Vulnerability Assessment
Vulnerability Assessment
Information Assurance
Tools Report
Fifth Edition
September 25, 2009
Vulnerability
Assessment
EX
Distribution Statement A
S E R VICE
C E L L E NC E
I NF
O R MA T
IO
Table of Contents
SECTION 1
Introduction. . . . . . . . . . . . . 1
1.1 Purpose. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Report Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
SECTION 2
I
T Risk Management
Overview. . . . . . . . . . . . . . . 5
2.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Growth in IT Incidents and Vulnerabilities. . . . . . . . . . . . . 5
2.3 What is Risk Management?. . . . . . . . . . . . . . . . . . . . . . . 6
SECTION 3
A
utomated Vulnerability
Assessment Tools. . . . . . . . 9
SECTION 4
Tool Collection . . . . . . . . . 13
4.1 Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
4.2 Tool Selection Criteria. . . . . . . . . . . . . . . . . . . . . . . . . . . 13
SECTION 5
V
ulnerability
Analysis Tools. . . . . . . . . . 15
SECTION 6
Related Resources . . . . . . 59
SECTION 7
R
ecommended
SECTION 8
Resources . . . . . . . . . . . . . 61
Definitions. . . . . . . . . . . . . 63
SECTION 9 u
Definitions of Acronyms
and Key Terms . . . . . . . . . 65
IA Tools Report
SECTION 1
Introduction
The Information Assurance Technology Analysis Center (IATAC) provides the Department of
Defense (DoD) with emerging scientific and technical information to support Information
Assurance (IA) and defensive information operations. IATAC is one of 10 Information Analysis
Centers (IAC) sponsored by DoD and managed by the Defense Technical Information Center
(DTIC). IACs are formal organizations chartered by DoD to facilitate the use of existing scientific
and technical information. Scientists, engineers, and information specialists staff each IAC.
IACs establish and maintain comprehensive knowledge bases that include historical, technical,
scientific, and other data and information, which are collected worldwide. Information
collections span a wide range of unclassified, limited-distribution, and classified information
appropriate to the requirements of sponsoring technical communities. IACs also collect, maintain,
and develop analytical tools and techniques, including databases, models, and simulations.
IATACs mission is to provide DoD with a central
point of access for information on emerging
technologies in IA and cyber security. These include
technologies, tools, and associated techniques for
detection of, protection against, reaction to, and
recovery from information warfare and cyber attacks
that target information, information-based processes,
information systems, and information technology.
Specific areas of study include IA and cyber security
threats and vulnerabilities, scientific and
technological research and development, and
technologies, standards, methods, and tools through
which IA and cyber security objectives are being or
may be accomplished.
As an IAC, IATACs basic services include collecting,
analyzing, and disseminating IA scientific and
technical information; responding to user inquiries;
database operations; current awareness activities
(e.g., the IAnewsletter, IA Digest, IA/Information
Operations Events Scheduler, and IA Research
Update); and publishing State-of-the-Art Reports,
Critical Review and Technology Assessments reports,
and Tools Reports.
IA Tools Report
Section 1 Introduction
1.1
Purpose
1.2
1.3
Scope
IA Tools Report
Report Organization
Section 1 Introduction
IA Tools Report
SECTION 2
2.1
Background
2.2
IA Tools Report
2.3
Figure 1
Figure 2
IA Tools Report
Assets
An asset in the general sense is firm property or
information that is of significant value (known as a
critical asset). In risk management, an asset refers to
the amount of damage losing a firm asset will cause
if something bad occurs. Given that most enterprise
networks have hundreds or thousands of networked
information systems, vulnerability analysis and
assessment by manual methods are virtually
impossible. In addition, it is impossible to
completely ensure that all assets are secure.
Therefore, it is imperative that information security
managers and system owners focus on identifying
only their critical assetsthose assets without which
the organizations key missions would be significantly
degraded or cease to function. This is a key part of the
risk assessment process.
Threats
Risks to critical assets can come from a variety of
threats that can be considered possible hazards and
usually fall into three categories
XXMan-made (intentional),
XXNatural disaster,
XXAccidental (unintentional) disruptions.
Figure 3
IA Tools Report
Figure 4
IA Tools Report
vulnerabilities,
XXProvide multi-perspective view points,
XXHelp properly scope the analysis,
XXReference public catalogs,
XXHighlight design, implementation, and
configuration vulnerabilities.
3.2
Definition Box
2.
Enumerate targets
3.
4.
Escalate privileges
5.
6.
Install backdoors
7.
Banner Grabbing
This term refers to grabbing information that a
network service broadcasts about itself. For example:
Opening a telnet session to a mail server might yield
the following message: 220 mailhost.company.com
ESMTP service (Netscape Messaging Server 4.15
Patch 7 [built September 11, 2001]).
This example banner reveals the specific type of mail
server that is running and its patch level. Similarly, a
telnet connection to a Web server might yield
information such as the following
IA Tools Report
HTTP/1.1 200 OK
Date: Wed, 02 Jul 2003 22:03:21 GMT
Server: Apache/1.3.27 (Win32) PHP/4.2.2
X-Powered-By: PHP/4.2.1
Connection: close
Content-Type: text/html
In this case, the banner reveals the time on the Web
server, the Web server type and version, an accessible
scripting language (hypertext preprocessor [PHP]),
and the operating system on which it is running.
Port Status
This term refers to checking to determine which
network ports are open to allow connections to
applications. For network services that use
Transmission Control Protocol (TCP), this is done by
sending a TCP connect () request to ports on the
remote system. If the queried port is listening, the
connect () fails and the port is considered closed.
There are several other methods of checking port
status such as TCP synchronize [Synchronize] scans,
TCP finish [Final] scans, and so forth, that are beyond
the scope of this report.
Protocol Compliance
This term refers to the way an application or operating
system adheres to a standard procedure for data
processing or transmission. One of the most common
ways of using protocol compliance to identify remote
systems is to interrogate the TCP stack. By monitoring
the header information of outbound packets, it is
possible to make accurate guesses regarding the
remote operating system. By examining the Time To
Live on the packet, its Window Size, the Dont
Fragment bit, and the Type of Service, it is possible in
many cases to determine exactly which
implementation of the TCP stack is on the remote
system. (See Figure 5.) Determining the TCP stack
narrows the number of possible operating systems,
sometimes identifying the exact operating system.
10
IA Tools Report
Figure 5
Service Behavior
This term refers to the way a network service responds
to remote requests. Different implementations of a
given type of service may result in slightly different
behavior from remote requests. For example, a help
command response from a sendmail email server is
different from the result from a postfix email server.
Exploitation
Computer network exploitation (CNE) refers to the
enabling operations and intelligence collection
capabilities conducted through the use of computer
networks to gather data from target or adversary
automated information systems or networks. [14]
CNE can be accomplished through a variety of means
such as packet sniffing, hijacking TCP connections,
port scanning, and address resolution protocol (ARP)
spoofing. For example: ARP spoofing is a technique
used to exploit ethernet networks. This type of
spoofing can be used in two different ways
XXSending fake, or spoofed, ARP messages to an
3.3
How Vulnerability Assessment Tools
Can Be Incorporated into a Security Plan
Security plans are a critical aspect of a firm or
organizations secure operations. Security plans, or
more precisely, system security plans, are specific
guidelines and procedures to accomplish the secure
setup, operation, and maintenance of an information
system. To effectively implement a system security
plan for a large infrastructure, it is necessary to
leverage security technology to automate the
important and otherwise time-consuming aspects of
the security operations.
Tools for scanning are invaluable for gaining a
snapshot in time of the vulnerabilities that exist on a
given network at a given point in time. Most scanning
tools include a reporting option or module that
explains the vulnerabilities detected and provides a
ranking of the criticality of each problem (e.g., high,
medium, low). To enhance the security of your
systems, assessments should be performed on a
routine basis. This will provide the users and
administrators assurance that the system is free from
malicious code. Just as thousands of vulnerabilities
are reported each year, systems must be scanned at
regular and frequent intervals to ensure that they are
not susceptible to attack. In addition, when new hosts
are connected to the system, networks must be
checked for the risks that these new systems might
bring to the overall network. Checks must also be
conducted when newly discovered weaknesses in
existing applications and operating systems are
announced. After all, a fundamental tenet of
security is that a chain is only as strong as its weakest
link and a wall is only as strong as its weakest point.
Smart attackers are going to seek out that weak point
and concentrate their attention there. [13] A single
host that is vulnerable to attack puts the entire
network at risk.
The identification of vulnerabilities on a system is
only half the challenge. The other half of the challenge
is fixing the vulnerabilities that are found. Identified
vulnerabilities can be corrected via patches,
updating, or even reconfiguring the system. Finding
the time and money to correct the vulnerability can
IA Tools Report
11
SECTION 4
4.1
Tool Collection
Classification
4.2
IA Tools Report
13
SECTION 5
Type
Operating
System
Hardware
License
NIAP
Validated
Common
Criteria
Developer
URL
15
Operating System
Hardware
Requirements
XXAcuSensor Technology;
License
NIAP Validated
Features
16
IA Tools Report
Common Criteria
Rating
Developer
Acunetix
Availability
http://www.acunetix.com/
vulnerability-scanner/
AppDetective
Abstract
A network-based, vulnerability assessment scanner,
AppDetective discovers database applications within
an infrastructure and assesses their security strength.
In contrast to piecemeal solutions, AppDetective
modules allow enterprises to assess two primary
application tiersapplication/middleware, and
back-end databasesthrough a single interface.
Backed by a proven security methodology and
extensive knowledge of application level
vulnerabilities, AppDetective locates, examines,
reports, and fixes security holes and
misconfigurations. As a result, enterprises can
proactively harden their database applications
while at the same time improving and simplifying
routine audits.
AppDetective
Type
Database Scanning
Operating System
Hardware
Requirements
License
Commercial
NIAP Validated
Common Criteria
Rating
Developer
Availability
http://www.appsecinc.com/products/
appdetective/
Features
XXAutomated database discovery and inventory,
XXUser rghts management,
XXJob scheduling,
XXDatabase-specific vulnerability assessment,
XXCompliance mapping,
XX
Outside-in and inside-in vulnerability testing,
XXIndustry leading database vulnerability
knowledge base,
XXAutomated information gathering and analysis,
XXScalable database scanning,
XXAdvanced, customizable reporting.
IA Tools Report
17
Operating System
Hardware
Requirements
License
Commercial
NIAP Validated
Features
XXFederal Information Security Management Act
Supported Scanners
XXFoundstone,
XXHarris STAT,
XXeEye,
XXNessus,
XXnCircle.
18
IA Tools Report
Common Criteria
Rating
Developer
Availability
http://www.asg.cc/IA2/
Operating System
Hardware
Requirements
License
Commercial
NIAP Validated
Common Criteria
Rating
Developer
BigFix
Availability
http://www.bigfix.com/content/
vulnerability-management
Features
XXAssess managed endpoints against known
IA Tools Report
19
Database Scanning
Operating System
Unix
Hardware
Requirements
License
Freeware
NIAP Validated
Common Criteria
Rating
20
IA Tools Report
Developer
Dan Farmer
Availability
http://ftp.cerias.purdue.edu/pub/tools/unix/
scanners
CORE IMPACT
Abstract
Features
XXGather system information via Network Discovery,
CORE IMPACT
Type
Network Scanning
Operating System
Hardware
Requirements
License
Commercial
NIAP Validated
Common Criteria
Rating
Developer
Availability
http://www.coresecurity.com/content/
core-impact-overview
IA Tools Report
21
DominoScan II
Abstract
intelligent scanning;
XXAbility to scan as an authenticated user;
XXAbility to perform QuickHit audit;
XXVulnerability link to CVE.
Features
XXAttempts to gain access to over 100 sensitive/
default databases;
XXWeb Administrator template access using
ReplicaID;
XXWeb Administrator template access using
buffer truncation;
XX
cache.dsk access using buffer truncation;
XXDirectory traversal;
XXDatabase browsing;
XXAudits bespoke databases;
XXUnique database structure
enumeration technology;
XXFinds hidden and visible views;
XXDefault Navigator Access;
XXAttempts to bypass default Navigator protection;
XXEvaluates database design;
XXChecks every document for Edit access;
XXAttempts a forced search;
XXReadEntries & ReadViewEntries access;
XXReporting in HyperText Markup Language
(HTML) (Static/Dynamic), eXtensible Markup
Language (XML), Text file, rich text format, and
Open Database Connectivity (Microsoft) database;
XXFast, easy to use, and highly configurable;
XXCan perform focused audits;
22
IA Tools Report
DominoScan II
Type
Operating System
Hardware
Requirements
License
Commercial
NIAP Validated
Common Criteria
Rating
Developer
Availability
http://www.nextgenss.com/products/
internet-security/dominoscan.php
DumpSec v2.8.6
Abstract
SomarSofts DumpSec is a security auditing program
for Microsoft Windows NT/XP/200x. It dumps the
permissions (Discretionary Access Control Lists and
audit settings (System Access Control Lists) for the
file system, registry, and printers and shares in a
concise, readable format, so that holes in system
security are readily apparent. DumpSec also dumps
user, group, and replication information.
DumpSec v2.8.6
Type
Host Scanning
Operating System
Windows NT/XP/200x
Hardware
Requirements
License
Freeware
NIAP Validated
Common Criteria
Rating
Developer
SomarSoft
Availability
www.somarsoft.com
IA Tools Report
23
Features
XXIdentify misconfigured IT assets,
XXCreate secure configuration baselines and
monitor deviations,
XXProvide configuration remediation and measure
24
IA Tools Report
Network Scanning
Operating System
Hardware
Requirements
License
Commercial
NIAP Validated
Common Criteria
Rating
Developer
Computer Associates
Availability
http://www3.ca.com/solutions/Product.
aspx?ID=165
FortiScan provides a centrally managed, enterprisescale solution that enables organizations to close IT
compliance gaps, and implement continuous
monitoring in order to audit, evaluate, and comply
with internal, industry, and regulatory policies for IT
controls and security at the OS level. Organizations
realize quick time-to-value with easy to install,
intuitive, high value standard compliance policies
(National Institute of Standards and Technology
[NIST] SCAP, Federal Desktop Core Configuration
(FDCC), PCI data security standard (DSS), SarbanesOxley Act (SOX), Gramm-Leach Bliley Act (GLBA),
Health Insurance Portability and Accountability Act
(HIPAA) ready out of the box with regular updates by
FortiGuard to ensure OS regulatory compliance
requirements are met. FortiScan dedicated hardware
appliances easily plug into the network for fast
deployment. FortiScan integrates endpoint
vulnerability management, industry and federal
compliance, patch management, remediation,
auditing, and reporting into a single, unified
appliance for immediate results. A centralized
administration console facilitates management of
multiple FortiScan appliances across the enterprise.
Operating System
N/A
Hardware
Requirements
License
Commercial
NIAP Validated
Common Criteria
Rating
Developer
Fortinet
Availability
http://www.fortinet.com/products/
fortiscan/
Features
XXIdentifies security vulnerabilities and finds
IA Tools Report
25
GFI LANguard
Abstract
Scans a network and ports to detect, assess, and
correct security vulnerabilities with minimal
administrative effort. GFI LANguard performs
network scans using vulnerability check databases
based on OVAL and SysAdmin, Audit, Network,
Security (SANS) Top 20, providing over 15,000
vulnerability checks.
XXPatch ManagementGFI LANguard has built in
26
IA Tools Report
GFI LANguard
Type
Operating System
Hardware
Requirements
License
NIAP Validated
Common Criteria
Rating
Developer
GFI
Availability
http://www.gfi.com/lannetscan
Gideon SecureFusion
Vulnerability Management
Abstract
XXBandwidth throttling,
XXMassive scalability,
Operating System
Hardware
Requirements
License
Commercial
NIAP Validated
Common Criteria
Rating
Developer
Gideon Technologies
Availability
http://www.thegideongroup.com/
vulnerability-management.asp
IA Tools Report
27
Scope
The scope of the HBSS deployment is worldwide.
This vast effort requires a large support infrastructure
to be in place. DISA PEO-IAN has instituted support
services to enable the comprehensive
implementation of the HBSS system to all the
combatant commands, services, agencies, and
field activities.
Features
XXePolicy Orchestrator (ePO) management suite;
XXCentral security manager;
XXEnables the installation, management, and
28
IA Tools Report
Operating System
Windows
Hardware
Requirements
License
Commercial/Government
NIAP Validated
Common Criteria
Rating
Developer
DISADoD
Availability
http://www.disa.mil/news/pressresources/
factsheets/hbss.html
Internet Scanner
Abstract
The Internet Scanner vulnerability assessment
application minimizes risk by identifying the security
holes or vulnerabilities in the network so the user can
protect the network before an attack occurs.
Internet Scanner can identify more than 1,300 types
of networked devices on a network, including
desktops, servers, routers/switches, firewalls, security
devices, and application routers. Internet Scanner
analyzes the configurations, patch levels, operating
systems, and installed applications to find
vulnerabilities that could be exploited by hackers
trying to gain unauthorized access.
Features
Internet Scanner
Type
Network Scanning
Operating System
Hardware
Requirements
License
Commercial
NIAP Validated
Common Criteria
Rating
Developer
Availability
http://www-935.ibm.com/services/us/index.
wss/offering/iss/a1027208
IA Tools Report
29
Lumension Scan
Abstract
Lumension Scan, a component of Lumension
Vulnerability Management, is a complete stand-alone,
network-based scanning solution that performs a
comprehensive external scan of all devices connected
to your network, both managed and unmanaged.
Once assets are identified, the powerful, yet easy-touse Lumension Scan detects weaknesses on these
devices before they can be exploited.
Lumension Scan
Type
Network Scanning
Operating System
Hardware
Requirements
License
Commercial
NIAP Validated
Features
Common Criteria
Rating
Developer
Lumension
Availability
http://www.lumension.com/vulnerabilitymanagement/software-vulnerabilityassessment.jsp?rpLangCode=1&rpMenu
Id=150835
30
IA Tools Report
MBSA 2.1
Abstract
Microsoft Baseline Security Analyzer (MBSA) is
an easy-to-use tool that helps small and medium
businesses determine their security state in
accordance with Microsoft security
recommendations and offers specific remediation
guidance. Improve your security management
process by using MBSA to detect common security
misconfigurations and missing security updates on
your computer systems. Built on the Windows Update
Agent and Microsoft Update infrastructure, MBSA
ensures consistency with other Microsoft
management products, including Microsoft Update
(MU), Windows Server Update Services (WSUS),
Systems Management Server (SMS), System Center
Configuration Manager (SCCM) 2007, and Small
Business Server.
MBSA 2.1
Type
Host Scanning
Operating System
Hardware
Requirements
License
Free
NIAP Validated
Common Criteria
Rating
Developer
Microsoft
Availability
http://technet.microsoft.com/en-us/
security/cc184924.aspx
IA Tools Report
31
32
IA Tools Report
Operating System
Hardware
Requirements
License
Commercial
NIAP Validated
Common Criteria
Rating
Developer
McAfee
Availability
http://www.mcafee.com/us/enterprise/
products/risk_and_vulnerablity_
management/vulnerability_manager.html
Metasploit
Abstract
The Metasploit Framework is a development platform
for creating security tools and exploits. The
framework is used by network security professionals
to perform penetration tests, system administrators
to verify patch installations, product vendors to
perform regression testing, and security researchers
world-wide. The framework is written in the Ruby
programming language and includes components
written in C and assembler.
The framework consists of tools, libraries, modules,
and user interfaces. The basic function of the
framework is a module launcher, allowing the user to
configure an exploit module and launch it at a target
system. If the exploit succeeds, the payload is
executed on the target and the user is provided with a
shell to interact with the payload.
Metasploit
Type
Network Scanning
Operating System
Hardware
Requirements
License
Open Source
NIAP Validated
Common Criteria
Rating
Developer
Metasploit, LLC
Availability
http://www.metasploit.com/home/
IA Tools Report
33
Features
XXN-Stalker is a security assessment tool designed to
34
IA Tools Report
Operating System
Hardware
Requirements
License
Commercial, Free
NIAP Validated
Common Criteria
Rating
Developer
N-Stalker
Availability
http://nstalker.com/products
nCircle IP360
Abstract
As a component of nCircles security risk and
compliance management suite, IP360 is a
vulnerability and risk management system,
enabling enterprises and government agencies to
costeffectively measure and manage their security
risk. IP360 comprehensively profiles all networked
devices and their applications, vulnerabilities, and
configurations, and includes coverage for over 25,000
conditions (operating systems, applications,
vulnerabilities, and configurations), providing the
ideal foundation for assessing every system on the
network. IP360s agentless architecture is designed
for rapid deployment and ease of management across
large, globally distributed networks.
nCircle IP360
Type
Operating System
N/A
Hardware
Requirements
License
Commercial
NIAP Validated
Yes
Common Criteria
Rating
Developer
nCircle
Availability
http://www.ncircle.com/index.
php?s=products_ip360
Features
XXComprehensive, agentless discovery and profiling
operational effectiveness;
XXIntegrated network topology risk analysis for
IA Tools Report
35
Features
XXAgentless scanning (patch and
configuration auditing),
XXHigh-speed vulnerability identification,
XXComplete network assessment and discovery.
36
IA Tools Report
Network Scanning
Operating System
Hardware
Requirements
License
Commercial
Free for personal use
NIAP Validated
Common Criteria
Rating
Developer
Availability
http://www.nessus.org/nessus/
Features
Operating System
Hardware
Requirements
License
Commercial
NIAP Validated
Yes
Common Criteria
Rating
Developer
netIQ
Availability
http://www.netiq.com/products/vsm/
default.asp
IA Tools Report
37
Features
XXFlexibleNmap supports dozens of advanced
38
IA Tools Report
Network Scanning
Operating System
Hardware
Requirements
License
Open Source
NIAP Validated
Common Criteria
Rating
Developer
Insecure.org
Availability
http://nmap.org/
Nikto v2.03
Abstract
Features
XXUses rfps LibWhisker as a base for all
network funtionality,
XXMain scan database in comma separated variable
Web access),
XXMultiple host/port scanning (scan list files),
XXUsername guessing plugin via the cgiwrap
Operating System
Hardware
Requirements
License
Open Source
NIAP Validated
Common Criteria
Rating
Developer
Cirt.net
Availability
http://www.cirt.net/nikto2
IA Tools Report
39
Orascan
Abstract
OraScan is a multi-environment auditing application
developed to assess the security of Oracle Web
applications. The finely detailed level of auditing
supported by OraScan allows systems administrators
and security professionals to gain full control of
security issues surrounding online applications and
front-end servers.
Orascan
Type
Database Scanning
Operating System
Hardware
Requirements
License
40
IA Tools Report
Commercial
NIAP Validated
Common Criteria
Rating
Developer
Availability
http://www.ngssoftware.com/products/
internet-security/orascan.php
Operating System
Hardware
Requirements
N/A
License
Freeware
NIAP Validated
Common Criteria
Rating
Developer
Paros
Availability
http://www.parosproxy.org/index.shtml
IA Tools Report
41
Features
XXVulnerability assessment,
XXComplete vulnerability management
and protection,
Network Scanning
Operating System
N/A
Hardware
Requirements
License
Commercial
NIAP Validated
Common Criteria
Rating
Developer
IBM
Availability
http://www-935.ibm.com/services/us/index.
wss/offering/iss/a1027216
42
IA Tools Report
proVM Auditor
Abstract
Prolific Solutions proVM Auditor is a vulnerability
management tool that uses the output from multiple
vulnerability and compliance scanners and
aggregates the information into a single view. proVM
Auditor presents vulnerability data in meaningful
views via a vulnerability matrixthat makes
managing, tracking, and resolving vulnerabilities
simpler and less resource-intensive.
Features
XXExpedites compliance reviews
XXMaps vulnerabilities to DoD 8500.2 IA Controls
XXFacilitates/standardizes C&A processes
proVM Auditor
Type
Operating System
Windows
Hardware
Requirements
N/A
License
Commercial
NIAP Validated
Common Criteria
Rating
Developer
Prolific Solutions
Availability
http://www.prolific-solutions.net/products.
htm
require installation
XXAccepts scanner output from the following
Vulnerability Scanners:
eEye Retina
Lumension PatchLink
DISA SRRs
DISA Gold Disk
Application Security AppDetective
Tenable Nessus
Nmap
Other tools commercial or private can be
added upon request
IA Tools Report
43
Features
XXVulnerability KnowledgeBase that incorporates
44
IA Tools Report
Network Scanning
Operating System
N/A
Hardware
Requirements
License
Commercial
NIAP Validated
Common Criteria
Rating
Developer
Qualys
Availability
http://www.qualys.com/products/qg_suite/
vulnerability_management/
Rational AppScan
Abstract
IBM Rational Web application security software helps
IT and security professionals protect against the
threat of attacks and data breaches. Involving more
testers in the application security process results in
higher quality, more secure applications at a
reasonable cost.
Rational offers Web application security solutions,
including new malware detection capabilities,
through the IBM Rational AppScan family of
products. AppScan can be used for vulnerability
scanning in all stages of application development and
by testers with or without security expertise.
Rational AppScan
Type
Operating System
Hardware
Requirements
License
NIAP Validated
Common Criteria
Rating
Developer
IBM Rational
Availability
http://www-01.ibm.com/software/
awdtools/appscan/
Features
XXAppScan Build EditionEmbeds Web
IA Tools Report
45
Features
XXDiscovers the assets in the network infrastructure,
46
IA Tools Report
Network Scanning
Operating System
Windows
Hardware
Requirements
License
Commercial
NIAP Validated
Common Criteria
Rating
Developer
Availability
http://www.eeye.com/html/products/retina/
index.html
SAINT
Abstract
SAINTs Web-like, easy-to-use, GUI makes it easy to
scan networks. Every live system on the network is
screened for TCP and user datagram protocol (UDP)
services. For each service it finds running, it launches
a set of probes designed to detect anything that could
allow an attacker to gain unauthorized access, create
a denial of service, or gain sensitive information
about the network. When vulnerabilities are
detected, SAINT categorizes the results in several
ways, allowing users to target the data they find
most useful. SAINT can group vulnerabilities
according to severity, type, or count. It can provide
information about a particular host or groups of
hosts. SAINT describes each of the vulnerabilities
it locates and references CVE or Information
Assurance Vulnerability Alerts (IAVA), as well
as CERT advisories.
SAINT
Type
Network Scanning
Operating System
Unix/Linux platform
Hardware
Requirements
License
Commercial
NIAP Validated
Common Criteria
Rating
Developer
Saint Corporation
Availability
http://www.saintcorporation.com/products/
data_sheets/SAINT_data_sheet.pdf
Features
XXIncludes flexible/customizable scanning
IA Tools Report
47
Second Look
Abstract
Second Look captures, and forensically preserves, a
computers volatile RAM. It analyzes the Linux
operating system kernel in live memory or via a
memory image, verifying its integrity and searching
for signs of rootkits or other subversive software that
have modified the executable kernel code or kernel
data structures.
With Second Look, analysts and investigators have a
tool that provides a comprehensive view of a system,
uninfluenced by any malware that might be running
on it. Information pulled directly out of memory
includes running processes, active network
connections, loaded kernel modules, and many other
essential system parameters. Second Look uncovers
hidden kernel modules, processes, and network
activity. Second Look integrates a real-time
disassembler that allows inspection of any function
or segment of kernel memory.
As threats to computer systems continue to increase
in sophistication, traditional post-mortem (dead box)
forensic analysis of hard disk contents is no longer
sufficient. Advanced exploits allow for the
implantation of rootkits and backdoors directly in
memory, without an actual file ever touching the disk.
Volatile memory must be acquired in a trustworthy
fashion, and analyzed with security software such as
Second Look.
48
IA Tools Report
Second Look
Type
Host Scanning
Operating System
Linux
Hardware
Requirements
License
Commercial
NIAP Validated
Common Criteria
Rating
Developer
Pikewerks
Availability
http://pikewerks.com/sl
SecureScout NX
Abstract
SecureScout NX is a third-generation scanning
solution that performs real-time testing of global
networks and firewalls. The architecture of
SecureScout NX implements a centralized console
to manage remote test engines and probes, enabling
users to quickly and repeatedly scan and report
vulnerabilities in distributed networks from a
single location.
SecureScout NX gives the user an impartial view of
whether firewalls have been configured correctly to
comply with security policies and protect the network.
SecureScout NX
Type
Network Scanning
Operating System
Hardware
Requirements
License
Commercial
NIAP Validated
Common Criteria
Rating
Developer
NetVigilance
Availability
http://www.netvigilance.com/nx
IA Tools Report
49
SecureScout Perimeter
Abstract
The SecureScout Perimeter service probes Internetconnected systems for vulnerabilities before hackers
find them. It identifies holes in an Internet
infrastructure, scanning beyond the firewall to any
device with an IP address.
SecureScout Perimeter
Type
Network Scanning
Operating System
Hardware
Requirements
License
Commercial
NIAP Validated
Common Criteria
Rating
50
IA Tools Report
Developer
NetVigilance
Availability
http://www.netvigilance.com/perimeter
Type
Network Scanning
Operating System
Features
XXOperates under Unix, Linux, Mac OS/X or
Hardware
Requirements
License
Freeware
NIAP Validated
Common Criteria
Rating
Developer
Availability
http://www-arc.com/sara/
IA Tools Report
51
Network Scanning
Operating System
Unix/Linux
Hardware
Requirements
License
Freeware
NIAP Validated
Common Criteria
Rating
52
IA Tools Report
Developer
Availability
http://ftp.cerias.purdue.edu/pub/tools/unix/
scanners
SNScan v1.05
Abstract
SNScan is a Windows-based simple network
management protocol (SNMP) detection utility that
can quickly and accurately identify SNMP-enabled
devices on a network. This utility can effectively
indicate devices that are potentially vulnerable to
SNMP-related security threats.
SNScan v1.05
Type
Network Scanning
Operating System
Windows
Hardware
Requirements
License
Freeware
NIAP Validated
Common Criteria
Rating
Developer
Availability
http://www.foundstone.com/us/resources/
proddesc/snscan.htm
IA Tools Report
53
Features
XXTest NIST configurations to identify adverse
authorized professionals,
XXEnsure new acquisitions use
standard configurations,
XXPatches,
XXAutomatically determines if computers have
all required security patches,
XXPerforms vulnerability assessment of operating
system and major applications,
XXProvide documentation of deviations
with rationale.
54
IA Tools Report
Operating System
Windows
Hardware
Requirements
License
Commercial
NIAP Validated
Common Criteria
Rating
Developer
Threatguard
Availability
http://www.threatguard.com/products.htm
Operating System
Hardware
Requirements
License
Commercial
NIAP Validated
Yes
Common Criteria
Rating
Developer
Triumfant
Availability
http://www.triumfant.com/products.asp
Features
XXMalware detectionThe ability to detect changes
IA Tools Report
55
Typhon III
Abstract
Typhon III is a tool that identifies infrastructure and
Web application. Capabilities include the fast and
accurate identification of current and historical
security vulnerabilities; the nonintrusive
vulnerability scanner provides secure quality
protection against current threats, including
Typhon III
Type
Operating System
Hardware
Requirements
License
Commercial
XXRootkits,
NIAP Validated
XXPhishing,
XXSQL Injection,
Common Criteria
Rating
XXPharming,
Developer
Availability
http://www.nextgenss.com/products/
internet-security/ngs-typhon.php
56
IA Tools Report
WebInspect
Abstract
HP WebInspect software is a Web application security
assessment software designed to analyze todays
complex Web applications. It delivers fast scanning
capabilities, broad assessment coverage, extensive
vulnerability knowledge, and accurate Web
application scanning results.
Features
XXStatically analyze client-side Adobe
Flash applications;
XXProduce faster scans and more accurate results
HP WebInspect
Type
Operating System
Windows
Hardware
Requirements
License
Commercial
NIAP Validated
Common Criteria
Rating
Developer
Hewlett Packard
Availability
https://h10078.www1.hp.com/cda/hpms/
display/main/hpms_content.jsp?zn=bto&
cp=1-11-201-200^9570_4000_100__
IA Tools Report
57
WebScarab
Abstract
WebScarab is a framework for analysing applications
that communicate using the HTTP and HTTPS
protocols. It is written in Java, and is thus portable to
many platforms. WebScarab has several modes of
operation, implemented by a number of plugins. In its
most common usage, WebScarab operates as an
intercepting proxy, allowing the operator to review
and modify requests created by the browser before
they are sent to the server, and to review and modify
responses returned from the server before they are
received by the browser. WebScarab is able to
intercept both HTTP and HTTPS communication.
The operator can also review the conversations
(requests and responses) that have passed
through WebScarab.
WebScarab is designed to be a tool for anyone who
needs to expose the workings of an HTTP(S)-based
application, whether to allow the developer to debug
otherwise difficult problems, or to allow a security
specialist to identify vulnerabilities in the way that
the application has been designed or implemented.
58
IA Tools Report
WebScarab
Type
Operating System
Hardware
Requirements
License
Freeware
NIAP Validated
Common Criteria
Rating
Developer
Availability
http://www.owasp.org/index.php/
Category:OWASP_
WebScarab_Project
SECTION 6
Related Resources
This provides additional references: books, Web sites, articles, and papers.
References
1. Carnegie Mellon Software Engineering Institute
CERT Coordination Center (n.d.). CERT/CC
Statistics 1988-2008. http://www.cert.org/stats/
cert_stats.html. (Accessed June 3, 2009).
2. Homeland Security Advisory Council. Report
of the Critical Infrastructure Task Report,
January 2006.
3. Merriam-Webster Online Dictionary. http://www.
merriam-webster.com/. (Accessed June 5, 2009).
4. Schultze, E. Thinking Like a Hacker. March 2002.
http://pdf.textfiles.com/security/thinkhacker.pdf.
(Accessed June 5, 2009).
5. Storms, Andrew (SANS Institute). Using
Vulnerability Tools To Develop an OCTAVE Risk
Profile. December 2003. http://www.sans.org/
reading_room/whitepapers/auditing/1353.php?por
tal=813b67045603408ee90700647. Retrieved 13
March 2007.
6. U.S. Government, Intelligence Community.
Analytical Risk Management: A Course Guide for
Security Risk Management, May 2003.
7. U.S. Government, National Institute of Standards
and Technology, National Vulnerability Database.
Security Content Automation Protocol Validated
Products. http://nvd.nist.gov/scapproducts.cfm.
(Accessed June 3, 2009).
8. U.S. Government, White House. Cyberspace
Policy Review. http://www.whitehouse.gov/assets/
documents/Cyberspace_Policy_Review_final.pdf
(Accessed June 5, 2009).
9. Spiegal Online International. Away From the
Politics of Fear Interview with Homeland
Security Secretary Janet Napolitano. http://www.
spiegel.de/international/world/0,1518,613330,00.
html. (Accessed June 5, 2009).
IA Tools Report
59
SECTION 7
Recommended Resources
Alberts, Christopher and Audrey Dorofee. Managing Information Security Risks: The OCTAVE Approach. Boston:
Addison Wesley Professional, 2003.
Braunton, Gregory (SANS Institute). B.A.S.E.A Security Assessment Methodology, September 2004.
Open Vulnerability Assessment Language http://oval.mitre.org
Peltier, Thomas R., J. Peltier, and J.A.Blackley. Managing a Network Vulnerability Assessment. Boca Raton, FL:
CRC Press LLC, 2003.
Stoneburner, G., A. Goguen, and A. Feringa. Special Publication 800-30Risk Management Guide for
Information Technology Systems. National Institute of Standards and Technology (NIST), 2002.
U.S. Government, Intelligence Community. Analytical Risk Management: A Course Guide for Security Risk
Management, 2003.
U.S. Government, Department of Commerce. Publication 199 - Standards for Security Categorization of Federal
Information and Information Systems. Federal Information Processing Standards (FIPS), 2004.
U.S. Government, National Institute of Standards and Technology, National Vulnerability Database. Security
Content Automation Protocol Validated Products. http://nvd.nist.gov/scapproducts.cfm.
IA Tools Report
61
SECTION 8
Definitions
XXAll-hazards/ThreatCircumstances, events, or
IA Tools Report
63
SECTION 9
Acronym or Term
Definition
ACL
ARP
CERT
CGI
COPS
COTS
Commercial Off-the-Shelf
CPU
CSV
CVE
DHS
DISA
DoD
Department of Defense
DSII
DominoScan II
DSS
DTIC
ePO
ePolicy Orchestrator
ESSG
Enterprise-Wide Information Assurance and Computer Network Defense Solutions Steering Group
FDCC
FISMA
GB
Gigabyte
GHz
Gigahertz
GLBA
GUI
HBSS
HIPAA
HIPS
HSPD-7
HTML
HTTP
HTTPS
IA
Information Assurance
IAC
IATAC
IA Tools Report
65
Acronym or Term
Definition
IAVA
IP
Internet Protocol
IPS
IT
Information Technology
MB
Megabyte
MBSA
MHz
Megahertz
MA
McAfee Agent
MU
Microsoft Update
NIAP
NIST
Nmap
Network Mapper
NVD
OMB
OS
Operating System
OVAL
PA
Policy Auditor
PCI
PEO-IAN
PERL
PHP
Hypertext Preprocessor
RAM
RSD
SaaS
Software-as-a-Service
SANS
SARA
SATAN
SCAP
SCCM
SMS
SNMP
SOX
Sarbanes-Oxley Act
SQL
TCP
UDP
66
IA Tools Report
Acronym or Term
Definition
URL
VM
Vulnerability Management
WSUS
XML
XSS
Cross-Site Scripting
IA Tools Report
67