Security scan with, or without, IP whitelisting in the firewall and isn’t that introducing a weak point?

In case of an automated security scan is it more desirable to get the scanner IP addresses whitelisted in order to possibly find vulnerabilities behind the firewall, or to scan in front of/against the firewall?

Example scena… Continue reading Security scan with, or without, IP whitelisting in the firewall and isn’t that introducing a weak point?

Determining false positives when scanning for live hosts with Nmap

When doing a vulnerability assessment on a large network, it seems general practice to determine which hosts on the network are live.

This can be done in various ways. From what I have read it is good to do some ICMP scans, perhaps use a … Continue reading Determining false positives when scanning for live hosts with Nmap