Preview

Flawfinder

Satisfactory Essays
Open Document
Open Document
277 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Flawfinder
The automated assessment tool I choose is Flawfinder. Flawfinder is a general purpose scanner for finding and reporting potential flaws in C and C++ source code. This program searches through the source code of an application looking for security flaws and then generate a report with the flaws organized by seriousness. Typical errors Flawfinder find is buffer overflow vulnerabilities and string formatting facts .
When using Flawfinder you should always analyze a copy of the source program being analyzed, not a directory that can be modified by a developer while flawfinder is performing the analysis. If an attacker has control over the files while you’re analyzing them, the attacker could move files around or change their contents to prevent the exposure of a security problem (or create the impression of a problem where there is none. Also, do not use the –allow link option in such cases; attackers could create malicious symbolic links to files outside of their source code area (such as passwords) Organizations can protect themselves by following simple steps which we constantly talk about. Organizations can ensure that anti-virus, anti-spyware and malware applications are kept up to date and routinely ran on the workstation. Make sure applications, operating systems are up to date and patched. Lastly the organization can subscribe to a cyber intelligence service which can help them identify on-line threats, misrepresentations or online fraud brands.

Automated Audit Example: Flawfinder. (2013, December 08). Retrieved from Debian: http://www.debian.org/security/audit/examples/flawfinder
David, W. (n.d.). Flawfinder. Retrieved from Ubuntu Manuals: http://manpages.ubuntu.com/manpages/hardy/man1/flawfinder.1.html
Phillips, S., & Oriyano, G. (2010). Hacker Technique, Tools, and Incident Handling. Jones & Bartlett Learning

You May Also Find These Documents Helpful

  • Satisfactory Essays

    week2 lab#4

    • 258 Words
    • 2 Pages

    4. This is referred to by many names, but typically just called a vulnerability scan. Can be done with tools such as Nessus or Microsoft baseline security analyzer.…

    • 258 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Oriyano, S.-P., & Gregg, M. (2011). Hacking Techniques, Tools, and Incident Handeling . Burlington: Jones & Bartelle Learning .…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    This lab demonstrated the first three steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance and Probing) on a targeted IP subnetwork using Zenmap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found to exploit the vulnerability.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS305

    • 300 Words
    • 2 Pages

    8. It’s a tool for practitioners because they can see what vulnerability they need to correct and patch,and it’s a hacker’s tool because it lists the vulnerability they can exploit.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking Exposed 6: Network Security Secrets & Solutions. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2 Answers Nessus

    • 628 Words
    • 3 Pages

    This lab demonstrates the first 3 steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance & Probing) on a targeted IP subnetwork using ZenMap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus® vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found in order to exploit the vulnerability.…

    • 628 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    3. What possible high risk vulnerabilities did the Rats tool find in the DVWA application source code?…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    ISP Survey

    • 1455 Words
    • 5 Pages

    References: Cichonski, P., Millar, T., Grance, T., Scarfone, K. (2012). NIST SP 800-61: Computer Security Incident Handling Guide. National Institute of Standards and Technology. Rev. 2. Retrieved from National Institute of Standards and Technology.…

    • 1455 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Password Theft

    • 6445 Words
    • 26 Pages

    The authentication system (used during login) stores enciphered images of user passwords but not the actual passwords. This protects passwords from being divulged if an attacker happens to read the file.…

    • 6445 Words
    • 26 Pages
    Powerful Essays
  • Better Essays

    Ethical Hacking

    • 2948 Words
    • 12 Pages

    Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal. Ethical hacking is performed with the target’s permission. The intent of ethical hacking is to discover vulnerabilities from a hacker’s viewpoint so systems can be better secured. Its part of an overall information risk management program that allows for ongoing security improvements. Ethical hacking can also ensure that vendors’ claims about the security of their products are legitimate.…

    • 2948 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Review of Paper

    • 743 Words
    • 3 Pages

    According to authors of the paper there is limited experience on systematically developing and testing software components in automation systems domain. A detailed testing framework is required to enable automated test processes and support testing process like linking automation supported systematic test case generation, execution, and reporting more efficiently. The main research goal of the paper is to introduce efficient software testing and test automation approaches in automation systems development.…

    • 743 Words
    • 3 Pages
    Good Essays