Vulnerability Analysis

Here is a collection of resources and news for vulnerability research and some free vulnerability scanners.

Useful resources and information for vulnerability research and news

Packet Stormarrow-up-right is a cybersecurity resource hub, offering tools, vulnerabilities, and security articles for professionals.

DARKREADINGarrow-up-right is a cybersecurity news site, reporting on threats, breaches, and trends for security experts.

Trend Microarrow-up-right is a cybersecurity company with insights, research, and services to protect against online threats.

Security Magazinearrow-up-right covers various security topics for professionals, including physical and cyber security.

Pentest Magazinearrow-up-right is dedicated to ethical hacking and penetration testing, providing tutorials and tools.

Krebs on Securityarrow-up-right is a renowned cybersecurity blog by Brian Krebs, known for investigative reporting on cybercrime and security incidents.

Schneier on Securityarrow-up-right is the blog of Bruce Schneier, a prominent security expert, offering insightful analysis and commentary on security-related topics.

CVE

CVE is a dictionary of publicly disclosed cybersecurity vulnerabilities. It catalogs specific instances or examples of known vulnerabilities in software, hardware, or systems, assigning each vulnerability a unique identifier (CVE ID)

Links to CVE databases:

MitreCVEarrow-up-right

NIST CVEarrow-up-right

CWE

CWEarrow-up-right is a community-developed list of common software and hardware weaknesses and vulnerabilities. It categorizes and describes weaknesses in software and systems, focusing on the root causes of vulnerabilities rather than specific instances or examples of vulnerabilities.

Vulnerability Scanners

I'll only consider free vulnerability scanners here.

OpenVas

OpenVAS is a full-featured vulnerability scanner. Its capabilities include unauthenticated and authenticated testing, various high-level and low-level internet and industrial protocols, performance tuning for large-scale scans and a powerful internal programming language to implement any type of vulnerability test.

Here is a guide on how to set it up on Kali: Guidearrow-up-right

Last updated