Security Tools Overview
Security Tools Overview
Security Tools Overview
Summary: This white paper describes features of the Open Source Vulnerability
Assessment tools that are provided on line by HackerTarget.com. Vulnerability Analysis
is an important part of the security process, it allows you to quickly gauge the current
security posture of your Internet facing server or web site.
Table of Contents
1. Introduction.............................................................................................1
2. The Process.............................................................................................2
3. The Scanning Tools...................................................................................3
3.1 Nmap Port Scanner.................................................................................3
3.2 Fierce.pl Subdomain Scanner..................................................................4
3.3 OpenVAS Vulnerability Scanner...............................................................5
3.4 Nikto Web Scanner.................................................................................6
3.5 SQL Injection Scan..................................................................................7
3.5 JoomlaScan............................................................................................9
5. Conclusion.............................................................................................10
7. Contact HackerTarget.com......................................................................10
Security Scanning Tools Overview 1
1. Introduction
http://www.HackerTarget.com has made available a number of open source security
assessment tools online. These are hosted remotely on HackerTarget.com servers and
allow a server operator or web-master to launch these tools remotely against servers
and web sites that they manage to test the security status of these systems.
These tests allow you to get an idea of how secure your systems are before the
attackers do.
New security breaches are constantly in the media, and there are thousands that go
unreported. These attacks are performed by skilled attackers who are motivated by
profit, intelligence gathering, political reasons or script kids having “fun”.
It does not matter if you are government, commercial, nonprofit or just a hobbyist – you
will be probed and attacked and when you do it is good to know your systems are safe.
2. The Process
The process of performing a vulnerability assessment is comparable to the process that
would be undertaken by an attacker performing a targeted attack against your
organisation. As the vulnerability assessment process does simulate in some ways an
attack against your systems.
These tools are all open source and freely available for testing and download from the
various web sites. HackerTarget.com host these tools on remote scanning servers
allowing you to perform remote online scanning against your servers.
Our online option allows Free Scanning with a limit of for 4 scans / day. We also have an
unlimited scanning subscription that removes the limit and also allows the use of Free
Web Mail email address for the delivery of the results.
http://hackertarget.com/free-security-vulnerability-scans/
http://hackertarget.com/vulnerability-scan-subscription/
The tools used for reconnaissance in the HackerTarget.com tool kit are the world
famous Nmap Port scanner and the Fierce.pl sub domain brute force tool.
3. The final step in the tool kit is to use the web assessment tools Nikto, SQL
Injection scanners and Joomla tools to assess specific web site urls and web
servers.
4. This phase involves the Review of results from the earlier testing.
5. Reconfigure and fix any problems found to reduce the chance of the system
becoming a new trophy for an attacker.
Documentation: http://nmap.org/book/man.html
The Nmap port scanner probes the IP you specified for open ports. These open ports are
services that are running on your server that are open to the Internet. A host or network
based firewall can block access to these ports and they will show up as filtered in the
nmap results.
This is a good way to see what services your server is listening on and what is or is not
being blocked by your firewall.
Sample Output:
Documentation: http://ha.ckers.org/fierce/
You will often think of your www.yourdomain.com when testing your security, but what
about if you have other domains (webdev.yourdomain.com, or www-
test.yourdomain.com) these development web servers, mail servers, vpn gateways and
other servers can be found with a sub domain search. The fierce domain scanner tests
your DNS for a zone transfer and then goes ahead and performs a brute force against
your domain. Testing a list of sub domains against your domain to attempt to find other
servers and IP addresses. An attacker would use this to increase his attack surface. Note
that attackers love to find servers such as development servers as they have more
untested code and may not be as secure. A compromise of one system often leads to
access to the production environments.
Sample Output:
Documentation: http://wald.intevation.org/frs/download.php/558/openvas-compendium-1.0.1.pdf
When Nessus moved away from being an open source project, a team of dedicated
individuals started work on forking the Nessus project into a new Open Source Project.
Since those early days the OpenVAS scanner has been through some major code
changes. Now the plugins are excellent and it is truly a competing scanning solution to
other commercial products.
The output from OpenVAS is comprehensive and the emailed results from
HackerTarget.com will have a html attachment that is the raw output from the scan
similar to the linked samples below.
How does it work? The OpenVAS scanner will test your servers IP for open ports, and
then using its database of over 10'000 plugins will test any open ports for security
vulnerabilities.
Sample output:
http://hackertarget.com/sample/sample-openvas-scan-centos.html
http://hackertarget.com/sample/sample-openvas-scan-win2003.html
Documentation: http://cirt.net/nikto2-docs/
The Nikto web scanner uses a database of known web vulnerabilities and web server
misconfigurations to check against your website. This will fill up your web logs with
many errors as it tests each of the checks against your website. Most of them will be
404 errors (page not found) as it runs through. However it just may find a forgotten
script that you installed and had forgotten about. Maybe a new exploit came out for that
script and that makes your server vulnerable.
Sample Output:
HackerTarget.com - Nikto Web Scan Sample Report
---------------------------------------------------------------------------
- Nikto 1.36/1.39 - www.cirt.net
+ Target IP: xx.126.xx.110
+ Target Hostname: www.testsite.com
+ Target Port: 80
+ Start Time: Sun Jul 29 14:48:24 2007
---------------------------------------------------------------------------
- Scan is dependent on "Server" string which can be faked, use -g to override
+ Server: Apache
+ Server: Apache/1.3.29 (Unix) mod_perl/1.28 PHP/4.3.4
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ /robots.txt - contains 19 'disallow' entries which should be manually
viewed (added to mutation file lists) (GET).
+ Apache/1.3.29 appears to be outdated (current is at least
Apache/2.0.47). Apache 1.3.28 is still maintained and considered secure.
+ mod_perl/1.28 appears to be outdated (current is at least 1.99_10)
+ PHP/4.3.4 appears to be outdated (current is at least 4.3.4RC2)
+ /.htaccess - Contains authorization information (GET)
+ /.htpasswd - Contains authorization information (GET)
+ /phpBB2/includes/db.php - Some versions of db.php from phpBB2 allow
remote file inclusions. Verify the current version is running. See
http://www.securiteam.com/securitynews/5BP0F2A6KC.html for more info (GET)
+ /\">
Documentation: http://sqlmap.sourceforge.net/doc/README.html
SQL Injection is currently the leading attack vector against web based applications.
Through poorly configured dynamic web pages an attacker can gain access to your
database and from that either your data or it can be used to gain full access to your
server.
We use two of the leading open source sql injection tools for our test, SQLiX and
Sqlmap. Note that these tests are configured to only perform a HTTP GET test against
url parameters. See the parameter below at the end of the url (artist=1). This is the type
of url that can be tested, usually it would be php, asp, cfm or jsp – although other types
are able to be tested.
5.0____________________________
5.0________________________-log
5.0____Debian______________-log
5.0.___Debian______________-log
5.0.2__Debian______________-log
5.0.22_Debian______________-log
5.0.22-Debian______________-log
5.0.22-Debian______________-log
5.0.22-Debian_0____________-log
5.0.22-Debian_0u___________-log
5.0.22-Debian_0ub__________-log
5.0.22-Debian_0ubu_________-log
5.0.22-Debian_0ubun________-log
5.0.22-Debian_0ubunt_______-log
5.0.22-Debian_0ubuntu______-log
5.0.22-Debian_0ubuntu6_____-log
5.0.22-Debian_0ubuntu6.____-log
5.0.22-Debian_0ubuntu6.0___-log
5.0.22-Debian_0ubuntu6.06__-log
5.0.22-Debian_0ubuntu6.06._-log
5.0.22-Debian_0ubuntu6.06.6-log
sqlmap/0.7rc1
by Bernardo Damele A. G. <[email protected]>
3.5 JoomlaScan
HackerTarget Scan: http://hackertarget.com/joomla-security-scan/
Documentation: http://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project
The final scan in our tool kit is specific to the Joomla content management system. A
widely used open source content management solution that allows creation and
updating of a portal like website easy to manage. Joomla however is well known for its
security vulnerabilities – often this is due to poorly written plugins rather than the core
components of the system. This JoomlaScan tests a Joomla based website against a
database of known vulnerabilities – this is similar to Nikto however it is more focused
being a test for a single product.
To test enter the full url of your Joomla Site like so:
www.mywebsite.com/pathtojoomla/
5. Conclusion
The benefits are obvious:
As you can see we provide a variety of tools for online security testing, and they each
perform a different function. The output from these tools is technical in nature, however
the fact that they are open source means there is a great deal of support and
information available from the online security community if you are happy to sit down
and do some research.
We know that not everyone has the time to become a security expert so at we do offer a
full vulnerability assessment service here at http://www.HackerTarget.com.
The outline of our full assessment is a full security test against a server or web site
using all of the above tools; along with manual testing by an experienced security
professional. After the automated scans are run, the assessment runs to 3 hours of
consulting time, in that time manual testing is performed to confirm any discovered
vulnerabilities; additional testing may be performed if required and then a full report is
compiled. This report provides a summary of the issues found and recommendations for
mitigating the risk that these issues pose to your organisation.
This assessment is $150 USD for a single server, contact us for further details or a quote
for bulk orders.
http://hackertarget.com/assessment-request/
7. Contact HackerTarget.com
Further information on the scanning options available can be found at our website.
Email: [email protected]
web: http://www.hackertarget.com