
Vulnerability Assessment Scanners Comparison 36
Roberto writes "Network Computing is running
a comparison
between various commercial and vulnerability assessment scanners - and open-source wins, thanks to Nessus,
even though none of the tools could do spot all the vulnerabilities that were present in the test lab."
Re:Almost impossible to do it right (Score:1)
Ph34r M3 4nd 411 0f my 31337 fr13nd5! W3 kn0w 4b0u7 y0ur ftpd fl4w!
Version numbers and updates? (Score:2)
One other valid point missed in the review is the frequency of product updates. What mechanisms exist to check for newly discovered vunerabilities? Nessus can be made to automatically install updated scripts, but I have absolutely no idea of the other products reviewed. An out of date security tool can be worse than no security tool at all, as it installs a false sense of confidence. Would you put all your trust in a 1-year-old security scanner - I wouldn't.
Re:Version numbers and updates? (Score:1)
Closed Source Scanners are a problem!!! (Score:1)
My company now uses open source scanners exclusively. We do, however have our own very competent programming staff capable of reviewing and possibly modifying the code. This gives us some assurance as to what the tool is doing, and the capability of fixing problems quickly if required.
Having a security scanner malfunction due to software error is much more serious than having your word processor freeze. Malfunctioning scanners can crash servers and in general wreck havoc in networks.
Re:Take this review with a grain of salt (Score:1)
Re:Vulnerability Scanner Article Well Worth Readin (Score:4)
The most interesting part that I find about this entire article is the fact that this magazine (which I subcribe to) is a free subscription. The magazine doesn't make any money off of subscriptions. The magazine effectively makes all of its money from advertisements. The fact that they would review a opensource competitor is surprising in itself. The fact that they gave it the nod, is going to do nothing but hurt their advertising deals with the commercial products that they reviewed.
Of course, that's only one way to look at it. The other way to look at is that they just effectively said that if you want to get all your vulnerabilities detected, you need to buy at least one thing. Combine that one thing with the open source product, and you've got a complete solution.
Is the glass half empty, or half full? Hmmm...
Almost impossible to do it right (Score:5)
I would use scanners only to perform automated checks to make sure that known holes have not been opened after the initial check. Periodically, the 3rd-party company should be hired to come back and recheck the system for old holes as well as new ones that have been discovered since the previous system test.
TYPO (noticable, and somewhat confusing) (Score:1)
`ø,,ø!
Vulnerability Scanner Article Well Worth Reading (Score:5)
It may be a bit unfair to take the paragraph I cited out of context because the article goes on to do a good job of weighing the individual pros and cons of the highly rated scanners. Nevertheless, I think the article's key finding is that even the best of the tools they evaluated failed to catch all of the vulnerabilities that they had intentionally installed. Every opportunity should be taken to emphasize this point to the readers.
--
Dave Aiello
wonder if (Score:2)
The two vulnerability missed by nessus are at
http://cgi.nessus.org/plugins/dump.php3?id=10318 [nessus.org] and
http://cgi.nessus.org/plugins/dump.php3?id=10260 [nessus.org]
Again, I'm no security expert, but these people should've at least updated the list.
Get a sense of perspective. (Score:2)
Closed source software showed itself to be just as good, or in this case poor, as open source.
The "only open source can be trusted" argument only holds up if everyone looks at all the source, which rarely happens except in the luckiest projects.
I would trust a competently written and tested closed source product more than a crappy open source one any day. It is a matter of quality. If an open source product is better, or as good as a commercial one then I would use that instead.
Ideology should never be allowed to get in the way of practical concerns, doing so is hjust another way to shoot yourself in the foot.
Re:Vulnerability Scanner Article Well Worth Readin (Score:1)
Seeing as many of the scanners are free and open source.. I would hope that admins would maybe use a combination of 2 or 3 different ones.. which would hopefully capture everything?
Or are these scanners the lazy way out anyway (compared to servere audits..) and running Nessus and Sara would be just too much work?
Re:Vulnerability Scanner Article Well Worth Readin (Score:2)
sPh
Re:Not exactly (Score:2)
You poor, misguided, niave thing. Have you ever worked for a "company" that has "professional programmers"? Let me give you a clue. Programmers are programmers. Regardless of whether they work for a "company" or are donating time to an Open Source project, they are just as prone to stupidity as the next guy.
Commercial products, contrary to your utopian notion, are produced by professional marketing departments that have a significant motive for ensuring that the average consumer THINKS their product is worth its cost. Accuracy, efficiency, function, and stability have nothing to do with it - the Consumer, more often than not, is never in a position to objectively judge the quality of a product.
Re:How do I know this Nessus isn't a trojan? (Score:1)
Did dickhead get back to you? (Score:1)
Re:Get a sense of perspective. (Score:1)
The "only open source can be trusted" argument only holds up if everyone looks at all the source, which rarely happens except in the luckiest projects.
Absolutely false.
If even ONE person who is not directly involved in the project looks at the source, we ALL benefit.
Case in point: proftpd. Look at their mailing list sometime. People are constantly checking the diffs from new versions for new bugs that may be introduced. Rouge code would be found and squashed in a heartbeat. I may not look at the code, you may not look at the code, but there are plenty of people who do. This may not be true for all those "version 0.01a" freshmeat announcements, but any mature, sizable project (like, say, vulnerability scanners) it tends to hold very true.
Re:Not exactly (Score:1)
If this is the case then why did none of the software detect all 17 of the issues?
Words from one of the authors... (Score:1)
Re:If... (Score:1)
Don't bother waking me when you've grown up.
~Tim
--
Re:Where's Cisco Netsonar? (Score:1)
Re:Did dickhead get back to you? (Score:1)
They missed a very important point - (Score:4)
Another, more down to earth point is the ability to write your own checks for the scanner - are you stuck with paying maintenance fees to a company for updates of dubios quality, or can you go out and write them yourself?
Re:One Word (Score:1)
You can only portscan with Nmap, altough it is very sophisticated. Even Nessus uses Nmap to do part of its scans.
Nmap is defnitely *not* a vulnerability scanner.
Nessus author will be present at OSDEM (Score:2)
Where's Cisco Netsonar? (Score:2)
Jacco /var/log
---
# cd
If... (Score:3)
Er, yeah? A security consulting firm that uses only a few of these as anything more than a starting-point for further hole-research and criticism is doing nothing that I couldn't do myself, and will not seen on my Pigsty. When I consult, I expect to give proper service, and if I get consultants in, I expect perfection.
"Because all the products failed to identify key vulnerabilities, none of them received our Editor's Choice award."
If a company relies on an Editor's Choice Award to distinguish good from mediocre from bad, it has altogether too many other problems...!
~Tim
--
Anyone who depends on a vuln. scanner is dumb (Score:1)
Re:One Word (Score:3)
whisker [wiretrip.net]
Re:One Word (Score:1)
-r
Nice (Score:1)
It should mention how Nmap will help cover the tracks that Nessus misses.
Not exactly (Score:2)
Re:Almost impossible to do it right (Score:2)
What's sad: Every day we (www.securityspace.com [securityspace.com]) have examples of customers that KNOW they have high risk security vulnerabilities (holes that would get their box rooted according to Nessus), and don't even bother to pay $50 for an automated audit. It's this type of "the net is so big, and I really won't be hit by a break-in" mentality that will
I'd almost say site operators are getting what they deserve when they are broken into, except for the fact that it is the visitor of the site these days that ends up paying for it...
Re:Not exactly (Score:1)
Re:Not exactly (Score:1)
I was replying to the section of your message that stated:
==
Commercial scanners are not produced by "a person off the street". They're produced by professionals that work for companies that have a significant motive for ensuring the accuracy of their products: money.
==
I was implying that apparently this motivation was insufficient.
As for the moderation of your post as "flamebait", I certainly did not do that nor do I feel it is flamebait. A typical example of mis-moderation.
List of tools (Score:3)