230 likes | 363 Vues
This report discusses the challenges of conducting vulnerability assessments in large networks with multiple subnets and the adoption of the SAINT tool. It outlines the initial problems experienced with the scanning tool, including host detection issues and organizational hurdles. The report details a comparative analysis of various scanning tools, the selection of an updated version of SATAN, and the results of extensive scans. The implementation of SAINT has shown promise in identifying vulnerabilities, suggesting continuous updates and improvements for more effective results.
E N D
Vulnerability AssessmentUsing SAINT Jane Lemmer Information Security Specialist World Wide Digital Security, Inc. lemmerj@wwdsi.com
Outline • The Problem • The First Solution • The Second Solution • Other Uses for SAINT • What’s Next • Conclusions
The Problem • Large network • 7 Class B subnets, over 20 Class C subnets • No central management • Some resistance to “outsiders” • How do we do a vulnerability assessment?
The First Solution • The Scanning Tool • The Scanning Method • Results • Problems • Lessons Learned
The First Solution The Scanning Tool • Conducted a comparison of several network based vulnerability assessment tools • Internet Security Scanner • Kane Security Analyst • SATAN • Nessus, and a few others
The First Solution The Scanning Tool • Chose SATAN, with COAST extensions • free • fairly easy to use • sufficient for providing a first look at overall network vulnerability
The First Solution The Scanning Method
The First Solution Results • Lasted three weeks • Approximately 20,000 potential hosts interrogated • Found about 5,000 hosts with services • Inexpensive (almost automatic)
The First Solution Problems • Took almost a month to process the results into a useable format • Missed many hosts (DHCP, hosts not in DNS, especially Linux boxes) • Organizational problems (results not getting to the right people) • Scapegoats for a host of network problems
The First Solution Lessons Learned • DNS method is not finding all the hosts • SATAN is not current • Report generation takes too long • We need the following: • a new scanning tool • a new scanning method • a new reporting method
The Second Solution • The Scanning Tool • The Scanning Method • Results • Problems • Lessons Learned
The Second Solution The Scanning Tool • An updated version of SATAN • Added many new tests • Added a new attack level • Changed how vulnerable services are categorized • Works in firewalled environments • Identifies Windows boxes • Developed extensive tutorials for each vulnerable service • Developed an in-house tool to help with reports
The Second Solution The Scanning Tool • The three “r” services (rlogin, rshell, rexec) • Vulnerable CGIs • IMAP vulnerabilities • SMB open shares • Back Orifice and NetBus • ToolTalk • Vulnerable DNS servers • rpc.statd service • UDP echo and/or chargen • IRC chat relays
The Second Solution The Scanning Method
The Second Solution Results • Lasted two months • Almost 500,000 potential hosts interrogated • Found many more hosts • approximately 7,000 boxes with services • approximately 4,000 boxes with no services • almost 8,000 Windows boxes • More costly (labor intensive)
The Second Solution Problems • Scanning takes longer • Difficult to compare results with previous scan • Organizational problems (results still not getting to the right people) • Caused some problems with NT boxes • Still a scapegoat for network problems
The Second Solution Lessons Learned • New method finds more hosts but takes longer • SAINT needs to be continually updated • Scanning can help improve the tool • Still need to work on reporting results
Other Uses for SAINT • SAINT gathers a lot of information that is not reported • used to produce a list of UNIX hosts by OS type • used to identify web servers • used to identify routers • Quick scans of a host or subnet
Other Uses for SAINT Investigating Incidents
What’s Next • Continue using SAINT for large scans • Supplement SAINT with more robust tools • Scans have led to development of an IRT • defining policy • defining standard security configurations • helping users secure hosts • developing centralized site for security information
Conclusions • SAINT is a useful tool for scanning large networks • Results give a good first look at how vulnerable you are • SAINT must be continually updated • better OS typing • better reporting • method to compare scan results
Contact Information • World Wide Digital Security, Inc. • 11260 Roger Bacon Drive, Suite 400 • Reston, VA 20910 USA • PHONE: +1 703 742-6604 • FAX: +1 703 742-6605 • http://www.wwdsi.com