RE: Scanners and unpublished vulnerabilities - Full Disclosure

From: Ballowe, Charles (CBalloweat_private)
Date: Thu May 30 2002 - 17:27:30 PDT

  • Next message: Jon Bull: "Fw: Scanners and unpublished vulnerabilities - Full Disclosure"

    An IDS is only really effective when you know the potential risk
    of a successful attack. Once something is triggering an IDS, it's 
    already hitting my systems. If I haven't been alerted to the nature
    of that particular risk, my IDS can't be properly set up to respond,
    and depending on the nature of the attack, it may be too late anyway. 
    
    If my IDS gives me an alert indicating an attempt to exploit a certain 
    vulnerability and searches for more information on that vulnerability 
    yield nothing, I'm going to start to wonder. If my IDS is coupled with 
    a packet capture mechanism, I'll still have the raw data that 
    triggered the alert. The only difference is whether I had the data
    before it was in the wild or not.
    
    Then there's the fact that IDS is a reactive technology and a scanner
    is proactive. Many companies treat security breaches in a reactive manner.
    This isn't the best approach and some are finally learning the lesson.
    Both are needed, but it's better to know before rather than after.
    
    Something else to keep in mind -- a security scanner need not actively
    exploit a vulnerability to identify it's presence. Host based scanners
    can simply check software versions/patch applications and compare to 
    known vulnerabilities/fixes in order to trip an alert. Network based
    scanners can use network version banners to do the same thing.
    
    -Charles Ballowe
    
     
    
    > -----Original Message-----
    > From: Jon Bull [mailto:jon.bullat_private]
    > Sent: Wednesday, May 29, 2002 9:07 PM
    > To: David Litchfield; Alfred Huger; pen-testat_private
    > Subject: Re: Scanners and unpublished vulnerabilities - Full 
    > Disclosure
    > 
    > 
    > Suggestion - Instead of making a scanner to test for a 
    > vulnerability that a
    > Typhoon user may not be able to prevent, why not create IDS 
    > software to
    > detect the exploit?  To me this seems a more defensive,  
    > responsible, and
    > effective role.
    > 
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
    Service. For more information on SecurityFocus' SIA service which
    automatically alerts you to the latest security vulnerabilities please see:
    https://alerts.securityfocus.com/
    



    This archive was generated by hypermail 2b30 : Fri May 31 2002 - 07:40:03 PDT