IDS mailing list archives
Re: SourceFire RNA
From: Renaud Deraison <deraison () nessus org>
Date: Tue, 2 Dec 2003 19:02:51 -0500
On Tue, Dec 02, 2003 at 06:34:18PM -0500, Jason wrote:
If you disable DCOM, then the attack vector is not here any more -> you are not vulnerable. So the active probe actually did its job well.except that normal patching and administrative activity can silently re enable the service hence leaving it open and unknown until the next round of scans while producing a not vulnerable result for a period of time.
Oh right. Scan often.
The initial patch _was_ effective - it fixed _a_ form of the overflow. If the patch was properly applied, msblaster would not propagate.If it applied properly and the method of checking was sufficient. Ineffective is relative to systems that were reported patched even though the patch failed to apply correctly. I am aware of scanners that incorrectly reported a system patched and required a verification of the actual files in use. Some of these were discussed on the lists.
The implementation of the scanners may be flawed, but the same can be said of passive scanners as well - ie: maybe there are some changes in behavior they don't see. Don't mix the principles with their actual implementation.
Passively you can at best determine that you have a bunch of Windows hosts out there. Some might have been patched, some might not. And in the end, you don't even know if you've seen ALL of them.What more do you need to know? it is a WinXXX system.
You determine that passively.
Those systems were built with X configuration.
You can't determine that passively.
Those systems had the last patch applied on X.
You have a *very* organized security team, congratulations. But then again, the passive scanner won't be your sole source of information - your security team will have to correlate its results with the subnets they know they did patch. [...]
You did not foresee anything. You saw that a???
Sorry. I meant you saw a change in behavior. That is, host X is now doing FTP. This actually is useful, but not pro-active threat management - if the host has been broken into, it's too late.
Unless the local administrator blocked the traffic at the border, having the net result of slowing the scan while they were at it.
In the same vein you should not deploy your IDS on a switch, you should not deploy your scanner in front the of the firewall. There are a number of distributed scanners solutions out there now.
Unless the host has a firewall
Then is it really vulnerable ? (apart from client-side vulnerabilities of course, where passive scanners can shine in all their glory).
Unless the host was on the road Unless the host was turned off Unless the host was recently smacked in the mouth and currently rebooting.
Right. Scan often and use a passive scanner between two scans.
I've never said that passive scanners were useless - heck, I wrote one.
I said that you don't get to have the full picture JUST with them. The
same is true with active scanners as well, but it just turns out that
usually the active scanners gets to see a larger picture.
-- Renaud
---------------------------------------------------------------------------
---------------------------------------------------------------------------
Current thread:
- RE: SourceFire RNA, (continued)
- RE: SourceFire RNA Rob Shein (Dec 02)
- Re: SourceFire RNA Renaud Deraison (Dec 02)
- RE: SourceFire RNA Rob Shein (Dec 02)
- RE: SourceFire RNA Lior Tal (Dec 03)
- Re: SourceFire RNA Martin Roesch (Dec 03)
- Re: SourceFire RNA Jason (Dec 03)
- Re: SourceFire RNA Renaud Deraison (Dec 03)
- Re: SourceFire RNA Jason (Dec 03)
- Re: SourceFire RNA Renaud Deraison (Dec 03)
- Re: SourceFire RNA Jason (Dec 03)
- Re: SourceFire RNA Renaud Deraison (Dec 03)
- Re: SourceFire RNA Jason (Dec 03)
- Re: SourceFire RNA Renaud Deraison (Dec 03)
- RE: SourceFire RNA Lior Tal (Dec 03)
- Re: SourceFire RNA Martin Roesch (Dec 03)
- Re: SourceFire RNA Ron Gula (Dec 03)
- Re: SourceFire RNA Martin Roesch (Dec 03)
- Re: SourceFire RNA Ron Gula (Dec 03)
