Here are some guidelines you can follow when scanning for vulnerabilities:
- When scanning for vulnerabilities, use an actual vulnerability scanner rather than a generic port scanner.
- If you are scanning for compliance, involve your legal team.
- If possible, use credentialed scans to probe further into your target.
- When scanning different device or application types, use tools that are specifically designed for your target type.
- Scan firewalls to see which ports are permitted. If necessary, use specially crafted packets to evoke additional information from the firewall.
- Use tactics such as encryption, trusted ports, or slow speeds to evade packet inspection.
- Scan wireless access points to determine security settings and encryption protocols.
- Educate yourself on identifying and mitigating container security risks.
- Keep in mind that most vulnerability scanning can only identify known security weaknesses.
- Do not depend on any one vulnerability scanner to discover all of your vulnerabilities.
- Keep in mind that vulnerability scanners often produce false positives. Be sure to validate your scan results with an exploit tool such as Metasploit.