Look at the product Retina from www.eeye.com . It's one of the best security scanners out there.
"Retina includes vulnerability auditing modules for many systems and services. These include: NetBIOS, HTTP, CGI and WinCGI, FTP, DNS, DoS vulnerabilities, POP3, SMTP, LDAP, TCP/IP, UDP, Registry, Services, Users and Accounts, password vulnerabilities, publishing extensions, and more." "Retina runs on the Windows NT platform, but unlike its peers, it is not limited to only scanning Windows NT networks for vulnerabilities. In fact Retina has the ability to scan all types of operating systems, including most Unix operating systems (Solaris, Linux, *BSD etc...) and networked devices (routers, firewalls etc...) that run home grown operating systems." -----Original Message----- From: Daniel Hay [mailto:[EMAIL PROTECTED]] Sent: Wednesday, March 13, 2002 8:48 AM To: [EMAIL PROTECTED] Subject: Vulnerability Scanning large networks Hi, I was hoping to get some advice on vulnerability scanning large networks, currently i need to scan about 9,000+ hosts in a mixed OS ( windows * / linux / unix / AIX etc etc you name it i'm sure we have it here someplace hehe :)) network, at the moment im attempting to use various nessus scans to do it in 450 ip chunks its just not an idea situation as i'm sure you guys can can see, however when ever i do more than 450 nessus & nessusd constantly core dump, so i was hoping to get some feedback on other ways/products that are in use to do something similar to this. Cheers Danny This electronic mail message and any attached files contain information intended for the exclusive use of the individual or entity to whom it is addressed and may contain information that is proprietary, privileged, confidential and/or exempt from disclosure under applicable law. If you are not the intended recipient, you are hereby notified that any viewing, copying, disclosure or distribution of this information may be subject to legal restriction or sanction. Please notify the sender, by electronic mail or telephone, of any unintended recipients and delete the original message without making any copies.
