[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-Disclosure] Top 15 Reasons Why Admins Use Security Scanners
- To: full-disclosure@xxxxxxxxxxxxxxxx
- Subject: Re: [Full-Disclosure] Top 15 Reasons Why Admins Use Security Scanners
- From: Jeremiah Cornelius <jeremiah@xxxxxxx>
- Date: Wed, 28 Apr 2004 19:28:20 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Wednesday 28 April 2004 15:35, nicolas vigier wrote:
> you get too much false positive because nessus only
> try to find the version and don't really test the vulnerability.
> I think the right way to do it is to use a scanner which will use
> an exploit to test the vulnerability. Unfortunately an exploit is
> not always avaible for every vulnerability.
This depends on the individual NASL script. Safe-checks only read banners,
port combinations, etc.
There is nothing preventing a NASL check from mimicking exploit behavior. For
instance, some of the DoS checks are canned 'sploits. There are unsafe SMTP
checks that will send mail to a file in the /etc or /var/log hierarchies.
This does not rely on banners, but behaviors. You could adjust the NASL to
do real harm to a vulnerable system.
True, Nessus doesn't run codes for a remote shell against indications of of a
buffer overflow. That's when judicious manual checking is called for - where
the tool leaves off.
Admins are in a privileged position to do these checks - as opposed to the
pen-test auditor whos hand checks require adoption of invasive behavior.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFAkGhNJi2cv3XsiSARAsqQAJ4mFG2DYPvMKsshYJNcpsPz669vwACgjhbo
Il5M+As7tDyluevsvYBQt5g=
=jYUS
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html