Look at the product Retina from www.eeye.com .  It's one of the best security scanners 
out there.

"Retina includes vulnerability auditing modules for many systems and services. These 
include: NetBIOS, HTTP, CGI and WinCGI, FTP, DNS, DoS vulnerabilities, POP3, SMTP, 
LDAP, TCP/IP, UDP, Registry, Services, Users and Accounts, password vulnerabilities, 
publishing extensions, and more."

"Retina runs on the Windows NT platform, but unlike its peers, it is not limited to 
only scanning Windows NT networks for vulnerabilities. In fact Retina has the ability 
to scan all types of operating systems, including most Unix operating systems 
(Solaris, Linux, *BSD etc...) and networked devices (routers, firewalls etc...) that 
run home grown operating systems."


-----Original Message-----
From: Daniel Hay [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, March 13, 2002 8:48 AM
To: [EMAIL PROTECTED]
Subject: Vulnerability Scanning large networks


Hi,
        I was hoping to get some advice on vulnerability scanning large 
networks, currently i need to scan about 9,000+ hosts in a mixed OS ( 
windows * / linux / unix / AIX etc etc you name it i'm sure we have it 
here someplace hehe :)) network, at the moment im attempting to use 
various nessus scans to do it in 450 ip chunks its just not an idea 
situation as i'm sure you guys can can see, however when ever i do more 
than 450 nessus  & nessusd constantly core dump, so i was hoping to get 
some feedback on other ways/products that are in use to do something 
similar to this.

Cheers

Danny





This electronic mail message and any attached files contain information intended for 
the exclusive use of the individual or entity to whom it is addressed and may contain 
information that is proprietary, privileged, confidential and/or exempt from 
disclosure under applicable law.  If you are not the intended recipient, you are 
hereby notified that any viewing, copying, disclosure or distribution of this 
information may be subject to legal restriction or sanction.  Please notify the 
sender, by electronic mail or telephone, of any unintended recipients and delete the 
original message without making any copies.

Reply via email to