0% found this document useful (0 votes)
215 views

Scuba: Database Vulnerability Scanner

Scuba Database Vulnerability Scanner is presented by Nivedita. It is a tool that scans enterprise databases for vulnerabilities and misconfigurations. It offers over 2,300 assessment tests across different operating systems. Scuba allows users to scan databases, identify risks, and get recommendations to mitigate issues. An average scan takes 2-3 minutes. It has prerequisites like internet access and database permissions. Users can select scan options like local network or SSH tunnel, view results, and identify vulnerabilities. Scuba Database Vulnerability Scanner offers support, a free trial, and supports multiple languages. Its audience includes organizations using databases.

Uploaded by

NIVEDITA R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
215 views

Scuba: Database Vulnerability Scanner

Scuba Database Vulnerability Scanner is presented by Nivedita. It is a tool that scans enterprise databases for vulnerabilities and misconfigurations. It offers over 2,300 assessment tests across different operating systems. Scuba allows users to scan databases, identify risks, and get recommendations to mitigate issues. An average scan takes 2-3 minutes. It has prerequisites like internet access and database permissions. Users can select scan options like local network or SSH tunnel, view results, and identify vulnerabilities. Scuba Database Vulnerability Scanner offers support, a free trial, and supports multiple languages. Its audience includes organizations using databases.

Uploaded by

NIVEDITA R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Scuba Database

Vulnerability
Scanner
Presented By:

Nivedita
119011012642
IVth Year B.Tech CSE
PMIST,Vallam

1
Introduction
1. Released on November 7, 2008
2. Uncovers hidden security risks
3. Scan enterprise databases for vulnerabilities and misconfiguration.
4. Available for all kinds of Operating systems.
5. Scuba offers over 2,300 assessment tests.
6. With this tool we can:
a. Scan enterprise databases for vulnerabilities and misconfiguration
b. Know the risks to our databases
c. Get recommendations on how to mitigate identified issues
7. An average Scuba scan normally takes 2-3 minutes.
8. Free Trial available.

2
Prerequisites

1. Internet access must be allowed.


2. Verify that we have a user with all required database permissions.
3. Scuba requires a number of baseline permissions.

3
Five Tips for Getting Started with Scuba
1 Selecting a User

Reading the Scan Results. 2

3 Identifying Vulnerabilities
Finding Suggested
Remediation for 4

Assessments
Checking Compliance
5
Status

4
Running a Scan : LOcal network
1. Local network: The database resides on a local network.
2. We can run a scan on a database that resides on our local network, or a cloud
database:
a. that has a public address

b. that we are connected to via network peering

c. on whose machine we run the scan using a Remove


Connection

3. When the scan ends, the application closes.

5
Running a Scan using the SSH Tunnel
Option
1. Cloud (SSH Tunnel) option is used to scan when :
1. If the database we are scanning is on the public cloud
2. does not have a public address
3. nor is accessible to your own machine via peering
4. nor is having the scan run on the database machine itself
via a remote connection

6
What kinds of users and
organization types does Scuba
Database Vulnerability Scanner
work with?

7
What kind of support options
does Scuba Database
Vulnerability Scanner offer?

8
What languages does Scuba
Database Vulnerability
Scanner support in their
product?

9
Does Scuba Database
Vulnerability Scanner offer
a free trial?

10
Who are the
audience of scuba
database
vulnerability
scanner?
11
CONCLUSION

12
Thank
you!
13

You might also like