SANS/FBI Top 20 Vulnerability Test Suite

On Oct 1, 2002, SANS and FBI jointly published a list of the 20 most important Internet security vulnerabilities categories, for both Windows and Unix systems. SecuritySpace's comprehensive security vulnerability suite includes most of these vulnerabilities. The following tables list these vulnerability categories and whether we can test for them.

Unix Vulnerability CategoriesTested
Remote Procedure Calls (RPC)Yes
Apache Web ServerYes
Secure Shell (SSH)Yes
Simple Network Management Protocol (SNMP)Yes
File Transfer Protocol (FTP)Yes
R-Services -- Trust RelationshipsYes
Line Printer Daemon (LPD)Yes
SendmailYes
BIND/DNSYes
Accounts with No Passwords or Weak PasswordsYes

Windows Vulnerability CategoriesTested
Internet Information Services (IIS)Yes
Microsoft Remote Data ServicesYes
Microsoft SQL ServerYes
NETBIOS -- Unprotected Windows Networking SharesYes
Anonymous Logon -- Null SessionsYes
LAN Manager Authentication -- Weak LM HashingNo1
Accounts with No Passwords or Weak PasswordsYes
Internet ExplorerNo2
Remote Registry AccessYes
Windows Scripting HostNo3

1. Weaknesses in LanMan Hashes can be exploited using password crackers that apply dictionary attacks against easily guessed hashes. The SecuritySpace Audit suite, as a policy decision, does not execute password cracking tools against either Unix or Windows systems during the course of an audit.
2. Internet Explorer weaknesses are typically exploited by tricking users to visit malicious web pages. Browser weaknesses, as a whole, only apply to systems where the user is actively surfing the web. They cannot, without the cooperation of the user (in the form of asking the user to visit a particular web page) be tested for remotely. SecuritySpace audits do not include any browser tests, regardless of the browser type.
3. Windows Scripting attacks are again browser and email based, and typically involve the delivery of malicious content to the users system through mail delivery or surfing of the web by the user. The "Love Bug" worm is an example of Scripting attack. SecuritySpace audits do not include this class of tests due to the fact that it cannot be remotely determined whether or not a user is susceptible to these attacks without the user's cooperation during the test.

Note: Vulnerabilities tested for the SANS/FBI list is just a subset of our exiting and growing 150627 vulnerability tests, with new tests added on a weekly basis. The complete vulnerability suite is listed below.

SecuritySpace's Vulnerability Suite

Vulnerability CategoriesHighMedLowOtherTotal
Fedora Local Security Checks 18374 12520 150 1 31045
SuSE Local Security Checks 12076 6155 114 0 18345
Huawei EulerOS Local Security Checks 7996 5475 214 0 13685
Ubuntu Local Security Checks 7677 3278 63 94 11112
Debian Local Security Checks 6856 3557 47 0 10460
Web application abuses 5379 4102 11 13 9505
General 6537 1849 53 55 8494
Mageia Linux Local Security Checks 3145 2479 39 0 5663
CentOS Local Security Checks 3343 1205 108 0 4656
Red Hat Local Security Checks 2829 1112 94 2 4037
Windows : Microsoft Bulletins 3076 539 15 0 3630
Product detection 0 0 0 3035 3035
Mandrake Local Security Checks 2128 753 12 0 2893
Denial of Service 1010 1469 10 0 2489
Gentoo Local Security Checks 1664 514 13 0 2191
FreeBSD Local Security Checks 1223 778 8 0 2009
Oracle Linux Local Security Checks 1299 577 19 0 1895
Slackware Local Security Checks 848 835 9 0 1692
openSUSE Local Security Checks 759 819 13 0 1591
Databases 613 565 9 1 1188
Web Servers 461 562 4 5 1032
Policy 10 0 0 876 886
CGI abuses 543 243 68 10 864
Amazon Linux Local Security Checks 468 273 7 0 748
CISCO 410 291 3 1 705
Buffer overflow 608 62 0 0 670
Windows 320 130 24 31 505
Mac OS X Local Security Checks 414 40 0 0 454
Conectiva Local Security Checks 309 80 2 0 391
IT-Grundschutz-deprecated 0 0 0 363 363
Default Accounts 336 7 0 1 344
Backdoors 335 1 0 0 336
Service detection 2 2 2 325 331
Turbolinux Local Security Tests 223 94 1 0 318
Privilege escalation 236 68 0 0 304
FTP 168 89 7 0 264
Gain a shell remotely 188 34 4 0 226
IT-Grundschutz 0 0 0 195 195
Nmap NSE net 43 61 0 73 177
Trustix Local Security Checks 140 20 1 0 161
Nmap NSE 35 43 0 76 154
Huawei 46 98 0 3 147
JunOS Local Security Checks 89 45 2 0 136
F5 Local Security Checks 57 67 1 0 125
SMTP problems 74 30 4 2 110
Remote file access 69 39 1 1 110
Gain root remotely 104 4 0 1 109
Misc. 38 24 26 2 90
SSL and TLS 4 30 0 52 86
IT-Grundschutz-15 0 0 0 85 85
AIX Local Security Checks 68 1 0 0 69
CGI abuses : XSS 24 43 0 0 67
VMware Local Security Checks 45 12 0 3 60
Malware 55 2 0 1 58
RPC 16 4 26 1 47
Palo Alto PAN-OS Local Security Checks 13 27 0 0 40
FortiOS Local Security Checks 12 24 0 0 36
Citrix Xenserver Local Security Checks 24 6 0 0 30
Windows User Mngmnt 4 5 11 4 24
Useless services 5 13 5 0 23
SNMP 4 6 5 6 21
Peer-To-Peer File Sharing 3 7 4 3 17
Firewalls 8 5 3 0 16
HP-UX Local Security Checks 11 4 0 0 15
Compliance 0 0 0 15 15
Settings 0 0 0 13 13
Brute force attacks 6 0 0 3 9
Finger abuses 4 2 3 0 9
Port scanners 0 0 0 7 7
Credentials 0 0 0 5 5
NIS 2 0 2 0 4
Solaris Local Security Checks 1 0 0 0 1
Totals928675117912175364150627

Reports
     
  • identify and label the vulnerabilities from the "SANS/FBI Top 20 Vulnerabilities" report,
  • provide detailed and comprehensive information on vulnerabilities and open ports found, along with the steps on how to fix them
  • include a complete list of vulnerability tests executed during the audit, ordered by severity and categories
  • include CVE identifiers and references to over 10,000 on-line resources and advisories
  • prioritize vulnerabilities found by severity and category
  • ability to add your own notes, using reports as a working document
Pricing

Automatically included in Standard Audit or Advanced Audit subscription.

Other info

Order Now
To order an audit, you need to login in as a registered user. Please fill the appropriate form below (upon successful login, the order form will be presented).



© 1998-2026 E-Soft Inc. All rights reserved.