Import Data from 3rd Party Vulnerability Scanner

To run the Network Information Gathering step, follow this procedure:

  1. Make sure that the Network RPT is active.
  2. Click on Network Information Gathering to open up the Information Gathering Wizard and press Next to start.
  3. In the Target Discovery Method window, select the Import data from results of 3rd party scanner option.

    Target Discovery Method

    Press Next to continue.

  4. Select the third-party scanner from which you have an output file: Frontline, beSECURE or Other.

    Select one of the three available options and press Next to continue.

  5. Click the ellipsis () button and browse to and select the output file. The output format you are importing is dependent on the Vulnerability Scanner you selected in the previous step. Some scanners export their results to a file while others require you to access their data directly from the scanner's database.

    Input File

    Press Next to continue.

  6. The RPT will display a note about the results of external applications.

    Information

    Once you've read the note and are ready to proceed, press Next to continue.

  7. The RPT can check for Network Exposures in targeted hosts.

    Press Finish to continue without these additional items or check the Additional Options box and press Next.

    The Additional Options panel displays.

    Check for Network Exposures: An information security exposure is a system configuration issue or a mistake in software that allows access to information or capabilities that can be used by a hacker as a stepping-stone into a system or network. Whereas an information security vulnerability is a mistake in software that can be directly used by a hacker to gain access to a system or network.

    Press Finish and the module will run and information will be displayed on the Module Log Panel of the Console. You have now completed the first step of a Network Rapid Penetration Test.