Shadow Security Scanner
-
Upload
eliana-middleton -
Category
Documents
-
view
44 -
download
0
description
Transcript of Shadow Security Scanner
![Page 1: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/1.jpg)
Shadow Security Scanner
Li,Guorui
![Page 2: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/2.jpg)
Introduction
Remote computer vulnerabilities scanner Runs on Windows Operating Systems SSS also scans servers built
practically on any platform Over 2000 security audits Latest edition (V.7.25)
![Page 3: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/3.jpg)
Features
Easy used wizard Complete Scan Full Scan Quick Scan Only NetBios Scan Only FTP Scan Only HTTP Scan
![Page 4: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/4.jpg)
Ease of use cont’
Build-in modules
![Page 5: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/5.jpg)
Ports
![Page 6: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/6.jpg)
Audits
![Page 7: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/7.jpg)
Flexible scanning
add a range of hosts
![Page 8: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/8.jpg)
Flexible scanning cont’
Scheduler
![Page 9: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/9.jpg)
Up-To-Date Security Vulnerability Database
Automatic updates BaseSDK C++ Programming SDK
![Page 10: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/10.jpg)
DoS Checker
Denial of Service check DoS checker for HTTP, SMTP, FTP, POP3 and IMAP
protocols
![Page 11: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/11.jpg)
Multiple Report Format
SSS offers scanned session log in XML, PDF, RTF and CHM (compiled HTML) formats
![Page 12: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/12.jpg)
Testing Environment
Test was done in a home network (Windows)
Source computer:
jesse (192.168.1.93)
Target computers:
jesse (192.168.1.93)
lisaliu (192.168.1.92)
tony (192.168.1.152)
![Page 13: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/13.jpg)
Testing Environment cont’
speed
![Page 14: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/14.jpg)
TCP Port: 21 (FTP), 22 (SSH), 23(TELNET), 25(SMTP),53(DOMAIN),79(FIGER),80(WWW-HTTP),113(IDENT),119(NNTP),135(PRC-LOCATOR),139(NETBIOS-SSN),143(IMAP),389(LDAP),445(MICROSOFT-DS)
![Page 15: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/15.jpg)
Audits: 19 categories in total of 2532 audits are perform during this test
![Page 16: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/16.jpg)
Results
Shadow Security Scanner took about 7 minutes
SSS has gone through all the modules, 14 ports and 2532 audits for each of the computers on the host list.
Lower than 30 percents of CPU usage
![Page 17: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/17.jpg)
![Page 18: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/18.jpg)
![Page 19: Shadow Security Scanner](https://reader036.fdocuments.net/reader036/viewer/2022081816/56812ac4550346895d8e94f6/html5/thumbnails/19.jpg)
Conclusion
real commercial security scanner user friendly interface expendable vulnerabilities database flexible scanning and reports