Penetration Testing mailing list archives

RE: Vuln Scanner


From: "Jarmon, Don R" <Don.Jarmon () Intergraph com>
Date: Sat, 29 Oct 2005 07:17:00 -0500

GFI LANGuard

-----Original Message-----
From: Michael Gargiullo [mailto:mgargiullo () pvtpt com] 
Sent: Friday, October 28, 2005 1:43 PM
To: pen-test () securityfocus com
Subject: Vuln Scanner

I have a client that states in his RFP that we run nessus, and at least
one other vulnerability scanner to compare the output.

 

Does anyone here know of an inexpensive vulnerability scanner, that:

 

A)      Is as effective as nessus.

B)      Doesn't cost nearly as much as say ISS or SAINT (free would be
good).

C)      Doesn't use nessus plugins (like x-scan).

 

-Mike




----------------------------------------------------------------------------
--
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are

futile against web application hacking. Check your website for
vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers
do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
----------------------------------------------------------------------------
---

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


Current thread: