Shadow Security Scanner - PowerPoint PPT Presentation

About This Presentation
Title:

Shadow Security Scanner

Description:

DoS checker for HTTP, SMTP, FTP, POP3 and IMAP protocols. Multiple Report Format ... 119(NNTP),135(PRC-LOCATOR),139(NETBIOS-SSN),143(IMAP),389(LDAP),445(MICROSO FT-DS) ... – PowerPoint PPT presentation

Number of Views:94
Avg rating:3.0/5.0
Slides: 20
Provided by: jess8
Category:

less

Transcript and Presenter's Notes

Title: Shadow Security Scanner


1
Shadow Security Scanner
  • Li,Guorui

2
Introduction
  • Remote computer vulnerabilities scanner
  • Runs on Windows Operating Systems
  • SSS also scans servers built practically on any
    platform
  • Over 2000 security audits
  • Latest edition (V.7.25)

3
Features
  • Easy used wizard
  • Complete Scan
  • Full Scan
  • Quick Scan
  • Only NetBios Scan
  • Only FTP Scan
  • Only HTTP Scan

4
Ease of use cont
  • Build-in modules

5
  • Ports

6
  • Audits

7
Flexible scanning
  • add a range of hosts

8
Flexible scanning cont
  • Scheduler

9
Up-To-Date Security Vulnerability Database
  • Automatic updates
  • BaseSDK
  • C Programming SDK

10
DoS Checker
  • Denial of Service check
  • DoS checker for HTTP, SMTP, FTP, POP3 and IMAP
    protocols

11
Multiple Report Format
  • SSS offers scanned session log in XML, PDF, RTF
    and CHM (compiled HTML) formats

12
Testing Environment
  • Test was done in a home network (Windows)
  • Source computer
  • jesse (192.168.1.93)
  • Target computers
  • jesse (192.168.1.93)
  • lisaliu (192.168.1.92)
  • tony (192.168.1.152)

13
Testing Environment cont
  • speed

14
  • TCP Port 21 (FTP), 22 (SSH), 23(TELNET),
    25(SMTP),53(DOMAIN),79(FIGER),80(WWW-HTTP),113(IDE
    NT),119(NNTP),135(PRC-LOCATOR),139(NETBIOS-SSN),14
    3(IMAP),389(LDAP),445(MICROSOFT-DS)

15
  • Audits 19 categories in total of 2532 audits are
    perform during this test

16
Results
  • Shadow Security Scanner took about 7 minutes
  • SSS has gone through all the modules, 14 ports
    and 2532 audits for each of the computers on the
    host list.
  • Lower than 30 percents of CPU usage

17
(No Transcript)
18
(No Transcript)
19
Conclusion
  • real commercial security scanner
  • user friendly interface
  • expendable vulnerabilities database
  • flexible scanning and reports
Write a Comment
User Comments (0)
About PowerShow.com