Skip to main content

What checks does Intruder run?

And how can you find them in the portal.

Updated yesterday

Number of checks included with each license & plan

Plan

Underlying scanning engine

Number + type of checks

What is covered

Essential

OpenVAS
(with an Infrastructure license)

>19,400 external OpenVAS checks

  • External infrastructure only

Cloud

OpenVAS + Nuclei

>19,400 external OpenVAS checks

>69,800 custom Nuclei external checks

  • External infrastructure only

Pro

Tenable
(with an Infrastructure license)

>17,700 external Tenable checks

>194,700 internal Tenable checks

  • External infrastructure

  • Internal endpoints: Windows, Linux + macOS

Enterprise + Vanguard

Tenable + Nuclei
(with an Infrastructure license)

>17,700 external Tenable checks

>194,700 internal Tenable checks

>69,800 custom Nuclei external checks

  • External infrastructure

  • Internal endpoints: Windows, Linux + macOS

Available for purchase on any plan

OWASP ZAP
(with an Application license)

~100 zap web-application checks


+ relevant external checks

  • External infrastructure, including Web App and API servers

  • Internal endpoints: Windows, Linux + macOS

Types of checks:

Essential, Cloud, Pro, Enterprise, Vanguard (OpenVAS & Tenable External)

  • Unintentionally exposed systems
    Checks for software and services that are not recommended to be exposed to the internet

  • Information Leakage
    Checks for information leakage, which could be used by hackers to mount further attacks

  • Encryption weaknesses
    Checks for weaknesses in SSL/TLS implementations

  • Misconfigurations & common mistakes
    Checks for misconfigurations, security best practices, and common mistakes, such as exposing code repositories

  • Remote vulnerable Software and missing patches
    Checks (from an external perspective) for software with publicly known vulnerabilities

Pro, Enterprise, Vanguard (Tenable Internal)

These plans also include internal scanning (via an agent) for Linux, Windows, and macOS devices. This offers more comprehensive checks as it has more privileged access to the machine. Some of the things we check you for include:

  • Local misconfigurations & common mistakes

    No matter how secure the software package is, it can still be configured insecurely - for example, leaving default passwords set up, inadvertently leaving admin pages exposed, and not enabling encryption.

  • Vulnerable software packages & missing patches
    Check your internal machines for vulnerable versions of software packages, frameworks, and components, including missing OS patches, software updates, and server packages.

Cloud, Enterprise, and Vanguard (Nuclei)

The checks included in these three plans are enhanced further, courtesy of a second scanner. Nuclei covers some of the same vulnerabilities outlined above, but also checks for:

  • Out-of-band vulnerabilities

    These are weaknesses that can't be exploited in standard HTTP request/response communication; instead, they leverage non-standard forms of communication, such as blind XSS or email header injection, to retrieve/obtain information of a sensitive nature.


Application licenses (on all plans) cover:

  • OS command injection

  • Cross-site scripting (XSS), persistent/stored, reflected, and DOM-based XSS

  • SQL injection against multiple types of databases

  • NoSQL injection, specifically against MongoDB

  • LDAP injection

  • XPath injection

  • Server-side includes

  • Server-side code injection

  • Java serialisation weaknesses

  • Buffer and integer overflows

For a more detailed explanation of the features included in each plan, head to this article: Which service is right for me?


Where can I see the full list of checks you run?

If you have access to the portal, you can see exactly what we test you for. Just head to the dashboard and click Checks available to the left of the Activity feed. You will also be able to see the number of checks we have added in the last 90 days:

Here you can see all the checks that will be run on your targets, with the option to filter by:

  • CVSS Rating (Critical, High, Medium, Low)

  • Category (Attack surface reduction, Compromise, Cryptographic Weaknesses, Information Disclosure, Misconfiguration & Common mistakes, Vulnerable Software, Web Application Vulnerabilities)

  • Check type (Authenticated, Internal, External, Cloud Security)

Alternatively, you can search by CVE or check name.

Essential Plan (OpenVAS Checks)


Pro, Enterprise, Vanguard (Tenable Checks)

Enterprise and Vanguard (Nuclei & Tenable Checks)


Clicking on any check will take you to the Check Detail page, where you can see the targets that were scanned for this vulnerability, when they were last scanned for this, and whether or not they passed.


FAQs

Do all checks get executed all the time?

All checks are enabled, but this does not mean that all checks will be executed against every target. Instead, vulnerability scanners will 'fingerprint' the service(s) running on a target, and only run checks that are relevant to these service(s) - there’s little value in executing a check for a service that isn't running.

Can I export a list of all the checks?

Yes, absolutely! Just head to the Checks page and hit 'Export to CSV':


Did this answer your question?