What types of port scans are supported?
This services starts with a conventional TCP connect scan and performs many follow-on probes. It checks for vulnerability to denial of service through SYN (flooding), FIN, Fragmented packets and many other methods. Other weaknesses EAPS identifies include unnecessary network services, public machine names or usernames, guest accounts, and routers with weak configuration protection. It reports on obsolete software. EAPS sees that a resource (a disk, spool or printer) is visible from the Internet for a hacker to exploit and tells you when your DNS service is open to abuse. EAPS finds many more types of vulnerabilities with more being added continually.