At the University of Houston, scanning is done by authorized UIT security personnel to identify computer resources which are vulnerable to hackers.
To Request Scanning Services
Anyone on campus that needs vulnerability or web application scanning should email email@example.com or call (832) 842-4695.
Types of Scanning Services
Vulnerability scanning is a computer program designed to assess computers, computer systems, networks or applications to determine if a computer is vulnerable to certain over the network attack methods. This can be carried out on both wired and wireless networks.
Web application security scanning
Web sites are most vulnerable to attacks from hackers. Web sites that contain applications like carts, forms, login pages, dynamic content are prone to attacks. Web applications are generally deployed on port 80 which has to remain open and hence provide no protection. Some of the examples of web vulnerabilities are
- SQL injection
- Cross Site Scripting (XSS)
- Remote Code execution
- Format String Vulnerabilities
- Username Enumeration
- Can I scan on my own?
- The network at UH belongs to UH and only authorized person may do scans. Persons doing unauthorized scan are subject to university sanctions or legal actions. If you have to ask if you can do a scan then you are not authorized.