top of page

THREAT VULNERABILITY ASSESSMENT

Our Threat Vulnerability Assessment, detects open TCP ports, running services (including their versions) and does OS fingerprinting on a target IP address or hostname

Our exclusive scanner allows us to easily map the network perimeter of a company, check firewall rules and verify if your services are reachable from the Internet. Based on Nmap Online, it performs accurate port discovery and service detection.

Threat Vulnerability Assessment

External Network Scanner

Malicious client applications (ex. scripts, bots, malware) often exploit code found in the server software that let them get unauthorized access on the remote machine. This is one of the reasons why testing all ports is vital to achieving an in-depth security verification.

The main advantage of using an online version/ of the Nmap port scanner versus using it on your local machine is that it gives you an external view of your systems as they are seen by any hacker from the Internet. If you do the same scan from your internal network you may obtain different results because of various firewalls and network restrictions. 

Laptop_Aplha.png

list of MOST COMMON PORTS tested

21 - FTP (File Transfer Protocol)
22 - SSH (Secure Shell)
23 - Telnet
25 - SMTP (Mail)
80 - HTTP (Web)
110 - POP3 (Mail)
143 - IMAP (Mail)
443 - HTTPS (Secure Web)
445 - SMB (Microsoft File Sharing)
3389 - RDP (Remote Desktop Protocol)


Our Network Scanner allows custom portscans with specific parameters, for example:

Specify custom TCP ports to scan (1-65535)
Enable/disable service detection
Enable/disable operating system detection
Enable/disable host discovery
Do Traceroute

Threat Vulnerability Assessment
NetWorkScanner
bottom of page