Review of 12 Vulnerability Scanners 55
produke points us to a review of security vulnerability scanners. It's light on detail and not terribly well organized, but might provide a starting point for more research. From the article: "A few months back I did some intense testing of all the best vulnerability scanners out there... I had a couple nix boxes hooked up, as well as some dozers, and figured I could add clients to a 'once-a-week' scanning contract. So naturally, I wanted to use the scanner that was the best for my purpose... Better to use firewalk, hping3 (now with scripting!), nmap, etc., and leave these crutch-like tools alone."
Only 11 (Score:5, Informative)
1. ISS Internet Security Systems
2. SSS Shadow Security Scanner
3. Retina eEye
4. Nessus
5. GFI Languard Network Security Scanner
6. Qualys www.qualys.com
7. Nstealth Security Scanner www.nstalker.com
8. Nikto
9. Whisker
10. Infiltrator infiltration-systems.com
11. Nscan
Re:Only 11 (Score:5, Funny)
Also in the interests of national security forget you read this post.
Re: (Score:1)
Re: (Score:1)
Core Security (Score:2)
Re: (Score:2, Informative)
Core's not a vulnerability scanner.
Don't get me wrong, it's a great product, but Core Impact [coresecurity.com] and Immunity's Canvas [immunityinc.com] are in a class of their own (well, along with Metasploit [metasploit.com] of course). Different focus for the product, so an entirely different set of requirements you'd compare them against. They're built specifically for penetration testing. They don't just look for vulnerabilities, they actually try to exploit those vulnerabilities and use them to exploit other vulnerabilities.
So if, for example, you
Re: (Score:2)
Do you have any Canvas vs. Core thoughts, oh wise Anonymous one?
Re: (Score:3, Funny)
Re: (Score:2)
Re: (Score:2)
That's your answer on what happened to it.
Re: (Score:1, Funny)
Re: (Score:1)
The sweet smell of FUD, nice one smitty (Score:1)
Re: (Score:1)
Re: (Score:2)
Yeah. But the way I do it is to get a document that, in order for it to render, has to make database connections, deal with a web service, and report back the time it took perform those tasks... and log the results in a table that is used to drive a performance history, going back months. And, of course, e-mail and text messaging to the folks who need to be pleasantly informed if som
Re: (Score:1)
Think of it this way - do they tell you when they make changes to their systems? Answer: of course not.
So, either you scan monthly or quarterly - and leave vulnerabilities undetected, unreported and wide open to exploit for weeks or months. Or you scan much more frequently, and catch it when it happens.
Just need a nice way to identify deltas so that they don't constantly have to wade through false positives.
"It's light on detail ..." (Score:2)
Re: (Score:2)
Comment removed (Score:5, Insightful)
Re:Wow (Score:4, Funny)
Re: (Score:2)
Why?
In my experience, there's never a reason not to insult monkey-children - there are no easier targets - except their parents (and George Bush).
Re: (Score:1)
Why the parent post isn't rated redundant I'm sure I don't know.
Re: (Score:1, Insightful)
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
I have. [slashdot.org] You must not read slashdot very often.
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Am I wrong? (Score:2, Informative)
http://www.remote-exploit.org/index.php/BackTrack [remote-exploit.org]
If I'm wrong I apologize,If not,well,it's a free download fulla' tools.
maybe I'm missing something here,maybe not.
Is this the bottom? (Score:1)
'nix and 'dozers was bad enough, but then a splog with nothing of substance was just too much.
Re: (Score:2)
Google is your friend.
Also Wikipedia http://en.wikipedia.org/wiki/Spam_blogs [wikipedia.org]
Re: (Score:2)
Re: (Score:1)
nix is commonly used to referred to both Unix and Linux
Re: (Score:1)
Yes but (Score:1, Troll)
Iv'e played with a few of these. (Score:4, Informative)
* Most of these are completely outdated, and easily miss newer security holes. (maybe apart from CORE, which is a commercial and expensive scanner).
* They are loud and noisy, and due to using well-known shellcode and attack patterns extremely prone to setting off IDS systems.
* They are, in comparison to Nmap + version scan + personal archive of public exploits, very slow.
Simply spidering public exploits off archive sites (milw0rm, packetstorm, etc...) and using custom shellcode (even without using tricks like polymorphism) would in my opinion result in much, much higher efficiency compared to using any of these programs.
Strangely, he links to a proper review (Score:5, Informative)
Re: (Score:2)
Re: (Score:2)
... You must LOOK UP to see the source of the GIANT WHOOSHING SOUND
Re: (Score:2)
Hmmm (Score:1)
Where do people find this crap? (Score:2, Interesting)
I pray that no one out there even considers using this person