
Copyright © 2002-2012 Tenable Network Security, Inc.
What is a Passive Vulnerability Scanner ID? .............................................................................29
Internal Passive Vulnerability Scanner IDs ................................................................................29
Working with Passive Vulnerability Scanner Plugins ............................................................30
Vulnerability and Passive Fingerprint Overview .........................................................................30
Downloading New Vulnerability Plugins ................................................................................30
Writing Custom Plugin Libraries ............................................................................................30
Restarting the Passive Vulnerability Scanner........................................................................31
Writing Passive Vulnerability Scanner Plugins ..........................................................................31
Plugin Keywords ...................................................................................................................31
Plugin Libraries .....................................................................................................................34
Basic Passive Vulnerability Scanner Example ......................................................................34
More Complex Passive Vulnerability Scanner Example ........................................................35
Case Insensitive Example.....................................................................................................36
Passive Vulnerability Scanner Network Client Detection .......................................................36
The Passive Vulnerability Scanner can Match “Previous” Packets ........................................37
The Passive Vulnerability Scanner can Match Binary Data ...................................................38
Negative Matches .................................................................................................................38
Time Dependent Plugins ......................................................................................................39
Writing Passive Vulnerability Scanner Real-Time Plugins .........................................................40
Real-Time Plugin Model .......................................................................................................40
New Keywords ......................................................................................................................40
Example Failed Telnet Login Plugin ......................................................................................41
Example Finger User List Enumeration Plugin ......................................................................41
Example Unix Password File Download Web Server Plugin .................................................42
Example Generic Buffer Overflow Detection on Windows Plugin ..........................................42
Passive Vulnerability Scanner Corporate Policy Plugins ...........................................................44
Detecting Custom Activity Prohibited by Policy .....................................................................44
Detecting Confidential Data in Motion ...................................................................................46
Passive Vulnerability Scanner Operating System Fingerprints ............................................48
Passive Operating System Fingerprinting .................................................................................48
Understanding the Fingerprint Language ..................................................................................48
Adding New Fingerprints ...........................................................................................................49
For Further Information ...........................................................................................................49
About Tenable Network Security .............................................................................................50
Appendix 1: Example pvs.conf Configuration File.................................................................51
Appendix 2: Working with SecurityCenter..............................................................................56
Architecture ...............................................................................................................................56
Managing Vulnerabilities ...........................................................................................................56
Managing IDS Events ...............................................................................................................56
The Passive Vulnerability Scanner is Real-Time .......................................................................57
Appendix 3: Working with Nessus ..........................................................................................58
Tuning for Nessus Only Reporting ............................................................................................58
Comentarios a estos manuales