cc/td/doc/product/iaabu/csscan/csscan2
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Network Security Database

Network Security Database

This chapter describes the Cisco Secure Scanner Network Security Database (NSDB)---a powerful database that allows you to understand and research vulnerabilities that the Scanner encounters on your network.

This chapter includes the following sections:

NSDB

The NSDB is an online, HTML-based reference guide. The NSDB provides background information on the vulnerabilities detected by sessions and can be accessed from several places in the Scanner.

Figure 10-1 shows the main screen of the NSDB.


Figure 10-1: NSDB Main Screen

Accessing the NSDB

The NSDB can be accessed from several places in the Scanner.

This section includes the following topics:

From the Scanner Main Window

To access the NSDB from the Scanner main window, click Show NSDB on the toolbar or click NSDB Links on the File menu.

From the Grid Browser

To access the NSDB from the Grid Browser, follow these steps:

Step 1 Select a data cell and right-click.

Step 2 Click NSDB on the pop-up menu

or

click Show NSDB on the toolbar.

Step 3 If you are in a drill-down list, select any service or vulnerability, right-click and click NSDB on the pop-up menu

or

click Show NSDB on the toolbar.

While Data Pivoting

To access the NSDB while data pivoting, follow these steps:

Step 1 Drill down to the IP Address folder by double-clicking the cell for which you want more information.

Step 2 Click the plus character "+" to expand the menu to see the services and vulnerabilities associated with that host.

Step 3 From the IP Address folder, select any item under Service or Vulnerabilities.

Step 4 Right-click the item and click NSDB on the Vulnerabilities menu

or

select a vulnerability and click Show NSDB on the toolbar.

Another window opens and shows the vulnerability information on the toolbar.

From the Session Configuration Dialog Box

To access the NSDB from the Session Configuration dialog box, follow these steps:

Step 1 Open the Session Configuration dialog box by clicking Create New Session on the toolbar of the Scanner main window

or

select Scanner Sessions, right-click, and click Create New Session on the pop-up menu.

The Session Configuration dialog box appears on screen.

Step 2 Click the Vulnerabilities tab on the Session Configuration dialog box.

Step 3 Select Enable active probes.

This activates the Vulnerability Confirmation group box.

Step 4 Click any vulnerability under Vulnerability Confirmation, right-click, and click Help.

This opens the NSDB to the entry that you have chosen.

Understanding the NSDB

The following sections describe important features of the NSDB.

This section contains the following topics:

NSDB Entries

The Scanner's NSDB entries contain the following information:

Figure 10-2 shows a typical NSDB entry.


Figure 10-2: NSDB Entry

NSDB Icons

Table 10-1 describes the icons used in the NSDB.


Table 10-1: NSDB Icons
Icon Description

Severity Level 1---Indicates that this vulnerability is a Level 1 vulnerability (see "Severity Level 1" for more information)

Severity Level 2---Indicates that this vulnerability is a Level 2 vulnerability (see "Severity Level 2" for more information)

Severity Level 3--- Indicates that this vulnerability is a Level 3 vulnerability (see "Severity Level 3" for more information)

Host vulnerability---Indicates that the vulnerability is found at the host level

Network vulnerability---Indicates that the vulnerability is found at the network level

Access---Indicates that the vulnerability allows some type of access to machine or data, such as remote access or a user going from normal user to super user

Denial of service---Indicates that the vulnerability allows some type of denial of service, such as causing a machine to crash or tying up a mail server so that it cannot accept mail

Reconnaissance---Indicates that the vulnerability allows an attacker to gain some type of information useful to them in future attacks

Relay attack to a third target---Indicates that the vulnerability allows a machine to be used as a conduit to attack some other machine, for example, an FTP bounce attack in which traffic is relayed through an FTP server to attack a third machine

Other---Covers all other types of vulnerabilities

Severity Levels Defined

Vulnerabilities are categorized under three levels of severity in the NSDB. Severity
Level 1 is the least serious threat while Severity Level 3 is the most serious.

This section includes the following topics:

Severity Level 1

Most Level 1 vulnerabilities permit reconnaissance activities that allow would-be intruders to collect network topology and configuration information, including active IP addresses, active network services, valid usernames, and so forth. These vulnerabilities do not directly lead to unauthorized access, but they should be corrected to make it difficult for intruders to "rattle the doorknobs" on your network. Some data access vulnerabilities that are relatively minor or for which exploit tools are not easily available are also classified as Level 1.

Severity Level 2

Most Level 2 vulnerabilities permit some level of unauthorized data access or denial of service. These vulnerabilities can frequently be leveraged to allow intruders to eventually gain complete control of network resources. Level 2 vulnerabilities should be corrected as soon as possible.

Severity Level 3

Most Level 3 vulnerabilities permit intruders to execute arbitrary commands on network servers. The ability to execute commands on a system generally implies the ability to cause denial of service or to gain unauthorized data access. These vulnerabilities frequently allow intruders to establish a base of operations within your network from which they can capture network traffic and spread their span of control. Level 3 vulnerabilities should be corrected immediately.

Scanner Vulnerabilities List

As Scanner vulnerability exploits are added to and updated, a new list will appear on the Cisco web site. Check the site for new updates.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Jun 29 14:04:24 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.