Network Vulnerability Assessment Software

There exist a variety of tools that can be used to gauge the security of an entity's network and the hosts that are attached to that network.  These tools can be broken down into five major categories: password crackers, port scanners, general network vulnerability software, war dialers, and intrusion detection systems.  Password crackers are just what they sound like, they can be used to determine weak passwords on your system.  Port Scanners are used to find exploits in services running on certain ports, they can also be used to determine the Operating System that is running on the box.  Network vulnerability software provides more features than a typical port scanner even though most do employ some type of port scanning.  It can scan a network of machines and determine vulnerable services that are running, the operating systems being run, out of date patches and other possible entries to hosts on the network.  Most then allow for a report to be generated that lists the vulnerabilities.  War dialers are used to find modems that allow outside access to a network.  These devices will dial a range of phone numbers and see if it can find any devices that will handshake.  Intrusion Detection Systems are systems that are continuously run on the network and alert system/network administrators of potential illegal access to the network or a host.  Intrusion detection systems can also take steps to prevent illegal access to the network/host.  These tools can be used by companies to test their networks and fix potential hacks before a malicious individual finds them.  Many companies employ security experts to perform "penetration testing" on their networks to see how secure they are.  However, the use of these tools is often exploited and it should be stressed that they are not toys.  You could get yourself in serious trouble by using many of these tools without proper permission.  The following links provide a good overview of the types of tools available and testing methods that can be employed to get a feel for how secure a network or host really is.  The next two sections include links to commercial and freeware tools.  Many of these links provide access to more information about how these technologies work.  I only included links to vulnerability scanners and intrusion detection packages.  The last section includes links to organizations and web pages that provide security information.  These agencies provide advisories, publications, vulnerability dictionaries/databases and other valuable security information.  These are great places to look for more information on security and for notifications on potential vulnerabilities.   

Commercial Software Packages

Freeware

Vulnerability Advisory Centers