Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

PVS 3.2 Released – Enhanced vulnerability discovery, real-time forensics and file share and database activity monitoring

Tenable Network Security is proud to announce the release of version 3.2 of the Passive Vulnerability Scanner (PVS). This product is a network sniffer that scans for real-time vulnerability data and transmits it to Tenable’s Security Center management console along with real-time user and forensic activity transmitted to Tenable’s Log Correlation Engine (LCE). This blog entry describes many of the new features and enhancements in this release.

Enhanced Vulnerability Discovery

PVS 3.2 enables Tenable’s research team to write sophisticated rules that can track the state of many different types of services and protocols. Building on the robust vulnerability discovery features of PVS 3.0, this new release provides enhanced analysis capabilities of web client traffic, web server traffic, Microsoft file sharing, email, DNS, operating system identification and much more.

For example, two vulnerabilities normally detected by an active vulnerability scanner, such as Nessus, can now be detected with PVS: insecure usage of the “VIEWSTATE” hidden form field in web based .NET applications and insecure Active X components hosted on IIS web servers.

Real-time File Sharing Monitoring

A major new feature of PVS 3.2 is the addition of deeper logic to perform protocol analysis. In the same way that Nessus receives plugin updates, PVS is continually updated by Tenable’s Research team. Recently our research team has written plugins for PVS 3.2 that can parse complex file sharing protocols such as SMB, NFS, HTTP and FTP.

For example, if a host uploads or downloads a file to a Windows network share, to or from the Internet using web services or over traditional Unix services such as FTP and NFS, a PVS deployed to watch network traffic can log these events in real-time. When these logs are sent to the LCE, they are immediately available for searching, tracking and reporting by user, trending and can contribute to any type of incident or forensics investigation.

The following is a screen shot of PVS events related to users obtaining files at a major university over a period of five days:

100-pvs-file-share-5days-350px
 

Database Activity Monitoring

Tenable products have had the ability to scan databases for vulnerabilities and configuration issues for a long time. This release of PVS 3.2 now provides the ability to monitor database activity in real-time. The PVS can now look at SQL database traffic that has originated from end user or web applications and send a real-time log to the LCE.

This enables users the ability to search or perform forensic analysis of database transactions over a long period of time. The databases events obtained by the PVS can be used for intrusion detection event correlation and access control analysis for compliance and for anomaly detection.

Since the PVS is passively sniffing between the applications and the SQL database, there is no impact on system, network or database performance.

Finally, if the database server has not been subject to patch audits or vulnerability scans, the traffic to and from the server will be used by the PVS to identify client and server vulnerabilities in real-time.

Real time Forensics

PVS 3.2 includes many new plugins that detect the resources attached to your network and create logs that can be sent to the LCE in real time. For example, the screen shot below shows all web user agent strings observed by the PVS for a single host:

102-web-agent-350px

Data from these plugins centralize many different types of software, operating systems, web browsers, web browser plugins and media players in one report. The PVS performs this type of analysis in real-time for thousands of hosts.

Additional data now available for discovery with this release of PVS includes:

  • Detection of user agent strings associated with known Trojans and malware
  • Identification of a host’s NetBIOS and Domain names
  • Identification of a host’s DNS name
  • Enumeration of files shared via SMB, FTP and NFS

In addition to finding vulnerability data in real time, PVS 3.2 can also report a wide variety of user activities for forensic analysis in real time. Real time activity can now be sent to the Log Correlation Engine for these types of network events:

Any DNS resolution attempt - this provides a record of any DNS queries from your network, even if they are being sent to servers outside of your network. The LCE provides daily lists of all DNS queries for each host that facilities analysis of host activities.

Database SQL queries – after a web based attack, having logs of all SQL queries can aid in determining the attack vector and source. The LCE can also use these logs to automatically identify misuse, probes and anomalies.

Encrypted session logging – as the PVS observes network traffic, it tests the randomness of transmitted content to identify encrypted communications.

File transfers – all files transferred over SMB, HTTP, FTP and NFS are logged in real time. Having the PVS send these logs to the LCE is invaluable if there is an attacker or an inside threat, or if you just want to see who is sharing spreadsheets on the network.

Web activity – the PVS logs all HTTP GET and POST events. These logs can be used to help identify web-browsing abuse, such as downloading pornography or botnet activity.

For More Information

If you are interested in upgrading your Security Center to work with passive vulnerability data or would like to evaluate Tenable’s Unified Security Monitoring solution, please contact us at [email protected].

 

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training