Performing an authenticated vulnerability scan
This Security School is a free multimedia learning guide designed to help you understand and address the strategic and tactical implications of this topic.
It's a fact that you cannot secure what you don't acknowledge.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
While not exactly a mantra of IT security, this principle certainly proves true when looking for security vulnerabilities from a "trusted" user's perspective or, in other words, conducting vulnerability scanning with authentication.
By configuring your vulnerability scanner(s) to log into the hosts you're testing, you're going to see the rest of the story -- the side of security that's often ignored in the name of saving time or money, or because of its complexity. Yes, the truth of the matter is that running authenticated scans will indeed take more time, but the payoffs in terms of vulnerabilities discovered (and, ultimately, risks mitigated) can be tenfold compared to what you discover through an unauthenticated scan.
Here are five things security teams can do in order to successfully prepare for, run and get the most out of the results of an authenticated vulnerability scan:
- Know in advance which systems you're going to scan with authentication. This might include all Windows and Linux-based systems or a limited subset of computers (i.e., servers or workstations). Be sure to also consider scanning Web applications, databases and any network host that allows or requires authentication via protocols such as Telnet, FTP, SSH and SNMP. Many commercial vulnerability scanners, like Nexpose and LanGuard, provide the ability to scan through various means. If authenticated scanning is common practice used by either criminal hackers outside your network or malicious users on the inside (and believe me, it is), then you need to be doing it as well.
- Decide what user role level (or levels) you want to scan with. I recommend scanning with administrator or root-equivalent credentials at a minimum; you'll find the most flaws this way. However, by scanning with different user roles -- such as a manager-level role or basic user role -- you can get a better idea of what each user group can see and exploit. The more user roles you test with, the better your results, to an extent (the law of diminishing returns will kick in at some point). You'll know when enough is enough when you see that your results are no longer varying by permissions.
- Set up the user accounts for authenticated scanning so no password change is forced upon initial login (a common setting in Active Directory Group Policies and some Web applications). If you forget this, the first time your scanner logs in it will be prompted to change the password -- which, of course, it won't be able to do. You may be unaware that this has taken place and then proceed with the scan. Several minutes -- or more likely hours -- later you'll realize that authentication didn't work and you'll have to start your scans over. With Web vulnerability scanners, you'll likely have to create a login macro that you'll be able to test. For some reason, most network vulnerability scanners don't provide an option to test your login credentials before you start scanning. The only two scanners I've ever known to have this feature are the old Harris STAT Scanner and Rapid7's Nexpose. It may seem trite, but this feature can save you massive amounts of time and hassle over the long haul.
- Authenticated vulnerability scans of network hosts are fairly benign. That said, they can be problematic for production environments, especially when scanning Web applications. Regardless of what you're scanning, CPU, disk and network cycles will be consumed, log files and databases can get filled up, user accounts can get locked out, and so on. I recommend running authenticated scans on one or two systems at first to see what the side effects are going to be before branching out and scanning hundreds or thousands of systems.
- The security vulnerabilities uncovered during authenticated scans can be downright overwhelming, especially when viewing the results in a traditional PDF report. I've found that generating HTML or spreadsheet reports sorted by vulnerability is the best way to view the findings. When you sort your results by vulnerability, you'll save a ton of time by being able to see things more simply and clearly (i.e., which hosts or webpages are affected by each vulnerability) and can generate your final report or remediation plans more easily that way, rather than looking at one host at a time.
Using a vulnerability scanner to perform vulnerability scans the right way is similar to using a digital SLR camera to take photos. Anyone can own the tool, but it doesn't mean you know how to use it well -- and there's no guarantee of positive results.
The more you perform your authenticated scans, the more tricks you'll learn that will make you more effective and efficient. Your ability to find vulnerabilities better in a shorter period of time will increase while your business risks will be reduced. Then everyone wins.
About the author:
Kevin Beaver is an information security consultant, writer, professional speaker and expert witness at Atlanta-based Principle Logic, LLC. He has authored or co-authored multiple books on information security, including the best-selling Hacking For Dummies. In addition, he's the creator of the Security On Wheels information security audio books and blog, providing security learning for IT professionals on the go. You can reach Kevin through his website www.principlelogic.com and follow him on Twitter at @kevinbeaver.
View a framework for the vulnerability management lifecycle
Learn about the unexpected benefits of a vulnerability management program
Kevin Beaver asks:
What tips and tricks does your organization use to improve authenticated vulnerability scans?
0 ResponsesJoin the Discussion