Article Details
Scrape Timestamp (UTC): 2024-05-02 10:35:06.834
Source: https://thehackernews.com/2024/05/when-is-one-vulnerability-scanner-not.html
Original Article Text
Click to Toggle View
When is One Vulnerability Scanner Not Enough?. Like antivirus software, vulnerability scans rely on a database of known weaknesses. That's why websites like VirusTotal exist, to give cyber practitioners a chance to see whether a malware sample is detected by multiple virus scanning engines, but this concept hasn't existed in the vulnerability management space. The benefits of using multiple scanning engines Generally speaking, vulnerability scanners aim to produce checks for as many vulnerabilities as possible. However, the number of vulnerabilities discovered year on year is now so high, reaching nearly 30,000 a year, or 80 a day, that it's impossible for a single scanning engine to keep up with them all. As a result, even the very best, industry-leading leading scanners will struggle to check for every known vulnerability out there, and often they will favour certain sets of software known to be used by their customers. For example, Intruder's analysis from early 2023 which compared Tenable's Nessus and OpenVAS showed significant differences in coverage between scanners, with one being generally stronger in commercial software, and the other favouring open source: "Tenable checks for 12,015 CVEs which OpenVAS does not check for and OpenVAS checks for 6,749 CVEs which Tenable does not check for." Scanning engine vendors also take other factors into consideration, like whether a vulnerability has been exploited in the wild, or whether it's in software products which are very widely used. But even though your chosen scanner may be making sensible decisions on which vulnerabilities to write checks for there may still be gaps in coverage for your estate. So it's a harsh reality that one day you may find out that you've been compromised via an attack vector which your vulnerability scanner simply doesn't have a check for. This raises significant questions for those looking to protect their digital estates, not only which scanner they should choose. But whether one scanner is even enough? The multi-scanning engine approach It's clear that having several complementary scanners would improve coverage by finding more vulnerabilities, and discovering more about what your attack surface looks like. But operating multiple scanning systems would be too much for most organisations to afford, both in budget and time constraints. That's why the team at Intruder, a leading Attack Surface Management vendor, decided from the start to incorporate multiple scanning engines, offering customers the widest breadth of checks, while streamlining budget and time constraints by providing them in a single platform. Most recently, Intruder has added Nuclei to its suite of vulnerability scanning engines, enhancing its ability to manage and secure attack surfaces. With over 3,000 additional checks in this initial release, Intruder can offer much broader and deeper coverage and discovery capabilities that can't be matched by using a single vulnerability scanner alone. What is Nuclei? Nuclei is an open-source vulnerability scanning engine, similar to OpenVAS, which is fast, extensible, and covers a wide range of weaknesses. It's become increasingly popular with bug bounty hunters, penetration testers and researchers who want to produce repeatable checks for serious weaknesses. These experts, working with the Nuclei development team at ProjectDiscovery, combine their knowledge and insights about cutting-edge weaknesses to produce checks extremely fast – which makes scanning as soon as possible after a vulnerability is discovered. What does Nuclei add to Intruder? By integrating Nuclei as a scanning engine, Intruder further enhances its vulnerability management platform capabilities to check and secure attack surfaces more effectively. This includes expanded detection of exposures like login panels that should not be exposed to the internet, and increasing the range of checks for known vulnerabilities in commonly exposed services. Nuclei augments Intruder's existing scanning engines, such as Tenable and OpenVAS, by providing a deeper and broader view of your attack surface, thus enabling better protection by uncovering risks that would remain undetected by a single scanning engine. Visualize and minimize your exposure with Intruder The size of your attack surface, and how well it's managed, is closely tied to your risk of opportunistic attackers exploiting your systems. The less you expose, and the more hardened the services you expose are, the harder it is for an attacker to exploit a weakness. You can reduce your attack surface by continuously monitoring for changes with an automated vulnerability management tool like Intruder. Intruder's platform allows you to:
Daily Brief Summary
Vulnerability scanners use databases of known weaknesses; however, given the proliferation of vulnerabilities—approximately 30,000 yearly—no single scanner covers all potential vulnerabilities effectively.
Competitive analysis between different scanners such as Tenable’s Nessus and OpenVAS reveals significant gaps in their detection capabilities, highlighting disparities in the range of vulnerabilities each scanner detects.
The practice of utilizing multiple scanning engines can offer more comprehensive coverage and a better understanding of an organization’s attack surface, thus reducing security risks.
Intruder incorporates multiple scanning engines in one platform, including the addition of Nuclei, to provide a broad and deep coverage without the prohibitive costs typically associated with operating several scanners.
Nuclei, an open-source scanning engine, is notable for its rapid development and deployment of checks for new vulnerabilities, thus enhancing the capability to protect against newly discovered threats.
Intruder's integration of Nuclei supports a more robust vulnerability management strategy by increasing detection capabilities and securing more aspects of an organization's digital infrastructure against potential exploits.