Sunday, February 21, 19:52
Home security Google makes open source Tsunami Scanner

Google makes open source Tsunami Scanner

Recently Google, announced that it will make it open source Tsunami Vulnerability Scanner, wanting to help large-scale businesses protect themselves data of their customers.

Tsunami

The service, which last month was released on GitHub, used until recently by computer giants on an internal scale. However, it will now be open source.

Compared to other vulnerability detectors, Tsunami is designed to detect vulnerabilities on large networks involving hundreds of thousands Appliances, making it suitable for large businesses.

Tsunami consists of two main components and its structure is such that it allows the application of new capabilities, adding specifically plugins.

The first ingredient is an nmap-based scanner that scans a company's network for open ports and then tests each one separately.

According to Google in addition Nmap, the scanner also uses some custom code.

The second component uses the scan results to test devices on a list of vulnerabilities that perform known exploits.

This allows users to add new ones possibilities tests by adding plugins.

tsunami

The original version of the Tsunami tool includes functional units for detecting the following security issues:

Exposed UIs user: Applications such as Jenkins, Jupyter and Hadoop Yarn come with a UI that allows the user to schedule workloads or execute system commands. If these systems are exposed to Internet without authentication, intruders can exploit the functionality of the application to execute malicious commands.

Weak credentials: Tsunami uses other open source tools, such as ncrack, to detect weak passwords used by protocols and tools, including SSH, FTP, RDP and MySQL.

Google plans to release new add-ons for the Tsunami scanner, which will allow users to detect a wider range of vulnerabilities in the future. Additions will be released on GitHub.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement

LIVE NEWS

How to make a Facetime Audio call

Tired of low quality cell phone calls? Thanks to FaceTime, you can make high-resolution calls if you use iPhone, iPad, ...

How to add special effects to Instagram messages

Did you know that you can make instant Instagram messages more impressive? Like any other Instagram feature, you can add special ...

Only 270 addresses are responsible for 55% of all money laundering

Cybercriminals who keep their money in cryptocurrencies tend to "launder" money through a small set of online services, according to ...

Twitter: Voice messages are coming! How do we send them?

Twitter will soon support voice messages in both iOS and Android applications. This means that you will be able to send ...

How to connect a Bluetooth headset to a Nintendo Switch

The Nintendo Switch has a headphone jack. However, most headphones have become wireless so you will need a way to connect them ...

How to hide your phone number in Telegram

If you wish to create a Telegram account, you must provide your telephone number. In this way, Telegram validates the ...

Google Assistant: How can you delete your recordings?

Google Assistant can make your daily life much easier. However, it also involves some privacy issues, as ...

Microsoft: Office 2021 / Office LTSC coming in the second half of 2021

Microsoft announced that the Microsoft Office Long Term Service Channel (LTSC) and Office 2021 will be released in 2021, for ...

How to quickly create QR codes with Bing

If you ever need to create a QR code, but you do not know how, Microsoft has an easy-to-use tool available in any program ...

Brave: Onion addresses leaked to DNS traffic

The Tor function included in the Brave web browser, allows users to access .onion dark web domains within ...