19
Shadow Security Scanner Li,Guorui

Shadow Security Scanner

Embed Size (px)

DESCRIPTION

Shadow Security Scanner. Li,Guorui. Introduction. R emote computer vulnerabilities scanner R uns on Windows Operating Systems SSS also scans servers built practically on any platform O ver 2000 security audits L atest edition (V.7.25). Features. Easy used wizard Complete Scan - PowerPoint PPT Presentation

Citation preview

Page 1: Shadow Security Scanner

Shadow Security Scanner

Li,Guorui

Page 2: Shadow Security Scanner

Introduction

Remote computer vulnerabilities scanner Runs on Windows Operating Systems SSS also scans servers built

practically on any platform Over 2000 security audits Latest edition (V.7.25)

Page 3: Shadow Security Scanner

Features

Easy used wizard Complete Scan Full Scan Quick Scan Only NetBios Scan Only FTP Scan Only HTTP Scan

Page 4: Shadow Security Scanner

Ease of use cont’

Build-in modules

Page 5: Shadow Security Scanner

Ports

Page 6: Shadow Security Scanner

Audits

Page 7: Shadow Security Scanner

Flexible scanning

add a range of hosts

Page 8: Shadow Security Scanner

Flexible scanning cont’

Scheduler

Page 9: Shadow Security Scanner

Up-To-Date Security Vulnerability Database

Automatic updates BaseSDK C++ Programming SDK

Page 10: Shadow Security Scanner

DoS Checker

Denial of Service check DoS checker for HTTP, SMTP, FTP, POP3 and IMAP

protocols

Page 11: Shadow Security Scanner

Multiple Report Format

SSS offers scanned session log in XML, PDF, RTF and CHM (compiled HTML) formats

Page 12: Shadow Security Scanner

Testing Environment

Test was done in a home network (Windows)

Source computer:

jesse (192.168.1.93)

Target computers:

jesse (192.168.1.93)

lisaliu (192.168.1.92)

tony (192.168.1.152)

Page 13: Shadow Security Scanner

Testing Environment cont’

speed

Page 14: Shadow Security Scanner

TCP Port: 21 (FTP), 22 (SSH), 23(TELNET), 25(SMTP),53(DOMAIN),79(FIGER),80(WWW-HTTP),113(IDENT),119(NNTP),135(PRC-LOCATOR),139(NETBIOS-SSN),143(IMAP),389(LDAP),445(MICROSOFT-DS)

Page 15: Shadow Security Scanner

Audits: 19 categories in total of 2532 audits are perform during this test

Page 16: Shadow Security Scanner

Results

Shadow Security Scanner took about 7 minutes

SSS has gone through all the modules, 14 ports and 2532 audits for each of the computers on the host list.

Lower than 30 percents of CPU usage

Page 17: Shadow Security Scanner
Page 18: Shadow Security Scanner
Page 19: Shadow Security Scanner

Conclusion

real commercial security scanner user friendly interface expendable vulnerabilities database flexible scanning and reports