At the University of Houston, scanning is done by authorized UIT security personnel so as to identify computer resources which are or might be vulnerable to hackers.
To Request Scanning Services
Anyone on campus requiring vulnerability or web application scanning should email email@example.com, or call (832) 842-4695.
Types of Scanning Services
Vulnerability scanning is a computer program designed to assess computers, computer systems, networks or applications to determine if a computer is vulnerable to certain over-the-network attack methods. This can be carried out on both wired and wireless networks.
Web Application Security Scanning
Websites are most vulnerable to attacks from hackers. Websites that contain applications like carts, forms, login pages, and dynamic content are prone to attacks. Web applications are generally deployed on port 80, which has to remain open and hence provides no protection. Some of the examples of web vulnerabilities are:
- SQL injection
- Cross Site Scripting (XSS)
- Remote Code execution
- Format String Vulnerabilities
- Username Enumeration
- Can I scan on my own?
- The network at UH belongs to the University and only authorized persons may do scans. Anyone caught doing unauthorized scans is subject to University sanctions or legal actions. If you have to ask if you can do a scan then you're most likely not authorized.