This method will scan the web server for the top 20 vulnerabilities list published by SANS/FBI (www.sans.org)
- WebInspect is an impressive Web server and application-level vulnerability scanner which scans over 1500 known attacks.
- It checks site contents and analyzes for rudimentary application-issues like smart guesswork checks, password guessing, parameter passing, and hidden parameter checks.
- It can analyze a basic Webserver in 4 minutes cataloging over 1500 HTML pages
- Security scanner is designed to identify known and unknown vulnerabilities, suggest fixes to identified vulnerabilities, and report possible security holes within a network's internet, intranet and extranet environments.
- Shadow Security Scanner includes vulnerability auditing modules for many systems and services.These include NetBIOS, HTTP, CGI and WinCGI, FTP, DNS, DoS vulnerabilities, POP3, SMTP,LDAP,TCP/IP, UDP, Registry, Services, Users and accounts, Password vulnerabilities, publishing extensions, MSSQL,IBM DB2, Oracle, MySQL, PostgressSQL, Interbase, MiniSQL and
- IISLockdown:
- IISLockdown restricts anonymous access to system utilities as well as the ability to write to Web content directories.
- It disables Web Distributed Authoring and Versioning (WebDAV).
- It installs the URLScan ISAPI filter.
- URLScan:
- URLScan is a security tool that screens all incoming requests to the server by filtering the requests based on rules that are set by the administrator.
- Web servers assume critical importance in the realm of Internet security.
- Vulnerabilities exist in different releases of popular web servers and respective vendors patch these often.
- The inherent security risks owing to compromised web servers have impact on the local area networks that host these web sites, even the normal users of web browsers.
- Looking through the long list of vulnerabilities that had been discovered and patched over the past few years provide an attacker ample scope to plan attacks to unpatched servers.
- Different tools/exploit codes aids an attacker perpetrate web server hacking.
- Countermeasures include scanning, for existing vulnerabilities and patching them immediately, anonymous access restriction, incoming traffic request screening and filtering.
No comments:
Post a Comment