Vulnerability scanning tools can be divided into five major categories based on the type of assets they scan:

  • Network-based scanners: These scanners are focused on identifying security vulnerabilities across a network, for example, unauthorised remote access servers. They assess practices and policies related to both public and private networks.

  • Host-based scanners: Such scanners identify vulnerabilities in workstations, servers and other network hosts. In the process, ports and services are scanned vigorously to provide greater visibility into the configuration settings and patch history of assets.

  • Wireless scanners: As the name suggests, these scanners specifically assess an organization’s wireless network. They successfully identify rogue access points making them crucial in today’s hybrid work environment.

  • Database scanners: These scanners identify security loopholes, such as misconfigurations, unsecure test environments and other weaknesses, in databases and big data systems.

  • Application scanners: This type of scanners play a crucial role in spotting vulnerabilities and misconfigurations in web applications used by an organisation.