A VA scanner geeks will love

Wednesday, 12 November 2003, 12:41 PM EST

Networks are dynamic, constantly changing with the addition of new devices and services--each with vulnerabilities and risky configurations. Vulnerability assessment tools that take snapshots don't reflect this ceaseless flux. That's where Tenable Network Security steps in, taking a completely passive approach to flush out network exposures with its NeVO application.

NeVO passively sniffs traffic at network choke points, performing signature and protocol analysis to update its network map. It fingerprints network device OSes, comparing TCP and IP header information with known OS standards. It can output ad hoc or interval reports on known hosts, system vulnerabilities and client systems connected to the network. And, it provides numerous vulnerability signatures, supporting download updates and custom signatures.

Impressive, yes, but what NeVO lacks is a user-friendly interface. Both the management and output reports are through a command-line interface--it offers no built-in reporting or administration and management functionality. Its fingerprinting of system OSes is less than reliable. And, it only runs on Red Hat/FreeBSD.

[ Read more ]




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //