基於OSSIM平臺的漏洞掃描詳解

Ossim 中漏洞掃描詳解php

 

Openvas是一套開源漏洞掃描系統,若是手動搭建須要複雜的過程,花費很多人力和時間成本,由於它是套免費的漏洞掃描系統,功能上不遜色於商業版的漏洞掃描器,受到很多用戶的青睞,下表對比了NeXpose、RSAS和啓明的漏洞掃描器的主要功能。css

wKioL1ZmSn-DvJ1AAA0R5JyJkC4100.jpg

 

有了以上背景以後,下文主要針對OSSIM平臺下如何以圖形化方式操做漏洞掃描的過程。html

 

準備工做:首先確保沒有運行的掃描進程和任務java

wKiom1XtftnAx7HPAAF1CBy1EHI820.jpg

掃描漏洞同時升級漏洞庫會致使升級失敗。python

 

第一步同步插件mysql

#openvas-nvt-synclinux

[i] This script synchronizes an NVT collection with the 'OpenVAS NVT Feed'.ios

[i] The 'OpenVAS NVT Feed' is provided by 'The OpenVAS Project'.web

[i] Online information about this feed: 'http://www.openvas.org/openvas-nvt-feed.html'.spring

[i] NVT dir: /var/lib/openvas/plugins

[i] Will use rsync

[i] Using rsync: /usr/bin/rsync

[i] Configured NVT rsync feed: rsync://feed.openvas.org:/nvt-feed

OpenVAS feed server - http://www.openvas.org/

This service is hosted by Intevation GmbH - http://intevation.de/

All transactions are logged.

Please report synchronization problems to openvas-feed@intevation.de.

If you have any other questions, please use the OpenVAS mailing lists

or the OpenVAS IRC chat. See http://www.openvas.org/ for details.

receiving incremental file list

deleting gb_openssl_38562.nasl.asc

deleting gb_openssl_38562.nasl

./

COPYING

         588 100%  574.22kB/s    0:00:00 (xfer#1, to-check=13347/13355)

COPYING.GPLv2

       18002 100%   17.17MB/s    0:00:00 (xfer#2, to-check=13346/13355)

COPYING.files

     1819904 100%    1.77MB/s    0:00:00 (xfer#3, to-check=13345/13355)

DDI_Directory_Scanner.nasl

       32957 100%   32.74kB/s    0:00:00 (xfer#4, to-check=13342/13355)

DDI_Directory_Scanner.nasl.asc

         198 100%    0.20kB/s    0:00:00 (xfer#5, to-check=13341/13355)

... ...

同步數萬個插件時間比較長,消耗資源不大,能夠去喝杯咖啡啦,或者瞭解一下插件的組成。

 

            表1 Openvas主要腳本分類及分佈狀況

 

規則名稱

數量

備註

IIS_frontpage_DOS_2.nasl

1

phpbb

8

RA_ssh_detect

RA_www_css

RA_www_detect

3

RHSA_2009_03**

279

Redhat Security Advisory

3com_switches

1

weblogic*

3

cisco_ids

cisco_***

ciscoworks

16

awstats

4

apache

23

DDI

30

EZ_hotscripts

3

anti_nessus

1

basilix

8

bluecoat

1

bugbear

3

bugzilla

9

ca_unicenter

2

cacti

5

calendar

3

Spoll_7_5_sql_injection

2

avaya_switches

1

citrix

8

clamav

2

CUPS

12

cutenews

12

checkpoint

6

cheopsNG

4

cvstrac

24

DB2

4

deb_*.nasl

2595

Debian Linux

DNS

5

deluxeBB

3

eftp

3

ls exchange*

exchange

2

fcore

684

find_service

5

fortigate

1

freebsd

2009

ftp

30

gb_CESA

1528

gb_RHSA

871

gb_adobe

167

gb_apple

70

gb_baofeng_storm

3

gb_bpsoft

3

gb_clamav

16

gb_ccproxy

2

gb_clamav

16

gb_fedora

4679

gb_google

162

gb_hp_ux

242

HP-UNIX

gb_ibm_db2

27

gb_ibm_websphere

8

gb_ibm_tivoli

5

gb_ibm_was

16

gb_ibm_lotus

10

gb_mandriva

1684

gb_java

2

gb_kaspersky

6

gb_google_chrome

153

gb_foxmail

2

gb_fsecure

7

gb_ms

155

Windows 相關

gb_ubuntu

1261

gb_samba

12

gb_sun_java

35

gb_wireshark

87

glsa

1727

gb_vmware

41

IIS

20

lotus

5

ipswitch

5

mysql

5

gb_nmap

187

nortel

7

nagios

5

openssh

4

oscommerce

5

postgresql

5

phpgroupware

12

phpmyadmin

7

phpbb

8

smb

52

sendmail

15

suse

65

ssh

11

smtp

9

Ubuntu

179

tomcat

6

tftp

11

wu_ftpd

6

 

第二步更新插件(作這一步操做,建議在輕負載下進行)

#perl /usr/share/ossim/scripts/vulnmeter/updateplugins.pl migrate            /* 比較消耗CPU和磁盤I/O  */

2015-09-07 07:27:33   Framework profile has been found...

2015-09-07 07:27:33   Deleting all tasks in 192.168.11.150 ...

2015-09-07 07:27:33   updateplugins: configured to not updateplugins

2015-09-07 07:27:33   updateplugins: configured to not repair DB

2015-09-07 07:27:33   BEGIN  - DUMP PLUGINS

2015-09-07 07:29:01   FINISH - DUMP PLUGINS [ Process took 88 seconds ]

2015-09-07 07:29:01   BEGIN  - IMPORT PLUGINS

2015-09-07 07:30:00   FINISH - IMPORT PLUGINS [ 40473 plugins - Process took 59 seconds ]

2015-09-07 07:30:00   BEGIN  - UPDATE CATEGORIES

2015-09-07 07:30:00   FINISH - UPDATE CATEGORIES [ Process took 0 seconds ]

2015-09-07 07:30:00   BEGIN  - UPDATE FAMILIES

2015-09-07 07:30:00   FINISH - UPDATE FAMILIES [ Process took 0 seconds ]

2015-09-07 07:30:00   BEGIN  - UPDATE OPENVAS_PLUGINS

2015-09-07 07:30:03   FINISH - UPDATE OPENVAS_PLUGINS [ Process took 3 seconds ]

2015-09-07 07:30:03   BEGIN  - UPDATE NESSUS_PREFERENCES

2015-09-07 07:30:03   show tables like "vuln_nessus_preferences_defaults"

2015-09-07 07:30:03   updateprefs: Getting plugin preferences

2015-09-07 07:30:05   FINISH - UPDATE NESSUS_PREFERENCES [ Process took 2 seconds ]

 

2015-09-07 07:30:06   Creating Deep profile...

2015-09-07 07:30:06   Filling categories...............

2015-09-07 07:30:06   Done

2015-09-07 07:30:06   Filling families.............................................................

2015-09-07 07:30:06   Done

2015-09-07 07:30:06   Filling plugins...

2015-09-07 07:30:13   Filling preferences in Alienvault DB...

2015-09-07 07:30:14   Done

2015-09-07 07:30:14   Deep profile inserted

 

2015-09-07 07:30:15   Creating Default profile...

2015-09-07 07:30:15   Filling categories...............

2015-09-07 07:30:15   Done

2015-09-07 07:30:15   Filling families.............................................................

2015-09-07 07:30:15   Done

2015-09-07 07:30:15   Filling plugins...

2015-09-07 07:30:23   Filling preferences in Alienvault DB...

2015-09-07 07:30:24   Done

2015-09-07 07:30:24   Default profile inserted

 

2015-09-07 07:30:24   Creating Ultimate profile...

2015-09-07 07:30:24   Filling categories...............

2015-09-07 07:30:24   Done

2015-09-07 07:30:24   Filling families.............................................................

2015-09-07 07:30:24   Done

2015-09-07 07:30:24   Filling plugins...

2015-09-07 07:30:32   Filling preferences in Alienvault DB...

2015-09-07 07:30:33   Done

2015-09-07 07:30:33   Ultimate profile inserted

 

2015-09-07 07:30:33   BEGIN  - UPDATE PORT SCANNER

2015-09-07 07:30:35   FINISH - UPDATE PORT SCANNER [ Process took 2 seconds ]

 

Updating plugin_sid vulnerabilities scanner ids

plugins fetched

Updating...

Script id:94151, Name:IT-Grundschutz M4.288: Sichere Administration von VoIP-Endger?ten, Priority:0

Script id:703073, Name:Debian Security Advisory DSA 3073-1 (libgcrypt11 - security update), Priority:1

Script id:804624, Name:Adobe Reader Plugin Signature Bypass Vulnerability (Windows), Priority:2

Script id:868149, Name:Fedora Update for kernel FEDORA-2014-9959, Priority:5

Script id:95048, Name:IT-Grundschutz M5.145: Sicherer Einsatz von CUPS, Priority:0

Script id:842216, Name:Ubuntu Update for linux USN-2616-1, Priority:4

Script id:105036, Name:Open××× Detection, Priority:0

Script id:868005, Name:Fedora Update for audacious-plugins FEDORA-2014-8183, Priority:1

Script id:869350, Name:Fedora Update for springframework FEDORA-2015-6862, Priority:5

 

… …

 

Script id:105084, Name:Multiple ManageEngine Products  Arbitrary File Upload Vulnerability, Priority:3

Script id:867751, Name:Fedora Update for python-keystoneclient FEDORA-2014-5555, Priority:3

Script id:882209, Name:CentOS Update for nss CESA-2015:1185 centos6, Priority:2

Script id:842209, Name:Ubuntu Update for libmodule-signature-perl USN-2607-1, Priority:5

 

通過一刻鐘等待終於更新完成。注意,該過程須要一鼓作氣,中途不能強制退出。

 

下面用時間軸表示每一個步驟的演進順序和所花費的時間,以下圖所示。從某日的00:34:34開始到00:38:50結束的過程。

wKiom1XunICxpgxEAAIHATM9vVg625.jpg


若是有些用戶不習慣在CLI下操做升級命令,這一工做一樣能夠在WebUI中完成。

wKioL1X0vLfA3pxgAAU5hxIK-AE652.jpg




第三步驗證更新

wKioL1XtgIbA2ed0AAR2Om_EnAw841.jpg

咱們看到最後一行顯示總數爲40473,這個數值和下載的插件數量一直,表明升級完成。


注意:漏洞升級視頻你們可訪問:http://www.tudou.com/programs/view/kyTmc42Ky14/


第四步:開始漏洞掃描-定製策略

首先掃描資產,創建資源池,這裏就不詳細介紹。在OSSIM系統裏默認定義了三種策略,默認爲Default,該策略最爲經常使用。

wKioL1XtgxnBYERyAAFhgWecCV8590.jpg

若是須要更改策略,請點擊CREATE NEW PROFILE按鈕。

wKiom1XtgaeySCgUAAPyD_PqcrQ798.jpg接着開始掃描,填寫任務名稱,選擇Sensor,選擇策略,選擇資源池內的主機,最後點擊新建任務按鈕。

wKioL1XthFPw2OLmAAbfSbhMeXQ389.jpg

 

掃描準備

wKioL1XthifBwPEPAAIscflNE6o315.jpg

 

漏洞掃描時那些進程最繁忙?

HtopLinux系統中的一個互動的進程查看工具命令能夠幫助管理員瞭解掃描發生的變化。#htop  -d 50

wKiom1XunnSB3E1pAAJIvu_AV9k860.jpg

一次掃描多少機器合適?

若是所監控網段服務器數量超過25臺,這裏假設是100臺,那麼至少分4次掃描,例如直接輸入「192.168.11.0/24」,這樣表示一個網段,那麼OSSIM系統負載將會明顯增大,掃描等待時間明顯延長,可能會長達數天,直到超過一個計劃任務的週期,這樣可能形成一個惡性循環,直到拖垮整個系統

wKiom1YMif6xBpKLAAJ3eeK0270268.jpg

進過300多分鐘都沒有結束的任務最後逃脫不了失敗的命運。


wKioL1XuoFGDWCkTAAL-c7u2q-c994.jpg

掃描結果分析

wKiom1XtgtLD69KEAAMHdkgxZ68595.jpg

wKioL1XthPyyMvQxAANaYKVbrOs014.jpg

 不過在分析時,談到「過期」的漏洞問題,在一些古老些操做系統Windows NT/2000Solaris7/8Linux2.2 2.4內核)曾經存在的那些系統漏洞、網絡服務器漏洞,在現代系統中已經絕跡,受影響系統已經被修復,這種漏洞變得沒有任何價值。對這些系統進行漏洞掃描變得沒有意義。

相關文章
相關標籤/搜索