Skip to main content
DFIRLab
Research
Intel BriefingsThreat Actors
File AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

Wiki/Threat Intelligence

Vulnerability Scanning

The automated process of identifying known security weaknesses in systems, applications, and network infrastructure by comparing discovered services against vulnerability databases.

Definition

Vulnerability scanning is the systematic examination of an asset's software, services, and configuration to identify weaknesses that could be exploited. Scanners fingerprint running software versions and cross-reference them against databases of known vulnerabilities — primarily the National Vulnerability Database (NVD) using CVE identifiers — to produce a list of confirmed or probable weaknesses requiring remediation.

Why It Matters

The majority of successful breaches exploit known vulnerabilities for which patches already exist. Vulnerability scanning answers the question: what known-bad software is running in my environment right now? Without continuous scanning, organizations operate blind to their own exposure. Scanning is also the baseline for regulatory compliance frameworks including PCI DSS, ISO 27001, and SOC 2, all of which require periodic vulnerability assessments.

How It Works

A scanner probes target hosts using network-based techniques or authenticated agent-based collection to enumerate installed software, running services, open ports, and configuration settings. Each discovered component is matched against a vulnerability database. Findings are assigned a severity score — typically using CVSS — indicating exploitability and potential impact. Results are aggregated into reports that prioritize which vulnerabilities to remediate first based on severity, asset criticality, and whether public exploits exist.

DFIR Platform

Exposure Scanner

The DFIR Lab Exposure Scanner identifies known CVEs associated with services and software versions discovered across a target's attack surface. By aggregating data from multiple intelligence providers, it surfaces vulnerable components without requiring authenticated access to target systems

View Documentation

Related Concepts

Attack Surface ManagementOpen PortsIndicators of Compromise

Try these concepts in practice

Free tier with 100 credits/month. No credit card needed.

Start Free