Download presentation
Presentation is loading. Please wait.
Published byTheresa Howard Modified over 9 years ago
1
Vulnerability Assessment Using SAINT Jane Lemmer Information Security Specialist World Wide Digital Security, Inc. lemmerj@wwdsi.com
2
June 16, 19992 Outline The Problem The First Solution The Second Solution Other Uses for SAINT What’s Next Conclusions
3
June 16, 19993 The Problem Large network 7 Class B subnets, over 20 Class C subnets No central management Some resistance to “outsiders” How do we do a vulnerability assessment?
4
June 16, 19994 The First Solution The Scanning Tool The Scanning Method Results Problems Lessons Learned
5
June 16, 19995 The First Solution Conducted a comparison of several network based vulnerability assessment tools Internet Security Scanner Kane Security Analyst SATAN Nessus, and a few others The Scanning Tool
6
June 16, 19996 The First Solution Chose SATAN, with COAST extensions free fairly easy to use sufficient for providing a first look at overall network vulnerability The Scanning Tool
7
June 16, 19997 The First Solution The Scanning Method
8
June 16, 19998 The First Solution Results Lasted three weeks Approximately 20,000 potential hosts interrogated Found about 5,000 hosts with services Inexpensive (almost automatic)
9
June 16, 19999 The First Solution Took almost a month to process the results into a useable format Missed many hosts (DHCP, hosts not in DNS, especially Linux boxes) Organizational problems (results not getting to the right people) Scapegoats for a host of network problems Problems
10
June 16, 199910 The First Solution DNS method is not finding all the hosts SATAN is not current Report generation takes too long We need the following: a new scanning tool a new scanning method a new reporting method Lessons Learned
11
June 16, 199911 The Second Solution The Scanning Tool The Scanning Method Results Problems Lessons Learned
12
June 16, 199912 The Second Solution An updated version of SATAN Added many new tests Added a new attack level Changed how vulnerable services are categorized Works in firewalled environments Identifies Windows boxes Developed extensive tutorials for each vulnerable service Developed an in-house tool to help with reports The Scanning Tool
13
June 16, 199913 The Second Solution The three “r” services (rlogin, rshell, rexec) Vulnerable CGIs IMAP vulnerabilities SMB open shares Back Orifice and NetBus ToolTalk Vulnerable DNS servers rpc.statd service UDP echo and/or chargen IRC chat relays The Scanning Tool
14
June 16, 199914 The Second Solution The Scanning Method
15
June 16, 199915 The Second Solution Results Lasted two months Almost 500,000 potential hosts interrogated Found many more hosts approximately 7,000 boxes with services approximately 4,000 boxes with no services almost 8,000 Windows boxes More costly (labor intensive)
16
June 16, 199916 The Second Solution Scanning takes longer Difficult to compare results with previous scan Organizational problems (results still not getting to the right people) Caused some problems with NT boxes Still a scapegoat for network problems Problems
17
June 16, 199917 The Second Solution New method finds more hosts but takes longer SAINT needs to be continually updated Scanning can help improve the tool Still need to work on reporting results Lessons Learned
18
June 16, 199918 Other Uses for SAINT SAINT gathers a lot of information that is not reported used to produce a list of UNIX hosts by OS type used to identify web servers used to identify routers Quick scans of a host or subnet
19
June 16, 199919 Other Uses for SAINT Investigating Incidents
20
June 16, 199920 What’s Next Continue using SAINT for large scans Supplement SAINT with more robust tools Scans have led to development of an IRT defining policy defining standard security configurations helping users secure hosts developing centralized site for security information
21
June 16, 199921 Conclusions SAINT is a useful tool for scanning large networks Results give a good first look at how vulnerable you are SAINT must be continually updated better OS typing better reporting method to compare scan results
22
June 16, 199922 Contact Information World Wide Digital Security, Inc. 11260 Roger Bacon Drive, Suite 400 Reston, VA 20910 USA PHONE:+1 703 742-6604 FAX:+1 703 742-6605 http://www.wwdsi.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.