normally make use of command lines such as the ones found in Command Prompt of the Windows Operating System. Such cannot be said to be easy to operate following the complexity of commands required to run it. However, a graphical user interface in OpenVas does just the opposite by having the commands automated, and all that the user has to keep in mind is how to run the scanner and not the commands that launch different scans. In addition, OpenVas includes a central server, which allows users to run a wide range of network vulnerability tests that are not found on other programs. The included server runs network vulnerability tests (NVT) that are written in Nessus Attack Scripting Language (NASL) (Naraine, 2008). The above is an active attack mode that attempt to penetrate actively networks to find potential loopholes and vulnerabilities. In addition, OpenVas frequently updates the NASL for improved efficiency in finding vulnerabilities that come up from time to t ime. Still on the graphical user interface, the simplicity in navigating through the different features allows the user to manage vulnerability scan sessions. In its cost, there have been recent changes in the previously free to use application. This is due to the commercial approach adopted more recently with the release of OpenVas 3.0 in the year 2005 by charging NVT upgrades and application of restrictions in the free package (Kereki, 2008). For this reason, OpenVas is no longer free needing financial input for acquisition, which is not the case for Nexpose. On the other hand, Nexpose charges a significant amount for those that require a fully functional network scanner. This is, unlike the OpenVas that only has its earlier less functional versions provided on a free license. In the case of Nexpose, it can be acquired for no cost, but with reduced functionality concerning its power in scanning for enhanced and advanced vulnerabilities (Skyler, 2010). Despite OpenVas being a

No comments:

Post a Comment