• Remote Vulnerabilities | 133
  • | Chapter 4: Looking for Vulnerabilities




    Download 22,59 Mb.
    Pdf ko'rish
    bet127/225
    Sana14.05.2024
    Hajmi22,59 Mb.
    #232856
    1   ...   123   124   125   126   127   128   129   130   ...   225
    Bog'liq
    learningkalilinux

    132 | Chapter 4: Looking for Vulnerabilities


    meaning they aren’t as likely to cause problems with the target systems. This does
    mean that some checks won’t get run, and they may be the checks that test the very
    vulnerabilities you are most concerned with. After all, if just probing for a vulnerabil‐
    ity can cause problems on the remote system, that’s something the company you are
    working with should be aware of.
    Figure 4-10. Scanner preferences
    Vulnerability scanners don’t necessarily exploit vulnerabilities. However, just poking
    at software to evaluate its reaction can be enough to cause application crashes. In the
    case of the operating system, as with network stack problems, you may be talking
    about crashing the operating system and causing a denial of service, even if that’s not
    what you were looking to do. This is an area where you need to make sure you are
    clear up front with the people you are doing the testing for. If they are expecting clean
    testing, and you are working in cooperation with them, you need to be clear that
    sometimes, even if you aren’t going for outages, outages will happen. Safe Checks is a
    setting to be careful of, and you should be very aware of what you are doing when
    you turn it off. Safe Checks disables tests that may have the potential to cause damage
    to the remote service, potentially disabling it, for instance.
    Although you can also adjust additional settings, after you have set your scan config‐
    uration and your targets, you are ready to go. Before you get started here, you may
    want to consider setting some schedules. This can be helpful if you want to be work‐
    ing with a company and doing the testing off-hours. If you are doing security testing
    or a penetration test, you likely want to monitor the scan. However, if this is a routine
    Remote Vulnerabilities | 133


    scan, you may want to set it to run overnight so as not to affect day-to-day operations
    of the business. While you may not be impacting running services or systems, you
    will be generating network traffic and using up resources on systems. This will have
    some impact if you were to do it while the business were operational.
    Let’s assume, though, that you have your configurations in place. You just want to get
    a scan started with everything you have configured. From here, you need to go to the
    Scans menu and select Tasks. Then click the New Task icon. This brings up another
    dialog box, which you can see in 
    Figure 4-11
    . In this dialog box, you give the task a
    name (not shown in screenshot), which then shows the additional options, and then
    you can select your targets and your scan config. You can also select a schedule, if you
    created one.
    Figure 4-11. Creating a new scan
    On our simple installation, we will have the choice of a single scanner to use. That’s
    the scanner on our Kali system. In a more complex setup, you may have multiple
    scanners to select from and manage all from a single interface. You will also be able to
    select the network interface you want to run the scan on. While this will commonly
    be handled by the routing tables on your system, you can indicate a specific source
    interface. This may be useful if you want all of your traffic to source from one IP
    address range, while you are managing from another interface.
    Finally, you have the choice of storing reports within the OpenVAS server. You can
    indicate how many you want to store so you can compare one scan result to another
    to demonstrate progress. Ultimately, the goal of all of your testing, including vulnera‐

    Download 22,59 Mb.
    1   ...   123   124   125   126   127   128   129   130   ...   225




    Download 22,59 Mb.
    Pdf ko'rish