Google has released Open Source Vulnerability scanner.
It is an extensible network scanner for detecting high-severity vulnerabilities with as little false-positives as possible.
It is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. It is an extensible network scanning engine for detecting high severity vulnerabilities with high confidence in an unauthenticated manner.
Features
Google leverages Google's Kubernetes Engine (GKE) to continuously scan and protect all of our externally facing systems with the Tsunami scanning engine.
When scanning a system, Tsunami executes a two-step process:
Reconnaissance: In the first step, Tsunami detects open ports; then subsequently identifies protocols, services, and other software running on the target host using a set of fingerprinting plugins. To avoid reinventing the wheel, Tsunami leverages existing tools such as nmap for some of these tasks.
Vulnerability verification: Based on the information gathered through reconnaissance, Tsunami selects all vulnerability verification plugins matching the identified services. To confirm that a vulnerability indeed exists Tsunami executes a fully working, benign exploit.
Tsunami is released under the Apache 2.0 license. Tsunami is not an official Google product.
It is an extensible network scanner for detecting high-severity vulnerabilities with as little false-positives as possible.
It is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. It is an extensible network scanning engine for detecting high severity vulnerabilities with high confidence in an unauthenticated manner.
Features
- Tsunami supports small manually curated set of vulnerabilities
- Tsunami detects high severity, RCE-like vulnerabilities, which often actively exploited in the wild
- Tsunami generates scan results with high confidence and minimal false-positive rate.
- Tsunami detectors are easy to implement.
- Tsunami is easy to scale, executes fast and scans non-intrusively.
Google leverages Google's Kubernetes Engine (GKE) to continuously scan and protect all of our externally facing systems with the Tsunami scanning engine.
When scanning a system, Tsunami executes a two-step process:
Reconnaissance: In the first step, Tsunami detects open ports; then subsequently identifies protocols, services, and other software running on the target host using a set of fingerprinting plugins. To avoid reinventing the wheel, Tsunami leverages existing tools such as nmap for some of these tasks.
Vulnerability verification: Based on the information gathered through reconnaissance, Tsunami selects all vulnerability verification plugins matching the identified services. To confirm that a vulnerability indeed exists Tsunami executes a fully working, benign exploit.
Tsunami is released under the Apache 2.0 license. Tsunami is not an official Google product.
Post A Comment:
0 comments: