Vulnerability scanners

نویسندگان

  • Johan Nilsson
  • Vesa Virta
چکیده

Computer networks are used by organisations and companies as a carrier of communication and services. Disruption of the network service can severally harm the organisation. A vulnerability scanner can find weaknesses in a computer network before a potential attacker does. It scans the network for vulnerabilities by testing weaknesses and by gathering information about different entities active in the network. From the testing and information gathering it makes conclusions and reports the vulnerabilities it found in the network. If the scanner misses some vulnerabilities and the administrator of the network makes the conclusion that the network is secure enough the impact can be severe on the organisation or company. This thesis is trying to find out to what extent a vulnerability scanner can be trusted. The thesis starts with defining the theoretical requirements to a secure network. When the foundation is set the thesis moves on and explains common network vulnerabilities that are threatening computer networks. Network security testing is an activity that consists of several techniques and tools to simulate possible attacks. The vulnerability scanner is one tool that can be used during such a test. Four vulnerability scanners have been run against a laboratory network. On the same network a penetration test has been conducted to know what security holes that can be used to gain access to the system. The comparison between the findings of the vulnerability scanners and the vulnerabilities found and explored in the penetration test indicates to what extent the vulnerability scanners can be trusted. The results show that the scanners miss out on severe vulnerabilities or give them a low priority, even though these vulnerabilities have been used to gain access to an entity in the network. Vulnerability scanners work with the best intentions but are far too insecure to be trusted as a stand alone security tool.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Web Vulnerability Scanners: A Case Study

Cloud security is one of the biggest concerns for many companies. The growth in the number and size of websites increases the need for better securing those websites. Manual testing and detection of web vulnerabilities can be very time consuming. Automated Web Vulnerability Scanners (WVS) help with the detection of vulnerabilities in web applications. Acunetix is one of the widely used vulnerab...

متن کامل

Improving the Adoption of Dynamic Web Security Vulnerability Scanners

Security vulnerabilities remain present in many web applications despite the improving knowledge base on vulnerabilities. Attackers can exploit such security vulnerabilities to extract critical data from web applications and their users. Many dynamic security vulnerability scanners exist that try to automatically find such security vulnerabilities. We studied the adoption of these tools and fou...

متن کامل

CloudProxy: A NAPT Proxy for Vulnerability Scanners based on Cloud Computing

Security-as-a-service (SaaS) is an outsourcing model for security management in cloud computing. Vulnerability scanners based on cloud computing is becoming one of the killer applications in SaaS due to the pay-per-use manner and powerful scanning capability. When performing vulnerability scanning through network, the scanner needs to establish a large number of TCP connections with the target ...

متن کامل

Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners

Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as “point-and-click pentesting” tools that automatically evaluate the security of web applications with little or no human support. These tools access a web application in the same way users do, and, therefore, have the advantage of being ind...

متن کامل

VmiCVS: Cloud Vulnerability Scanner

Every service that runs in cloud systems comes with its own set of vulnerabilities. It is important to detect and assess those vulnerabilities to provide seamless and secure service to the users. Various scanners such as Port scanner, Network scanner, Web application security scanner, Database security scanner, Host based vulnerability scanner etc provide security assessment. But these scanners...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006