So you want to build a Security Program? Part 1 - Vulnerability Scanning
-
@IRJ Sure they can, it's called premeditation.
Planning to break in is as illegal as breaking in so long as you are committed to it.
-
@DustinB3403 said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ Sure they can, it's called premeditation.
Planning to break in is as illegal as breaking in so long as you are committed to it.
But there is no way to know if someone is premeditating breaking it or doing a school report on safety concerns in the neighborhood.
-
@DustinB3403 said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ As in, you shouldn't be scanning everything on the open internet.
The FBI, NSA and other 3 letter government agency's will come knocking down your door.
They have neither the resources nor the inclination to go after everyone that runs a simple scan. They don't in fact have the resources to go after all the people who have committed significantly damaging illegal acts let alone anything else.
-
@NDC said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@DustinB3403 said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ As in, you shouldn't be scanning everything on the open internet.
The FBI, NSA and other 3 letter government agency's will come knocking down your door.
They have neither the resources nor the inclination to go after everyone that runs a simple scan. They don't in fact have the resources to go after all the people who have committed significantly damaging illegal acts let alone anything else.
I see about 10 scans a minute from all over the world on our external servers on a slow day!
-
@NDC said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@DustinB3403 said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ As in, you shouldn't be scanning everything on the open internet.
The FBI, NSA and other 3 letter government agency's will come knocking down your door.
They have neither the resources nor the inclination to go after everyone that runs a simple scan. They don't in fact have the resources to go after all the people who have committed significantly damaging illegal acts let alone anything else.
Exactly and if US law cannot do anything then what are countries like China and Russia going to do? lol
-
@IRJ said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@NDC said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@DustinB3403 said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ As in, you shouldn't be scanning everything on the open internet.
The FBI, NSA and other 3 letter government agency's will come knocking down your door.
They have neither the resources nor the inclination to go after everyone that runs a simple scan. They don't in fact have the resources to go after all the people who have committed significantly damaging illegal acts let alone anything else.
Exactly and if US law cannot do anything then what are countries like China and Russia going to do? lol
Execute you?
-
@scottalanmiller said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@NDC said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@DustinB3403 said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ As in, you shouldn't be scanning everything on the open internet.
The FBI, NSA and other 3 letter government agency's will come knocking down your door.
They have neither the resources nor the inclination to go after everyone that runs a simple scan. They don't in fact have the resources to go after all the people who have committed significantly damaging illegal acts let alone anything else.
Exactly and if US law cannot do anything then what are countries like China and Russia going to do? lol
Execute you?
Yeah I am sure China's focus is to find everyone running nmap scans on American servers so they can execute them.
-
@IRJ said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@scottalanmiller said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@NDC said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@DustinB3403 said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ As in, you shouldn't be scanning everything on the open internet.
The FBI, NSA and other 3 letter government agency's will come knocking down your door.
They have neither the resources nor the inclination to go after everyone that runs a simple scan. They don't in fact have the resources to go after all the people who have committed significantly damaging illegal acts let alone anything else.
Exactly and if US law cannot do anything then what are countries like China and Russia going to do? lol
Execute you?
Yeah I am sure China's focus is to find everyone running nmap scans on American servers so they can execute them.
You never know.
-
@scottalanmiller said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@scottalanmiller said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@NDC said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@DustinB3403 said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ As in, you shouldn't be scanning everything on the open internet.
The FBI, NSA and other 3 letter government agency's will come knocking down your door.
They have neither the resources nor the inclination to go after everyone that runs a simple scan. They don't in fact have the resources to go after all the people who have committed significantly damaging illegal acts let alone anything else.
Exactly and if US law cannot do anything then what are countries like China and Russia going to do? lol
Execute you?
Yeah I am sure China's focus is to find everyone running nmap scans on American servers so they can execute them.
You never know.
They could always build another ghost city.
-
@IRJ said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@DustinB3403 said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ As in, you shouldn't be scanning everything on the open internet.
The FBI, NSA and other 3 letter government agency's will come knocking down your door.
No they wont. It's like walking or driving up to a house and looking and casing it out for a robbery. You aren't doing anything illegal until you breach the house.
actually this is now illegal in some country - not this exactly, but I can't recall where, some country (Japan maybe) just passed a law where it's illegal to plan something illegal.
-
@Dashrender said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@DustinB3403 said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ As in, you shouldn't be scanning everything on the open internet.
The FBI, NSA and other 3 letter government agency's will come knocking down your door.
No they wont. It's like walking or driving up to a house and looking and casing it out for a robbery. You aren't doing anything illegal until you breach the house.
actually this is now illegal in some country - not this exactly, but I can't recall where, some country (Japan maybe) just passed a law where it's illegal to plan something illegal.
It's impossible to police
-
@IRJ said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@Dashrender said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@DustinB3403 said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ As in, you shouldn't be scanning everything on the open internet.
The FBI, NSA and other 3 letter government agency's will come knocking down your door.
No they wont. It's like walking or driving up to a house and looking and casing it out for a robbery. You aren't doing anything illegal until you breach the house.
actually this is now illegal in some country - not this exactly, but I can't recall where, some country (Japan maybe) just passed a law where it's illegal to plan something illegal.
It's impossible to police
Of course it is - it's just like another gun law - just one more thing to through at people after they are caught.
Like Capone and taxes.. -
@Dashrender said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@DustinB3403 said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@IRJ As in, you shouldn't be scanning everything on the open internet.
The FBI, NSA and other 3 letter government agency's will come knocking down your door.
No they wont. It's like walking or driving up to a house and looking and casing it out for a robbery. You aren't doing anything illegal until you breach the house.
actually this is now illegal in some country - not this exactly, but I can't recall where, some country (Japan maybe) just passed a law where it's illegal to plan something illegal.
It's illegal most places, but impossible to prove.
-
I have installed using the hyperv image on my workstation. Have run a scan.
The scan results don't make any sense.
It is showing I am running about 10 different insecure versions of linux kernel, none of which I am running on the machine I scanned.
Above is a snippet of a pdf report of the scan showing me a list of kernels which are not on this server as far as I know.
uname -r
returns
-
Running
rpm -qa | grep kernel
showed 5 or 6 kernels still installed. whoops.
package-cleanup --oldkernels --count=2
removed all but the current and next oldest one. -
It's defiantly taking my cpu for a sprint.....
-
@momurda said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
Running
rpm -qa | grep kernel
showed 5 or 6 kernels still installed. whoops.
package-cleanup --oldkernels --count=2
removed all but the current and next oldest one.OpenVAS FTW.
-
As mentioned in the OP, OV is very resource inefficient. Nessus is a night and day difference, but isn't cheap.
-
@momurda said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
I have installed using the hyperv image on my workstation. Have run a scan.
The scan results don't make any sense.
It is showing I am running about 10 different insecure versions of linux kernel, none of which I am running on the machine I scanned.
Above is a snippet of a pdf report of the scan showing me a list of kernels which are not on this server as far as I know.
uname -r
returns
I've seen this before when credentials don't work and a vulnerability scanner has to guess the OS version. Are you sure the credentials worked on that first scan?
-
@IRJ said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
@momurda said in So you want to build a Security Program? Part 1 - Vulnerability Scanning:
I have installed using the hyperv image on my workstation. Have run a scan.
The scan results don't make any sense.
It is showing I am running about 10 different insecure versions of linux kernel, none of which I am running on the machine I scanned.
Above is a snippet of a pdf report of the scan showing me a list of kernels which are not on this server as far as I know.
uname -r
returns
I've seen this before when credentials don't work and a vulnerability scanner has to guess the OS version. Are you sure the credentials worked on that first scan?
Nvm reading comprehension helps.. Lol