Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Mobile Devices, Your Network, and Passive Sniffing

Do you know how many mobile devices reside on your network? Is your security architecture designed to secure the mobile platform and protect your users and the network from the threats they pose?

Stack of Cell Phones

Mobile devices are a security concern for many reasons. Mobile devices are typically unmanaged – meaning they may or may not be running AV software, a firewall, or conform to enforceable security policies. Yet, whether they are provided to your employees as part of your operations or not, they are likely accessing resources on your network. To compound the problem, many mobile devices connect to your local network and the Internet directly on two separate mediums. For example, the device may associate to a wireless belonging to your organization and a 3G/4G connection to the Internet.

In this scenario, there is a risk of data leaving your organization through a personal device—which may not have received the same security checks and patches as corporate-issued tools. Software running on mobile devices may violate an organization’s policy on appropriate network usage.

It is difficult to manage or assess mobile risk without knowing which devices are being used, where they are located on the network, and to what extent they are deployed. To this end, Tenable’s Passive Vulnerability Scanner (PVS) now contains a new set of plugins that detects where mobile devices are connecting to your internal IP space and allows you to detect vulnerabilities by sniffing the network traffic.

PVS plugins 4134, 5287, and 6067-6086 are dedicated to logging mobile devices and finding, where possible, the software/hardware version information of the devices. There is also a new plugin category called "Mobile Devices" in PVS that allows you to easily sort the data that has been collected. Devices that PVS can detect include tablets, mobile phones, e-book readers, and more.

Once you have found a mobile device, you can easily see what sort of traffic they have been passing or accessing on your network. For example, I've created the following filter in SecurityCenter:

SecurityCenter PVSFilter

The results of the filter showed the mobile devices in use at this facility:

SC / PVS Mobile Device Summry

Click for larger image


You can then run a report to retrieve an IP summary of all mobile devices to see what else SecurityCenter may know about these devices, such as their names or MAC addresses:

SC / PVS Mobile IP Summary

Click for larger image




In this case, an iPhone/iPad was detected on the network:

SC / PVS iPad Summary

Click for larger image


This query reveals all of the vulnerabilities discovered on the device-- actively discovered with Nessus and passively discovered with PVS as traffic to and from the device was observed on the network. The iPhone/iPad in question is not up-to-date on the latest patches.

Conclusion

Monitoring mobile devices on your network can provide interesting and actionable results. For example, Apple iPhone and iPad users must connect their device to a computer in order to upgrade from iOS version 4 to version 5. It wasn't until iOS 5.1 that Apple introduced over-the-air-updates. Using the tools and methods described above, you can seek out devices that need to be upgraded. PVS can also detect applications running on the devices, for example you can see which devices are running Angry Birds, based on the connections made by the apps to servers on the Internet. This means you can see who isn't applying updates, and who has which applications installed on their phones.


Related Posts

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,190.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.