Font Size: a A A

Design And Implementation Of Vulnerabilities Scanner Tool

Posted on:2009-06-29Degree:MasterType:Thesis
Country:ChinaCandidate:F M GuoFull Text:PDF
GTID:2178360242983959Subject:Cartography and Geographic Information Engineering
Abstract/Summary:PDF Full Text Request
Each system has the vulnerabilities, no matter you put in how many financial resource in the system safety, the aggressor still might discover some may the use characteristic and the disposition flaw. Is better late than never, the sheep has lost after all, was inferior before sheep loss, inspects the jail well the vulnerabilities, once discovers the prompt repair.This article discussed the network system existence vulnerabilities as well as the main solution in detail. Discovered that a known vulnerabilities, discovered an unknown vulnerabilities is much easier than, this means: The most aggressors use is the common vulnerabilities, these vulnerabilitiess, have the written material record. Uses the suitable tool, can before the hacker uses these common vulnerabilitiess, finds out system's weakness. Easily discovers these vulnerabilitiess fast, is LSGW (Leak Scanner of GardWay, country health vulnerabilities scanning) the vulnerabilities scans tool's main mission.The vulnerabilities, divides into two broad headings on the whole: 1) the software compilation creates wrongly vulnerabilities; 2) the software disposes the vulnerabilities which creates improper. LSGW can examine above two types the vulnerabilities. The LSGW vulnerabilities scans the tool to be composed of two main modules: First, scanning module, including port scanning and invasion scanning; second, leaks the storage cavern construction module, including to plug-in unit's classification and renewal. The LSGW principle of work is: Uses the SSH communication protocol long-distance to inquire the Unix/Linux main engine, gains this main engine's system message, is mainly the system module information, then analyzes this main engine in the local host all the installation procedure the edition information, with local vulnerabilities storehouse in newest issue vulnerabilities plug-in unit match, according to corresponding rule judgment long-distance main engine various subsystems whether to have the vulnerabilities, as well as corresponding risk rank. LSGW not can only propose the risk early warning, but can also provide the help user repair vulnerabilities's solution. LGSM and the common vulnerabilities scan tool's biggest difference are: LSGW provides the immediate monitoring and proposes the early warning to network system's security.
Keywords/Search Tags:Network security, Vulnerabilities, Port Scan, Intrusion Detection, Security Assessment
PDF Full Text Request
Related items