CyberCNS Scan Types
- 1 List of Supported Operating Systems for Vulnerability Scan.
- 2 Scan Types
- 2.1 Regular Scan (Full Scan)
- 2.2 Windows
- 2.3 Active Directory
- 2.4 Linux
- 2.5 Network Devices
- 2.6 Asset Discovery Scan
- 2.7 Active Directory Scan
- 2.8 SNMP Scan
- 2.9 Vulnerability Scan
- 2.10 Firewall Scan
- 2.11 Offline Vulnerability Scan
Type of Scan | Vulnerability Scan | Asset Discovery | SNMP Scan | Active Directory Scan | Firewall Scan |
---|---|---|---|---|---|
Full Scan | Yes | Yes | Yes | Yes | Yes |
Asset discovery Scan | Yes | Yes | No | No | No |
Active Directory Scan | Yes | Yes | No | Yes | No |
SNMP Scan | Yes | No | Yes | No | No |
Offline Vulnerability Scan | Yes | No | No | No | No |
Firewall Scan | Yes | No | No | No | Yes |
List of Supported Operating Systems for Vulnerability Scan.
Ubuntu 22.04 LTS | Jammy Jellyfish |
Ubuntu 20.04 LTS | Focal Fossa |
Ubuntu 18.04 LTS | Bionic Beaver |
Ubuntu 16.04 LTS | Xenial Xerus |
Ubuntu 14.04 LTS | Trusty Tahr |
CENT OS | |
CentOS - 4 |
|
CentOS - 5 |
|
CentOS - 6 |
|
CentOS - 7 |
|
CentOS - 8 |
|
REDHAT LINUX OS | |
RHEL 4 | Nahant |
RHEL 5 | Tikanga |
RHEL 6 | Santiago |
RHEL 7 | Maipo |
RHEL 8 | Ootpa |
DEBIAN OS | |
Debian 7 | Wheezy |
Debian 8 | Jessie |
Debian 9 | Stretch |
Debian 10 | Buster |
Debian 11 | Bullseye |
MAC OS | |
OS X 10.9 | Mavericks (Cabernet) |
OS X 10.10 | Yosemite (Syrah) |
OS X 10.11 | El Capitan (Gala) |
macOS 10.12 | Sierra (Fuji) |
macOS 10.13 | High Sierra (Lobo) |
macOS 10.14 | Mojave (Liberty) |
macOS 10.15 | Catalina (Jazz) |
macOS 11 | Big Sur (GoldenGate) |
macOS 12 | Monterey (Star) |
Microsoft Windows OS | |
windows 8 (64-bit) |
|
windows 8.1 (64-bit) |
|
windows 10 (64-bit) |
|
windows 11 (64-bit) |
|
Windows server 2012 (64-bit) |
|
Windows server 2012 R2 (64-bit) |
|
Windows server 2016 (64-bit) |
|
Windows server 2019 (64-bit) |
|
Windows server 2022 (64-bit) |
|
Scan Types
Regular Scan (Full Scan)
You can initiate a Full scan for all the assets which are discovered. It checks all the parameters in the Discovery Settings and accordingly initiates Asset discovery, Vulnerability Scan, SNMP scan, Active Directory Scan & Firewall Scan. This is the scan achieved by using a regular agent/probe.
CyberCNS runs a vulnerability scan on the asset to identify asset inventory overview like installed programs and associated Vulnerabilities in the asset.
It uses the following techniques to get to the devices:
Windows
It attempts to use the Admin SMB share to send a small executable called the Dissolvable agent that it then runs on the remote machine to fetch the details. It probes the shares using standard SMB tools and does an NFS discovery to check any NFS shares.
Active Directory
It uses LDAP to query the users, and groups from the Credentials provided during the AD setup in the AD/Master credentials. It runs Powershell commands to figure out GPOs, Security Groups, and memberships of the groups.
Linux
It uses SSH credentials to log in to the box and figure out using Linux commands what is running on the machines.
Network Devices
It uses SNMP to discover the Sysobjectid and look up the version of the device and then query the vulnerabilities for the version. It also connects to OEM APIs to get the vulnerability details.
Asset Discovery Scan
While in the Discovery Settings for any Company, you can provide IP ranges (IP range/Static IP/CIDR). once provided any or all here, the Asset Discovery scan will discover all the assets which are available in the mentioned subnet. You can also Exclude IP range from Scanning as well when selected. Any changes done anytime in this section will request a pop-up asking for a scan.
Active Directory Scan
For a Probe Agent, Discovery Settings, you can provide Active Directory Credentials. Once validated it will initiate an Active Directory scan. We are using a dissolvable agent if SMB is available and that agent will create PowerShell in memory and execute, if SMB is not available we are using LDAP protocol directly without using any PowerShell scripts.
Active Directory scan will include below:
A scan is performed on the computers detected during active directory scan.
If any of the Active Directory systems on the list has a lightweight agent or probe agent installed, the asset inventory search for that asset will be skipped as it is getting scanned by the local agent.
This scan is carried out utilising NMAP device discovery on the remaining systems.
Prerequisite for AD audit scan
To perform an AD audit on a domain controller, it is important to first enable audit events. Once enabled, The CyberCNS agent will read the events every 15 minutes and push them to your CyberCNS domain.
To verify which audit events are currently enabled, run the following command:
>> auditpol /get /category:*
This command will provide a list of all the audit categories and their status.
To Enable the audit events use the command given below
Create a “ .bat ” file and add below lines based on user audit requirements or user can run individual commands to enable audit events. (Ex: AUDITPOL /SET /SUBCATEGORY:"Security State Change" /SUCCESS:ENABLE )
@echo OFF
Rem Enable Security System Extension
echo Enabling "Security System Extension"
AUDITPOL /SET /SUBCATEGORY:"Security System Extension" /SUCCESS:ENABLE
echo Enabling "Security State Change"
AUDITPOL /SET /SUBCATEGORY:"Security State Change" /SUCCESS:ENABLE
AUDITPOL /SET /SUBCATEGORY:"Logon" /SUCCESS:ENABLE /FAILURE:ENABLE
AUDITPOL /SET /SUBCATEGORY:"Logoff" /SUCCESS:ENABLE
AUDITPOL /SET /SUBCATEGORY:"Logoff" /SUCCESS:ENABLE
AUDITPOL /SET /SUBCATEGORY:"Other Logon/Logoff Events" /SUCCESS:ENABLE
AUDITPOL /SET /SUBCATEGORY:"Network Policy Server" /SUCCESS:ENABLE /FAILURE:ENABLE
AUDITPOL /SET /SUBCATEGORY:"Application Generated" /SUCCESS:ENABLE /FAILURE:ENABLE
AUDITPOL /SET /SUBCATEGORY:"Other Object Access Events" /SUCCESS:ENABLE
AUDITPOL /SET /SUBCATEGORY:"Process Creation" /SUCCESS:ENABLE
AUDITPOL /SET /SUBCATEGORY:"Process Termination" /SUCCESS:ENABLE
AUDITPOL /SET /SUBCATEGORY:"Authentication Policy Change" /SUCCESS:ENABLE
AUDITPOL /SET /SUBCATEGORY:"Authorization Policy Change" /SUCCESS:ENABLE
AUDITPOL /SET /SUBCATEGORY:"User Account Management" /SUCCESS:ENABLE /FAILURE:ENABLE
AUDITPOL /SET /SUBCATEGORY:"Computer Account Management" /SUCCESS:ENABLE
AUDITPOL /SET /SUBCATEGORY:"Security Group Management" /SUCCESS:ENABLE
AUDITPOL /SET /SUBCATEGORY:"Distribution Group Management" /SUCCESS:ENABLE
AUDITPOL /SET /SUBCATEGORY:"Directory Service Changes" /SUCCESS:ENABLE
AUDITPOL /SET /SUBCATEGORY:"Directory Service Access" /SUCCESS:ENABLE
AUDITPOL /SET /SUBCATEGORY:"Other Account Logon Events" /SUCCESS:ENABLE /FAILURE:ENABLE
AUDITPOL /SET /SUBCATEGORY:"Kerberos Authentication Service" /SUCCESS:ENABLE /FAILURE:ENABLE
SNMP Scan
For network devices CyberCNS uses SNMP scan. If a device has SNMP enabled, then it will read the SNMP description using defined SNMP credentials. For supported network devices, it will initiate a vulnerability scan as well.
Vulnerability Scan
Once the required credentials and user privileges are defined the Vulnerability Scan can be successfully initiated. In a vulnerability scan, you will be able to discover the vulnerabilities based on installed security updates. This scan uses SMB protocol for the scan.
Firewall Scan
A firewall when selected can be scanned for Firewall Scan, which will help check for certain Firewall Rules' success/failure. This can be initiated for supported devices.
Offline Vulnerability Scan
An offline vulnerability scan is used to compare scanned assets' vulnerability data with the CyberCNS vulnerability database to show any new vulnerabilities that are present in the vulnerable versions. It does not actually scan the asset but It compares the latest scan results with the CyberCNS vulnerability updated database and shows the results. It is a server-side scan and it is not dependent on any installed agents. This scan runs only if the agent gets offline for more than 48 hours.
For devices not domain connected or if they are standalone/remote devices, you can use Lightweight Agent which can be initiated for Windows, Linux, or Mac systems. The lightweight agent is used for standalone systems and needs an agent to be installed on each system. This agent then pushes the report to the CyberCNS portal.