Vulnerability Scanning Types
Unauthenticated (non-credentialed) scan: the scanner connects to targets without login credentials — simulates what an external attacker sees. Identifies open ports, service versions, and externally visible vulnerabilities. Limited visibility — misses many internal vulnerabilities that require login access.
Authenticated (credentialed) scan: the scanner logs into target systems with administrative credentials and inspects internal configuration, installed software versions, patch status, and registry settings. More comprehensive than unauthenticated scans — finds vulnerabilities that require local access. Results may have fewer false positives.
Agent-based scanning: a lightweight agent installed on each device collects vulnerability data locally and reports to the central scanner. Works even when devices are offline or behind firewalls. Continuous scanning rather than periodic scheduled scans.
Scanning Tools and CVE
Nessus: industry-leading commercial vulnerability scanner (Tenable). Large plugin database — identifies thousands of vulnerabilities across operating systems, applications, and network devices. OpenVAS: open-source vulnerability scanner (Greenbone). Qualys: cloud-based SaaS vulnerability management. Rapid7 InsightVM/Nexpose: enterprise vulnerability management.
CVE (Common Vulnerabilities and Exposures): the public vulnerability database. Each vulnerability gets a unique CVE ID (CVE-YYYY-NNNNN). Scanners check targets against CVE database entries. CVSS (Common Vulnerability Scoring System) assigns severity scores (0–10). Scanners use CVSS to prioritize remediation — address Critical (9–10) and High (7–8.9) first.
Penetration testing vs vulnerability scanning: vulnerability scanning identifies and reports weaknesses without exploiting them. Penetration testing (ethical hacking) actively attempts to exploit vulnerabilities to prove they are real risks. Pen testing requires explicit written authorization.