“you can’t install any vulnerability scanning tools on any of my servers, and you can’t attach your own vulnerability scanning laptop to our network to use that, plus all our devices use full disc encryption so you can’t use boot discs, and you won’t have administrator rights on any corporate device we give you to install whatever you chose”
- where do you store and run your tools from? Are network admins typically like this? Can your tools be run as “portable apps” from a USB device? But then I guess there may also be USB policies restricting those. I don’t even know which tools are current, but I have always wondered how you get your armoury in a position to scan the network if the admin has demanded compliance and restraints.
Second part of the question - If there are ways to run vulnerability scanning tools direct from USB, can you recommend any free ones that will run from USB and produce a management freidnly vulnerability report on say a windows file server, so OS vulns, 3rd party software vulns, server software vulns etc. I am not bothered about exploit just a top level scan with potential issues.
Apologies for the basic level of the question but it is something that has always interested me. I guess from a network admin perspective their priority is keeping services online and at optimum performance, and not facilitating a platform for an ethical hacker. Please keep your answers pretty basic if at all possible and thanks in advance for any responses.