Tuesday, October 27, 18:26
Home security Google makes open source Tsunami Scanner

Google makes open source Tsunami Scanner

Recently Google, announced that it will make it open source Tsunami Vulnerability Scanner, wanting to help large-scale businesses protect themselves data of their customers.

Tsunami

The service, which last month was released on GitHub, used until recently by computer giants on an internal scale. However, it will now be open source.

Compared to other vulnerability detectors, Tsunami is designed to detect vulnerabilities on large networks involving hundreds of thousands Appliances, making it suitable for large businesses.

Tsunami consists of two main components and its structure is such that it allows the application of new capabilities, adding specifically plugins.

The first ingredient is an nmap-based scanner that scans a company's network for open ports and then tests each one separately.

According to Google in addition Nmap, the scanner also uses some custom code.

The second component uses the scan results to test devices on a list of vulnerabilities that perform known exploits.

This allows users to add new ones possibilities tests by adding plugins.

tsunami

The original version of the Tsunami tool includes functional units for detecting the following security issues:

Exposed UIs user: Applications such as Jenkins, Jupyter and Hadoop Yarn come with a UI that allows the user to schedule workloads or execute system commands. If these systems are exposed to Internet without authentication, intruders can exploit the functionality of the application to execute malicious commands.

Weak credentials: Tsunami uses other open source tools, such as ncrack, to detect weak passwords used by protocols and tools, including SSH, FTP, RDP and MySQL.

Google plans to release new add-ons for the Tsunami scanner, which will allow users to detect a wider range of vulnerabilities in the future. Additions will be released on GitHub.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement

LIVE NEWS

How to install a .watchface file on Apple Watch

The Apple Watch lets you customize the faces of the watch to display all kinds of useful information. But did you know ...

The five biggest data breaches of the 21st century

Data is becoming more and more sought after as our daily lives become more digitized. The technology giants that monopolize data are ...

Microsoft is limiting the availability of Windows 10 20H2

Microsoft is currently restricting the availability of Windows 10 20H2 to provide all users who want to ...

How to enable the new Chrome Read more feature

The latest version of Google Chrome browser, v86, released earlier this month, contains a secret feature called Read ...

How to choose a custom color for the Start menu

Starting with the October 2020 update, Windows 10 is the default on a theme that removes bright colors from ...

NASA telescope discovers drinking water on the moon

Eleven years ago, a spacecraft changed our view of the moon forever. The data collected by ...

Microsoft: Enhances password spray attack detection capabilities

Microsoft has significantly improved the ability to detect password spray attacks in the Azure Active Directory (Azure AD) and has reached the point ...

How to prevent companies from finding our phone number

In the age of advertising, the more user information is known the more convenient it is for companies. And in particular, the ...

Violation in a psychotherapy clinic led to blackmail of patients

Two years ago, a cyber attack took place in a Finnish psychotherapy clinic, which resulted in data theft and ransom demand. Now,...

Australia: Enhances cybersecurity and privacy!

The Government of New South Wales in Australia has set up a task force to strengthen cybersecurity and protection ...