The host-based vulnerability assessment works on a client-server model where the client performs the scan and sends the report back to the server/manager. A host-based scanner is installed on every host on the system that you want to monitor. Host-based vulnerability assessment tools can provide an insight into the potential damage that can be done by insiders and outsiders once some level of access is granted or taken on a system. They are generally useful for discovering weaknesses behind an initial access control setting. Network-based scanners cannot perform a deep low-level security check because they do not have direct access to the file system on the target host. A few famous open source tools include OSSEC, Prelude ...
Host-based assessment
Get Practical Network Scanning now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.