Vulnerability Scanning Michael Overton, Jason Ferris, Erik Brown.

Slides:



Advertisements
Similar presentations
The Operating System. What is an Operating System? The software which makes it possible for you to use your computer The software which starts up when.
Advertisements

Learning and Teaching Conference 2012 Skill integration for students through in-class feedback and continuous assessment. Konstantinos Dimopoulos City.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Vulnerability Assessments with Nessus 3 Columbia Area LUG January
Vulnerability Analysis Borrowed from the CLICS group.
Vulnerability Scanning at NU Robert Vance NUIT-Telecom & Network Services.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Compilation 2007 What Will You Learn? Michael I. Schwartzbach BRICS, University of Aarhus.
Northwestern University Information Technology UNITS Quarterly Meeting April 29, 2004 Network Security Roger Safian
VULNERABILITY SCANNERS By Ranga Roy Chowdary koduru Raveesh Chilakapati.
MERTIS: Modifiable, Extensible, Real-Time, Interactive Simulation Leandro Basallo ◦ Ryan Leigh ◦ Sam Talaie ◦ Regan Snyder with Dr. Sergiu Dascalu and.
Nessus – A Vulnerability Scanning Tool SUNY Technology Conference June 2003.
Computer Security and Penetration Testing
1 Presentation ISS Security Scanner & Retina by Adnan Khairi
Systems Software Operating Systems.
Vulnerability Types And How to Use Them.
Optimizing the Placement of Chemical and Biological Agent Sensors Daniel L. Schafer Thomas Jefferson High School for Science and Technology Defense Threat.
Biology Group 4 Project 2015 The Biological factors influencing performance in running a mile.
Security’s Final Fantasy Virtual Networks with User Mode Linux.
Virtualization Concept. Virtualization  Real: it exists, you can see it.  Transparent: it exists, you cannot see it  Virtual: it does not exist, you.
Crowdsourcing Predictors of Behavioral Outcomes. Abstract Generating models from large data sets—and deter¬mining which subsets of data to mine—is becoming.
A Framework for Automated Web Application Security Evaluation
NICE :Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
1 Nessus - NASL Marmagna Desai [592- Project]. 2 Agenda Introduction –Nessus –Nessus Attack Scripting Language [ N A S L] Features –Nessus –NASL Testing.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
How much architecture? Reducing the up-front effort MICHAEL WATERMAN, JAMES NOBLE, GEORGE ALLAN 1 Agile India 2012.
ISG We build general capability Introduction to Olympus Shawn T. Brown, PhD ISG MISSION 2.0 Lead Director of Public Health Applications Pittsburgh Supercomputing.
MIS Week 6 Site:
1 Vulnerability Analysis and Patches Management Using Secure Mobile Agents Presented by: Muhammad Awais Shibli.
Sharing APPL_TOP in R11i SURENDER SARA NCOAUG
Languages for Large Scale System Configuration John Hawkins Laboratory for the Foundations of Computer Science University of Edinburgh.
Quick start guide.  Create a workflow that the users can invoke for a particular customer (contact) which sets the priority of all the customer’s cases.
Professionalizing Penetration Tests CORE SECURITY TECHNOLOGIES © 2002  Professionalizing Penetration Testing.
Vulnerability Scan Assessment CS/IT 463 Bryan Dean Jonathan Ammons.
Get rid of troubles with Dr.Web CureNET! (Quick Start) If your house is on fire, you call for a fire brigade. When malware ravages through your network,
MapReduce Kristof Bamps Wouter Deroey. Outline Problem overview MapReduce o overview o implementation o refinements o conclusion.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Video Data Hiding using Forbidden Zone and Selective Embedding Submitted Under Team Members.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
VEGA TERRY WELLIVER GREG SYME JUANA WELLS NAVAL POSTGRADUATE SCHOOL.
MIS Week 6 Site:
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
C o n f i d e n t i a l 1 Course: BCA Semester: III Subject Code : BC 0042 Subject Name: Operating Systems Unit number : 1 Unit Title: Overview of Operating.
Vulnerability Assessment Using SAINT Jane Lemmer Information Security Specialist World Wide Digital Security, Inc.
CS Capstone OS Tools for OpenBSD Overview Presentation Team Fugu.
Module 5 – Vulnerability Identification  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
ISG We build general capability Introduction to Olympus Shawn T. Brown, PhD ISG MISSION 2.0 Lead Director of Public Health Applications Pittsburgh Supercomputing.
Development of a Web-Based Groupwork Assessment Tool Groupwork and Assessment Methods Demonstration of Software Discussion Hannah Whaley David Walker
IT 463 – Scanning Assignment Shane Knisley Erik Bennett.
-SHAMBHAVI PARADKAR TE COMP  PORT SCANNING.  DENIAL OF SERVICE(DoS). - DISTRIBUTED DENIAL OF SERVICE(DDoS). REFER Pg.637 & Pg.638.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
Smashing WebGoat for Fun and Research: Static Code Scanner Evaluation Josh Windsor & Dr. Josh Pauli.
CHAPTER 4 Methodology.
MySQL Exploit with Metasploit
Vulnerability Scanning with Credentials
IM-pack: Software Installation Using Disk Images
Systematic Manual Testing
Module 22 (Metasploit Introduction)
Intro to Ethical Hacking
Intro to Ethical Hacking
Analysis Report Kali Linux Metasploit
Metasploit Analysis Report Overview
SUSPICIOUS ACTIVITY DETECTION
CVE.
Partition Starter Find out what disk partitioning is, state key features, find a diagram and give an example.
Metasploit assignment – Arkadiy Kantor – Mis-5212
Hacking Windows Damian Gordon.
Presentation transcript:

Vulnerability Scanning Michael Overton, Jason Ferris, Erik Brown

Scanners Used Nessus ◦ Covered the most CVEs, but missed some things SARA ◦ Only gave a subset of Nessus’ results X-Scan ◦ Also only a subset of Nessus’ results ISS ◦ Not particularly useful (though only the trial) Retina ◦ Gave a lot of results ◦ Little intersection with the others

Network Scanned Small private network Benefits: ◦ Feasible to use trial version software ◦ Viable simulation of larger network running several machines using the same hard disk image Issues: ◦ Hard to gather statistically significant data

Reporting Methodology Compilation of scan results done by hand ◦ No team members particularly skilled in a viable scripting language ◦ Small number of reports made hand compilation more feasible, but it became quickly apparent that this method would not scale well Sorted final results both by majority voting and severity rating

Majority Voting Compiled the list of CVEs found by each scanner Re-ordered the report to indicate which CVEs were reported by the most number of scanners Top Five: CVERetinaNessusX-ScanSARAISS CVE xxxx CVE xxxx CVE xxxx CVE xx CVE xx

Severity Rating Cross correlated CVEs with CVSS base score Nessus and Retina covered the top five predominately Top Five: CVE CVSS Base ScoreRetinaNessusX-ScanSARAISS CVE xx CVE x CVE x CVE x CVE x

Metasploit Because of the small size of the network, the number of possible exploits were limited Many required user interaction or previously established host access Setup, but did not utilize a Samba exploit

Conclusions Nessus and Retina seemed to be the best of the ones we used Many scanners seemed to focus on detecting vulnerabilities specifically not detected by other scanners, requiring the use of many scanners to detect most vulnerabilities Many frivolous “vulnerabilities” detected, making it difficult to get useful results