130 likes | 294 Views
Vulnerability Scan Assessment. CS/IT 463 Bryan Dean Jonathan Ammons. Scanners. Tenable Nessus GFI LANGuard Nmap eEye Retina 5 Shadow Security Scanner. Network. Scanned CS network, IP range 129.138.6.0-255 Scanners found between 30-47 hosts active
E N D
Vulnerability Scan Assessment CS/IT 463 Bryan Dean Jonathan Ammons
Scanners • Tenable Nessus • GFI LANGuard • Nmap • eEye Retina 5 • Shadow Security Scanner
Network • Scanned CS network, IP range 129.138.6.0-255 • Scanners found between 30-47 hosts active • Low host count could be attributed to the timing of our scans, after 5 pm.
Results • All together, scanners found 87 vulnerabilities on scanned hosts • Critical: 4, High: 40, Medium: 11, Low: 11 (Only one scanner gave the ‘critical’ rating) • Some vulnerabilities given different CVSS ratings by different scanners.
Analysis Methods • Wrote unique parser in perl for each scanner’s output. • Parse results were standardized. • Standardized results were consolidated using another perl script. • Output to a comma delimited file.
Majority Voting • Looked for same vulnerability found by different scanners on same machine • Only two vulnerabilities were identified by more then one scanner on the same machine.
Criticality Voting • 4 critical vulnerabilities on 4 hosts. • 40 high vulnerabilities on 25 hosts. • 11 medium vulnerabilities on 11 hosts. • 32 low vulnerabilities on 32 hosts.
SANS Top Twenty • Created a list of 2006 SANS top twenty CVE codes. • A script compared that list to our vulnerability found lists. • Only 1 vulnerability that we found was on the SANS top twenty: CVE-2006-3439
Metasploit • Didn’t want to use Metasploit on the CS network. • Ran Nessus on our private network, then used that data to use Metasploit for most likely vulnerability. • Weren’t able to penetrate. • Completely Manual.
Discussion of Scanners • Nessus and Retina gave CVE codes for vulnerabilities found • Nessus, Retina, and GFI Languard gave Bugtraq codes for some vulnerabilties found • NMap gave only port information, no real vulnerabilties • Shadow Security Scanner didn’t give meangingful data.
Final Process • Scanner creates individual output file • Scanner output is parsed into our own standardized format • Parsed output from multiple scanners is consolidated by hand using Excel, then outputted to comma-deliminated file. • Final analysis (criticality, majority, and SANS top twenty) are performed by final scripts.