Network Vulnerability Scanning

Identify the vulnerabilities, misconfigurations,
and malware that malicious attackers could
use to penetrate your network.

Understand the risk posed to you, and your customers, by the vulnerabilities present in your network.

Network Vulnerability Scanning:
An Affordable Cybersecurity Solution

Network vulnerability scanning provides companies with the opportunity to identify active IP addresses and scan them using industry-leading tools with the ultimate goal of discovering vulnerabilities in both internal and external networks—affordably. Throughout the vulnerability scanning process comprehensive automated testing will be used to identify as many network related vulnerabilities as possible. At MainNerve, all of our vulnerability scans go beyond international standards such as NIST, and come with a detailed final report that includes an executive summary, a listing of risk ratings, remediation recommendations, and more.

Identify Documented Vulnerabilities
and Exposures within your Network

One of the most significant challenges in securing business environments is having the knowledge required to identify vulnerabilities, prioritize which are the greatest threats posed to your environment, and then remediate any discovered vulnerabilities. This is where MainNerve’s vulnerability scanning services come into play. Our industry-leading scanning tools enable you to perform an in-depth scan of all external, Interned-exposed and internal systems for vulnerability identification and verification.

Test your network against:

Viruses

Malware

Backdoors

Botnet Infections

Known/Unknown Processes

Malicious Content

And more…

THE MAINNERVE PROCESS

The dynamic nature of today’s cloud and on-premise network environments requires persistent vulnerability scanning to defend against the evolving threat landscape and innovative malicious hackers. MainNerve’s network vulnerability scanning services allow you to accurately scan your network, servers, and desktops for security vulnerabilities with the overarching goal of improving your security posture and remediating network vulnerabilities with confidence.

Computer chip

PLANNING

The planning phase of the network vulnerability scanning/assessment process includes communicating about on- and off-limit IPs, peers, and systems (Scoping), and the overall timeline of the network vulnerability scan or network vulnerability assessment.

Computer chip

HOST DISCOVERY

Host discovery is the first official stage of the network vulnerability scanning and network vulnerability assessment process. At MainNerve, we utilize active scanning and agent scanning to interactively communicate with targets on the network. Both active scanning and agent scanning are designed to craft packets and sent packets to remote hosts—and detect active IP addresses or “live hosts”. During the host discovery phase, servers, appliances, and other devices on the network are identified.

Computer chip

SERVICE ENUMERATION

Following the host discovery phase, service enumeration is performed. During this phase, identification of open ports and services available to each discovered system, such as mail and web servers, is performed. Essentially, service enumeration is the process of extracting user names, machine names, network resources, and other services from a system. All information gathered during this phase is used to identify the vulnerabilities or weak points in system security during the network scanning phase.

Computer chip

NETWORK SCANNING

During this core phase of the network vulnerability scanning and network vulnerability assessment process, MainNerve will scan external and/or internal IP addresses in order to identify active devices. If a device is online, the scanner records the IP address and continues to search for other active devices within the specified network range. From this point, MainNerve performs a port scan to determine what services are running on each active device. This helps the vulnerability scanner determine what types of vulnerability checks to run against a particular port. Following the port scan, all live hosts identified during the discovery phase are scanned with an industry-leading tool to identify vulnerabilities such as missed patches, server misconfigurations, and risky services. Note that vulnerability scanning performs a high-level scan, but does not perform an extensive scan potential vulnerabilities.

Computer chip

VERIFICATION

Following the network scanning phase, an expert Mainnerve cybersecurity engineer scores, ranks and identifies vulnerabilities using the Common Vulnerabilities and Exposures (CVE) dictionary and Common Vulnerability Scoring System (CVSS), industry standards for tracking and calculating vulnerability risks. For network vulnerability assessments, a MainNerve cybersecurity specialist will also perform a comprehensive review of the vulnerability scan results in order to verify or invalidate the findings.

Computer chip

REPORTING

At MainNerve, we consider the final phase of the network vulnerability scanning and network vulnerability assessment process, reporting, to be the most crucial and instrumental step. During this phase, we take great care to ensure we effectively communicate the value of our service and findings as thoroughly as possible. Our main goal is to ensure that all information from the vulnerability scan/assessment is clearly understood and that a roadmap toward remediation/mitigation is well defined. A comprehensive final report detailing all testing information along with a vulnerability analysis is securely delivered during this step. For network vulnerability assessments, a thorough review of all findings is also provided.

 

WANT TO LEARN MORE?

MORE INFORMATION

More About Network Vulnerability Scanning / Assessments

 

Overview

A network vulnerability scan / assessment is designed to identify live network hosts, operating systems, applications, and vulnerabilities with the use of automated scanning tools. Vulnerability scanning will provide an overall snapshot of the vulnerabilities present on your internal and external networks to assist in vulnerability risk management.

Vulnerability scanning solutions help organizations gather information regarding potential weaknesses by unearthing every type of weakness that could potentially make your environment susceptible to breach. It is important to note, however, that vulnerability scanning can’t produce substantial amounts of data for your IT staff to discern which results are truly a threat… but it does create a list of potential items to mitigate.

Note: For Network Vulnerability Assessments, a comprehensive review of all findings associated with the Network Vulnerability Scan is performed by a MainNerve cybersecurity engineer. In other words, Network Vulnerability Assessments provide a value-added benefit for clients that wish to have an added-layer of security review included with a Network Vulnerability Scan.

Why should I have a vulnerability scan / assessment performed?

You should have a vulnerability scan performed to detect items such as forgotten or missing patches, misconfiguration of servers or network devices that could lead to a vulnerability (e.g. outdated OS).

How often should I run a vulnerability scan / assessment?

  • Quarterly
  • After IT architecture changes or upgrades
  • New office startups
  • Policy changes

Internal vs. External: What’s the difference?

Internal Vulnerability Scanning / Assessments

Identifying live hosts and providing a risk rating of vulnerabilities on the internal (local area) network(s)

External Vulnerability Scanning / Assessment

Identifying live hosts and providing a risk rating of vulnerabilities on the external (public-facing) network(s)

What are the benefits?

A MainNerve network vulnerability scan/assessment provides you with an automated scan of all in-scope networks in order to identify known security.

  • Enumerate and identify networked systems
  • Identify misconfigured and unpatched systems
  • Determine remediation recommendations
  • Vulnerabilities classified in a rating system with severity levels of impact

*Note: When validating the vulnerabilities discovered, MainNerve manually reviews all discovered vulnerabilities. This reduces false positives and provides an actionable list of vulnerabilities for remediation.

Approach

MainNerve scans external and internal networks to identify active devices. If a device is online, MainNerve records the IP address and continues to search for other active devices within the network. MainNerve then performs a port scan to determine what services are running on each active device in order to help with determine what types of vulnerability checks to perform against a port.

Active systems, or “live hosts”, are subsequently scanned via a commercial scanning tool(s), to identify vulnerabilities such as missing patches, misconfigurations, and risky services. The results are analyzed and verified, if applicable, for relevance.

Methodology

In order to accurately measure/score the risk to the customer’s networks, MainNerve performs each and every network vulnerability scan / assessment using several frameworks (PCI, NIST) while utilizing the Common Vulnerability Scoring System Version 2 (CVSS v.2). CVSS v.2 is a widely-accepted standard for communicating the characteristics and impacts of IT vulnerabilities in organizations across the world. Its quantitative model ensures repeatable accurate measurement of vulnerabilities while enabling its users to see the underlying vulnerability characteristics that were used to generate the scores. The National Vulnerability Database (NVD) provides CVSS v.2 scores for almost all known vulnerabilities.

Phases

  1. Host Discovery
  2. Service Enumeration
  3. Network Scanning
  4. Verification
  5. Final Report

Deliverables – DL Sample Report

At MainNerve, the Reporting/Delivery phase of our network vulnerability scanning/assessment process is one we are incredibly proud of. We strive to effectively communicate the value of our service and findings—and provide you with the information you need to fix any identified vulnerabilities. A MainNerve Network Vulnerability Scan / Assessment Final Report includes:

  • Security Dashboard
  • Risk Classification and Scoring
  • Security Analysis
  • Technical Summary
    • Vulnerabilities by Severity
    • Live Hosts by Severity
    • Top 5 Most Vulnerable Hosts

In addition, MainNerve will include, in the report, a full listing of each scanned IP along with their Severity Level (SVE) Synopsis, Port Number, and a Solution to each issue found.

VALUE-ADDED SERVICES

Checklist

Network Penetration Testing

Network penetration testing assists with the identification and examination of vulnerabilities for external, Internet-facing and internal, intranet systems. A network pen test will help determine whether an attack can exploit and compromise targeted systems. Take the next step to improving your business’ security with a network pen test.

Checklist

Compliance Solutions

MainNerve’s compliance solutions are designed to help fill one of the biggest challenges for businesses: staying in alignment with the exhaustive list of Governance, Risk Management, and Compliance (GRC) requirements. From PCI DSS and HIPAA, to CJIS and FINRA, MainNerve can help your business navigate the GRC landscape with specialized penetration tests.

Checklist

Social Engineering

Social engineering, in the context of information security, is commonly defined as the of persuasion and/or manipulation techniques in order to influence people into performing actions or divulging confidential information. Ensure that your business is secure by testing and evaluating your employees against general phishing and “spear-phishing” attacks.