ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Network Vulnerability Scan with REporting

    Scheduled Pinned Locked Moved Solved IT Discussion
    network scanningnetwork securitysnortossec
    24 Posts 7 Posters 2.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • dafyreD
      dafyre
      last edited by

      OpenVAS is a good one.

      dbeatoD 1 Reply Last reply Reply Quote 0
      • dbeatoD
        dbeato @dafyre
        last edited by

        @dafyre said in Network Vulnerability Scan with REporting:

        OpenVAS is a good one.

        That is what I am using right now, it has great reporting.

        1 Reply Last reply Reply Quote 1
        • dafyreD
          dafyre @dbeato
          last edited by

          @dbeato said in Network Vulnerability Scan with REporting:

          @kelly said in Network Vulnerability Scan with REporting:

          @dbeato said in Network Vulnerability Scan with REporting:

          @kelly said in Network Vulnerability Scan with REporting:

          What perspective are you scanning from: external; internal, uncredentialed; or internal, trusted? That will affect the tools you use. We used Lynis (https://cisofy.com/lynis/), but that was more about compliance and vulnerability testing from an internal, trusted perspective.

          We will be using it internally, and ocassionalky external host but 98% will be internal.

          I liked Lynis, but it runs on every device you need to scan rather than performing an external scan. This is more about hardening to protect from an attack instead of simulating a hostile reconnaissance.

          So it is agent based, I have used OSSEC and OSSIM for that too.

          OSSIM is good, as I think it has a built in Vulnerability scanner too, but it's more like a Snort / Suricata / IDS log collecter, IIRC.

          dbeatoD 1 Reply Last reply Reply Quote 0
          • dbeatoD
            dbeato @dafyre
            last edited by

            @dafyre said in Network Vulnerability Scan with REporting:

            @dbeato said in Network Vulnerability Scan with REporting:

            @kelly said in Network Vulnerability Scan with REporting:

            @dbeato said in Network Vulnerability Scan with REporting:

            @kelly said in Network Vulnerability Scan with REporting:

            What perspective are you scanning from: external; internal, uncredentialed; or internal, trusted? That will affect the tools you use. We used Lynis (https://cisofy.com/lynis/), but that was more about compliance and vulnerability testing from an internal, trusted perspective.

            We will be using it internally, and ocassionalky external host but 98% will be internal.

            I liked Lynis, but it runs on every device you need to scan rather than performing an external scan. This is more about hardening to protect from an attack instead of simulating a hostile reconnaissance.

            So it is agent based, I have used OSSEC and OSSIM for that too.

            OSSIM is good, as I think it has a built in Vulnerability scanner too, but it's more like a Snort / Suricata / IDS log collecter, IIRC.

            OSSIM is Alien Vault OpenSource and can be more convoluted that OpenVAS as it just has so much information and also can be your Syslog Server as well. It is pretty big.

            stacksofplatesS IRJI 2 Replies Last reply Reply Quote 1
            • stacksofplatesS
              stacksofplates @dbeato
              last edited by

              @dbeato said in Network Vulnerability Scan with REporting:

              @dafyre said in Network Vulnerability Scan with REporting:

              @dbeato said in Network Vulnerability Scan with REporting:

              @kelly said in Network Vulnerability Scan with REporting:

              @dbeato said in Network Vulnerability Scan with REporting:

              @kelly said in Network Vulnerability Scan with REporting:

              What perspective are you scanning from: external; internal, uncredentialed; or internal, trusted? That will affect the tools you use. We used Lynis (https://cisofy.com/lynis/), but that was more about compliance and vulnerability testing from an internal, trusted perspective.

              We will be using it internally, and ocassionalky external host but 98% will be internal.

              I liked Lynis, but it runs on every device you need to scan rather than performing an external scan. This is more about hardening to protect from an attack instead of simulating a hostile reconnaissance.

              So it is agent based, I have used OSSEC and OSSIM for that too.

              OSSIM is good, as I think it has a built in Vulnerability scanner too, but it's more like a Snort / Suricata / IDS log collecter, IIRC.

              OSSIM is Alien Vault OpenSource and can be more convoluted that OpenVAS as it just has so much information and also can be your Syslog Server as well. It is pretty big.

              I forgot to mention this one. Wazuh combines ELK and OSSEC. I played with it a while ago and it wasn't too bad to set up.

              1 Reply Last reply Reply Quote 2
              • dbeatoD
                dbeato
                last edited by

                OpenVAS has been working fine, now I am playing with Wazuh 🙂

                1 Reply Last reply Reply Quote 0
                • IRJI
                  IRJ @dbeato
                  last edited by

                  @dbeato said in Network Vulnerability Scan with REporting:

                  @dafyre said in Network Vulnerability Scan with REporting:

                  @dbeato said in Network Vulnerability Scan with REporting:

                  @kelly said in Network Vulnerability Scan with REporting:

                  @dbeato said in Network Vulnerability Scan with REporting:

                  @kelly said in Network Vulnerability Scan with REporting:

                  What perspective are you scanning from: external; internal, uncredentialed; or internal, trusted? That will affect the tools you use. We used Lynis (https://cisofy.com/lynis/), but that was more about compliance and vulnerability testing from an internal, trusted perspective.

                  We will be using it internally, and ocassionalky external host but 98% will be internal.

                  I liked Lynis, but it runs on every device you need to scan rather than performing an external scan. This is more about hardening to protect from an attack instead of simulating a hostile reconnaissance.

                  So it is agent based, I have used OSSEC and OSSIM for that too.

                  OSSIM is good, as I think it has a built in Vulnerability scanner too, but it's more like a Snort / Suricata / IDS log collecter, IIRC.

                  OSSIM is Alien Vault OpenSource and can be more convoluted that OpenVAS as it just has so much information and also can be your Syslog Server as well. It is pretty big.

                  Alien vault just uses openvas with their gui on top. I've confirmed this with their support.

                  dbeatoD 1 Reply Last reply Reply Quote 2
                  • dbeatoD
                    dbeato @IRJ
                    last edited by

                    @irj said in Network Vulnerability Scan with REporting:

                    @dbeato said in Network Vulnerability Scan with REporting:

                    @dafyre said in Network Vulnerability Scan with REporting:

                    @dbeato said in Network Vulnerability Scan with REporting:

                    @kelly said in Network Vulnerability Scan with REporting:

                    @dbeato said in Network Vulnerability Scan with REporting:

                    @kelly said in Network Vulnerability Scan with REporting:

                    What perspective are you scanning from: external; internal, uncredentialed; or internal, trusted? That will affect the tools you use. We used Lynis (https://cisofy.com/lynis/), but that was more about compliance and vulnerability testing from an internal, trusted perspective.

                    We will be using it internally, and ocassionalky external host but 98% will be internal.

                    I liked Lynis, but it runs on every device you need to scan rather than performing an external scan. This is more about hardening to protect from an attack instead of simulating a hostile reconnaissance.

                    So it is agent based, I have used OSSEC and OSSIM for that too.

                    OSSIM is good, as I think it has a built in Vulnerability scanner too, but it's more like a Snort / Suricata / IDS log collecter, IIRC.

                    OSSIM is Alien Vault OpenSource and can be more convoluted that OpenVAS as it just has so much information and also can be your Syslog Server as well. It is pretty big.

                    Alien vault just uses openvas with their gui on top. I've confirmed this with their support.

                    YEs, just too many things in one system.

                    1 Reply Last reply Reply Quote 2
                    • nadnerBN
                      nadnerB
                      last edited by

                      We're using InsightVM (product of Rapid7).

                      1 Reply Last reply Reply Quote 0
                      • ObsolesceO
                        Obsolesce
                        last edited by Obsolesce

                        I really like OpenVAS and never noticed it being slow... it scans, and reports it's findings in an excellent way. Very intuitive and useful. It is worth spinning one up.

                        dbeatoD 1 Reply Last reply Reply Quote 0
                        • dbeatoD
                          dbeato @Obsolesce
                          last edited by

                          @obsolesce said in Network Vulnerability Scan with REporting:

                          I really like OpenVAS and never noticed it being slow... it scans, and reports it's findings in an excellent way. Very intuitive and useful. It is worth spinning one up.

                          It is slow to start the tasks

                          IRJI 1 Reply Last reply Reply Quote 0
                          • IRJI
                            IRJ @dbeato
                            last edited by

                            @dbeato said in Network Vulnerability Scan with REporting:

                            @obsolesce said in Network Vulnerability Scan with REporting:

                            I really like OpenVAS and never noticed it being slow... it scans, and reports it's findings in an excellent way. Very intuitive and useful. It is worth spinning one up.

                            It is slow to start the tasks

                            Definitely.

                            Nessus is so much faster. In a big environment, OpenVas just isn't usable. It isn't bad for smaller environments, though.

                            dbeatoD 1 Reply Last reply Reply Quote 1
                            • ObsolesceO
                              Obsolesce
                              last edited by

                              What does everything OpenVAS does, and giving you the same info such as fixes/resolutions, but is faster for larger environments?

                              IRJI 1 Reply Last reply Reply Quote 0
                              • dbeatoD
                                dbeato @IRJ
                                last edited by

                                @irj said in Network Vulnerability Scan with REporting:

                                @dbeato said in Network Vulnerability Scan with REporting:

                                @obsolesce said in Network Vulnerability Scan with REporting:

                                I really like OpenVAS and never noticed it being slow... it scans, and reports it's findings in an excellent way. Very intuitive and useful. It is worth spinning one up.

                                It is slow to start the tasks

                                Definitely.

                                Nessus is so much faster. In a big environment, OpenVas just isn't usable. It isn't bad for smaller environments, though.

                                Yes, that is expensive.

                                1 Reply Last reply Reply Quote 0
                                • IRJI
                                  IRJ @Obsolesce
                                  last edited by

                                  @obsolesce said in Network Vulnerability Scan with REporting:

                                  What does everything OpenVAS does, and giving you the same info such as fixes/resolutions, but is faster for larger environments?

                                  Yeah, but OpenVas is a resource pig, and the reporting isnt very good when you are reporting against thousands of systems, and you need to break them up into smaller groups. Also it isnt ideal for enterprise as permissions are a nightmare when you only want certain people to see certain assets.

                                  It is actually much more expensive for a large company to try to use OpenVas

                                  ObsolesceO 1 Reply Last reply Reply Quote 1
                                  • ObsolesceO
                                    Obsolesce @IRJ
                                    last edited by

                                    @irj said in Network Vulnerability Scan with REporting:

                                    @obsolesce said in Network Vulnerability Scan with REporting:

                                    What does everything OpenVAS does, and giving you the same info such as fixes/resolutions, but is faster for larger environments?

                                    Yeah, but OpenVas is a resource pig, and the reporting isnt very good when you are reporting against thousands of systems, and you need to break them up into smaller groups. Also it isnt ideal for enterprise as permissions are a nightmare when you only want certain people to see certain assets.

                                    It is actually much more expensive for a large company to try to use OpenVas

                                    I'm not using it for thousands of systems at once, and permissions are not an issue. At most a scan is against a hundred or two devices at once. Maybe that's why I haven't noticed any slow or clunkyness.

                                    But for in the future, I am curious of what to use that compares to OpenVAS, but is better with speed and permissions?

                                    1 Reply Last reply Reply Quote 0
                                    • 1
                                    • 2
                                    • 1 / 2
                                    • First post
                                      Last post