Penetration Testing mailing list archives
Re: Canned audits
From: "US Infosec" <usinfosec () gmail com>
Date: Thu, 30 Mar 2006 07:35:13 -0500
In my last position we used Harris Stat Analyzer for this. Through Analyzer we could use ISS Internet Scanner, Harris Stat Scanner, and Nessus. Analyzer would correlate the data from all 3 scans of the same system into one report, and also identify false positives. It worked really well. On 3/28/06, Clemens, Dan <Dan.Clemens () healthsouth com> wrote:
I actually prefer the Tenable line of products. They are the creatersof Nessus which is the de facto standard of >>>>>>>>vulnerability scanners on the Internet. One cool thing you can do with some of the other products is use multiple scanners, and then do corrilation of the vulnerability data once it has been discovered. Now I guess this is only cool if you want to use multiple scanners in hopes that one scanner will catch things another didn't. Out of curiosity - is anyone on the list actually utilizing multiple scanners and corrilating the data within their risk assessment process or is everyone that uses other peoples scanners utilizing just one brand/vendor? - Daniel Clemens -----Original Message----- From: sol () mail fullertoninfosec com [mailto:sol () mail fullertoninfosec com] Sent: Tuesday, March 28, 2006 7:29 AM To: r@d Cc: pen-test () securityfocus com Subject: Re: Canned audits I actually prefer the Tenable line of products. They are the creaters of Nessus which is the de facto standard of vulnerability scanners on the Internet. Tenable has created a number of tools to surround Nessus to offer (in my view) a complete security audit solution. Nevo is a Passive Vulnerability Scanner Thunder is their Log Correlation Engine Lightning is the management tool that pulls everything together in one easy to manage console. From here you can create policies, run distributed scans of your entire enterprise and then create reports as generic or as explicit as you need. From what I hear they are about to release a new version which includes policies for compliance for all the major standards in the industry. Sol Quoting "r@d" <m2rad () gmx net>:Hi Rob, There are quite a few tools around there to perform these kinds of audits. I personally like eEye Retina with REM Events Manager Console best. It allows you to perform scheduled audits and have results posted in a dashboard like way, or even have reports send by email. I see you are especially interested in Wireless, therefor I think eEyeRetina is speficially fit for your needs. Kind Regards, Rajendra Soebhag Technical Consultant - Trainer CCA, CCEA, CCI ----- Original Message ----- From: "ROB DIXON" <rdixon () workforcewv org> To: <pen-test () securityfocus com> Sent: Friday, March 24, 2006 8:27 PM Subject: Canned audits Hi All, We have had many audits in the past by 3 party vendors. My company is finally interested in performing some of these audits in house and a little more frequently than the annual 3rd party audits. My question is, is there a software package, a "canned" audit that canbe performed? Basic info gathering questions regarding authentication controls, network documentation(how and where it is stored), question that should be asked regarding wireless AP and other basic securityquestions?-Rob Dixon Robert L. Dixon, CSO CHFI A+ State of West Virginia's West Virginia Office of Techonology Infrastructure Applications Netware/GroupWise Administrator Telephone: (304)-558-5472 ex.4225 Email:rdixon () workforcewv org ---------------------------------------------------------------------- --------This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ---------------------------------------------------------------------- ------------------------------------------------------------------------------ --------This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprisesoftware (Cenzic Hailstorm).Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ---------------------------------------------------------------------- -------------------------------------------------------------------------------- ------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------ ------ ----------------------------------------- Confidentiality Notice: This e-mail communication and any attachments may contain confidential and privileged information for the use of the designated recipients named above. If you are not the intended recipient, you are hereby notified that you have received this communication in error and that any review, disclosure, dissemination, distribution or copying of it or its contents is prohibited. If you have received this communication in error, please notify me immediately by replying to this message and deleting it from your computer. Thank you. ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------------
------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------------
Current thread:
- Re: Canned audits, (continued)
- Re: Canned audits r@d (Mar 27)
- Re: Canned audits sol (Mar 28)
- Re: Canned audits bf (Mar 27)
- Re: Canned audits Gareth Davies (Mar 28)
- Re: Canned audits Dotzero (Mar 28)
- Re: Canned audits imariot () gmail com (Mar 25)
- Re: Canned audits revnic (Mar 25)
- RE: Canned audits Clemens, Dan (Mar 25)
- RE: Canned audits Clemens, Dan (Mar 28)
- Re: Canned audits Phil Frederick (Mar 29)
- Re: Canned audits US Infosec (Mar 30)
- Re: Canned audits r@d (Mar 27)