Checking volunerability of an networking application

What software can I use to explore the volunerability of an application if I know its port number.  I am trying to find out how I can make my application  immune to hacker attack.

My application is running under unix type environment.
tommym121Asked:
Who is Participating?

Improve company productivity with a Business Account.Sign Up

x
 
btanConnect With a Mentor Exec ConsultantCommented:
Active or passive scan is good depends on intrusive level. Suggest you check out nmap which well supported and documented to fulfill your scanning.

http://nmap.org/book/vscan.html
0
 
ahoffmannConnect With a Mentor Commented:
nmap will be first choice, but if it uses HTTP then things are not that simple
0
 
btanConnect With a Mentor Exec ConsultantCommented:
The best case is to do dynamic test and static code scan and manual probes..but do know that production scan and development environment scanning can have different result.  It is never going to be 100% secure or bugless. At least the common low hanging fruits can be surface and rectified.
0
NEW Internet Security Report Now Available!

WatchGuard’s Threat Lab is a group of dedicated threat researchers committed to helping you stay ahead of the bad guys by providing in-depth analysis of the top security threats to your network.  Check out this quarters report on the threats that shook the industry in Q4 2017.

 
GarethMConnect With a Mentor Commented:
There is a wealth of security testing resources contained in the BackTrack Linux distribution: http://www.backtrack-linux.org/. Some of these may be useful to find common issues. Also, be aware that lots of other factors will contribute to the overall security of the application and you should cover the whole environment in your assessment. For example, be sure that the application is installed on an up-to-date OS, that patches are installed, unnecessary services are removed and so on.
0
 
jlevieConnect With a Mentor Commented:
There are some tools that can be used to look for common vulnerabilities in an application. But real security comes from code review done with a great deal of paranoia.
0
 
tommym121Author Commented:
Thanks
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.