Top 10 Vulnerability Scanners

来源:百度文库 编辑:神马文学网 时间:2024/04/28 18:38:58
After the tremendously successful2000 and2003 security tools surveys,Insecure.Org is delighted to release this 2006 survey. I (Fyodor) asked users from thenmap-hackers mailing list to share their favorite tools, and 3,243 people responded. This allowed me to expand the list to 100 tools, and even subdivide them into categories. This is the category page for vulnerability scanners -- the full network security list isavailable here. Anyone in the security field would be well advised to go over the list and investigate tools they are unfamiliar with. I discovered several powerful new tools this way. I also point newbies to this site whenever they write me saying “I don‘t know where to start”.
Respondents were allowed to list open source or commercial tools on any platform. Commercial tools are noted as such in the list below. No votes for theNmap Security Scanner were counted because the survey was taken on a Nmap mailing list. This audience also biases the list slightly toward “attack” hacking tools rather than defensive ones.
Each tool is described by one ore more attributes:Did not appear on the2003 list
Generally costs money. A free limited/demo/trial version may be available.
Works natively on Linux
Works natively on OpenBSD, FreeBSD, Solaris, and/or other UNIX variants
Works natively on Apple Mac OS X
Works natively on Microsoft Windows
Features a command-line interface
Offers a GUI (point and click) interface
Source code available for inspection.
Please send updates and suggestions (or better tool logos) toFyodor. If your tool is featured or you think your site visitors might enjoy this list, you are welcome to use ourlink banners. Here is the list, starting with the most popular: