CYB3R53C

Cybersecurity Starts Here: Explore, Learn, and Secure Your Operations

cvelogo
Picture of Jairo Rodriguez (Publisher)

Jairo Rodriguez (Publisher)

Computer Engineer, OT Cybersecurity Specialist

Overview of Vulnerability Scanning

All software has bugs. Some bugs are easy to trigger, but have little impact on the software’s behavior; for example, perhaps a spellchecker misses the correction for a typo like receive. Other bugs are harder to trigger, but may have a more significant negative impact on the software’s execution. The original Pac-Man video game had a bug that caused the screen to become garbled upon passing level 255 (hint: the maximum value of an unsigned byte), which effectively killed gameplay (assuming you had the time and skill to reach level 255 in the first place!). Then there are bugs— some easy, some hard to trigger— whose impact adversely affects the security of a program or its underlying operating system. These are the bugs that make the Internet a dangerous place.

In the 1980s (the era of Pac-Man), a children’s cartoon called G.I. Joe repeated a bit of wisdom in every episode, “And knowing is half the battle.” Vulnerability scanners enumerate properties and search for security bugs on a single system or across a network. It’s one thing to know that a new vulnerability has been discovered in a piece of software. It’s another to know whether that vulnerable software is present on your (or someone else’s) network and, more importantly, how many systems are vulnerable and where those systems reside. Whether you’re trying to defend or attack the network, this is valuable information.

This chapter introduces some basic concepts and techniques shared by all vulnerability scanners. This overview will help you understand how scanners search for the security problems related to out–of-date and misconfigured software. Then it covers two major open source scanners, OpenVAS (the successor of Nessus, which you might already be familiar with) and Metasploit. These scanners automate many of the basic steps necessary to conducting a vulnerability assessment (when you want to draw a picture of what your network’s exposure to attack looks like) or a penetration test (when you want to find out the impact those vulnerabilities have on your network).

Share this post