Vulnerability Scan Assessment

Download Report

Transcript Vulnerability Scan Assessment

Vulnerability Scan
Assessment
CS/IT 463
Bryan Dean
Jonathan Ammons
Scanners





Tenable Nessus
GFI LANGuard
Nmap
eEye Retina 5
Shadow Security Scanner
Network



Scanned CS network, IP range
129.138.6.0-255
Scanners found between 30-47 hosts
active
Low host count could be attributed to
the timing of our scans, after 5 pm.
Results



All together, scanners found 87
vulnerabilities on scanned hosts
Critical: 4, High: 40, Medium: 11, Low:
11 (Only one scanner gave the ‘critical’
rating)
Some vulnerabilities given different
CVSS ratings by different scanners.
Analysis Methods




Wrote unique parser in perl for each
scanner’s output.
Parse results were standardized.
Standardized results were consolidated
using another perl script.
Output to a comma delimited file.
Majority Voting


Looked for same vulnerability found by
different scanners on same machine
Only two vulnerabilities were identified
by more then one scanner on the
same machine.
Criticality Voting




4 critical vulnerabilities on 4 hosts.
40 high vulnerabilities on 25 hosts.
11 medium vulnerabilities on 11 hosts.
32 low vulnerabilities on 32 hosts.
SANS Top Twenty



Created a list of 2006 SANS top twenty
CVE codes.
A script compared that list to our
vulnerability found lists.
Only 1 vulnerability that we found was
on the SANS top twenty: CVE-20063439
Metasploit




Didn’t want to use Metasploit on the
CS network.
Ran Nessus on our private network,
then used that data to use Metasploit
for most likely vulnerability.
Weren’t able to penetrate.
Completely Manual.
Discussion of Scanners




Nessus and Retina gave CVE codes for
vulnerabilities found
Nessus, Retina, and GFI Languard gave
Bugtraq codes for some vulnerabilties found
NMap gave only port information, no real
vulnerabilties
Shadow Security Scanner didn’t give
meangingful data.
Final Process




Scanner creates individual output file
Scanner output is parsed into our own
standardized format
Parsed output from multiple scanners is
consolidated by hand using Excel, then
outputted to comma-deliminated file.
Final analysis (criticality, majority, and SANS
top twenty) are performed by final scripts.
Questions?