HOME

TheInfoList



OR:

SAINT (Security Administrator’s Integrated Network Tool) is computer software used for scanning computer networks for
security vulnerabilities Vulnerabilities are flaws in a computer system that weaken the overall security of the device/system. Vulnerabilities can be weaknesses in either the hardware itself, or the software that runs on the hardware. Vulnerabilities can be exploited by ...
, and exploiting found vulnerabilities.


SAINT Network Vulnerability Scanner

The SAINT scanner screens every live system on a network for TCP and UDP services. For each service it finds running, it launches a set of probes designed to detect anything that could allow an attacker to gain unauthorized access, create a
denial-of-service In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host conn ...
, or gain sensitive information about the network. SAINT provides support to the
Security Content Automation Protocol The Security Content Automation Protocol (SCAP) is a method for using specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation of systems deployed in an organization, including e.g., FISMA (Fed ...
(SCAP) specification as an Unauthenticated Vulnerability Scanner and Authenticated Vulnerability and Patch Scanner. SAINT is also an approved scanning vendor with the
Payment Card Industry The payment card industry (PCI) denotes the debit, credit, prepaid, e-purse, ATM, and POS cards and associated businesses. Overview The payment card industry consists of all the organizations which store, process and transmit cardholder data, ...
(PCI). The Four Steps of a SAINT Scan: * Step 1 – SAINT screens every live system on a network for TCP and UDP services. * Step 2 – For each service it finds running, it launches a set of probes designed to detect anything that could allow an attacker to gain unauthorized access, create a denial-of-service, or gain sensitive information about the network. * Step 3 – The scanner checks for vulnerabilities. * Step 4 – When vulnerabilities are detected, the results are categorized in several ways, allowing customers to target the data they find most useful. SAINT can group vulnerabilities according to severity, type, or count. It can also provide information about a particular host or group of hosts. SAINT describes each of the vulnerabilities it locates; references
Common Vulnerabilities and Exposures The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States' National Cybersecurity FFRDC, operated by The MITRE Corporation, mainta ...
(CVE), CERT advisories, and IAVA (
Information Assurance Vulnerability Alert {{Unreferenced, date=August 2010 An information assurance vulnerability alert (IAVA) is an announcement of a computer application software or operating system vulnerability notification in the form of alerts, bulletins, and technical advisories iden ...
s); and describes ways to correct the vulnerabilities. In many cases, the SAINT scanner provides links to patches or new software versions that will eliminate the detected vulnerabilities. A vulnerability is a flaw in a system, device, or application that, if leveraged by an attacker, could impact the security of the system. Exploits take advantage of a vulnerability by compromising or destructing the vulnerable system, device, or application. Remediation is the process of repairing or providing a remedy for a vulnerability, thereby eliminating the risk of being exploited. Vulnerability scanning is used to identify and evaluate the security posture of a network. Historically, scanners were developed for specific purposes such as scanning only Windows desktops, applications, or network devices. SAINT offers heterogeneous scanning that identifies vulnerabilities across operating systems, desktop applications, network devices, Web applications, databases, and more.


SAINTexploit Penetration Testing Tool

The integrated
penetration test A penetration test, colloquially known as a pen test or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. ...
ing tool, SAINTexploit, demonstrates the path an attacker could use to breach a network and quantifies the risk to the network. SAINTexploit includes a Web site emulator and e-mail forgery tool.https://www.carson-saint.com/wp-content/uploads/2019/10/SAINT_SCinnovator.pdf Penetration testing tools from SAINT are designed to simulate both internal and external real-world attacks. This type of testing identifies the methods of gaining access to a target and understanding the techniques used by attackers. There are many levels and types of penetration testing and the scope of the project should be well defined. Targets included in the scope could include popular protocols, network devices, databases, Web applications, desktop applications, and various flavors of operating systems. SAINT focuses on the development of exploits where a shell can be established. A shell, or shellcode, is where all exploits included offer a command shell/direct connection to the target from the computer performing the testing. Exploits target operating systems, desktop applications, databases, Web applications, protocols, and network devices. The most common exploit types included in SAINTexploit include the following: • Remote Exploit – These attacks are launched across the Internet or network against a vulnerable target without the user having previous access to the system. • Client Exploit – The victim must access the attacker’s resource for a successful attack to take place. Common client exploits include e-mail forgery attacks, enticing the user to visit a Web site, or to open a file. • Local Exploit – In order to launch a local attack, the attacker must have previous access to the victim. (Also known as privilege elevation and tunneling). In this case, the victim's machine is used as the launch pad for connecting to other vulnerable targets.


SAINTmanager Remote Management Console

SAINT’s remote management console, SAINTmanager, enables enterprise-wide vulnerability scanning. The browser-based console provides the ability to centrally manage an entire network of SAINT vulnerability scanners from a single interface.


SAINTCloud

SAINTCloud enables cloud based vulnerability scanning, penetration testing, and compliance audits without having to download and install software.


History

The SAINT (Security Administrator's Integrated Network Tool) network vulnerability scanner was based on
SATAN Satan,, ; grc, ὁ σατανᾶς or , ; ar, شيطانالخَنَّاس , also known as the Devil, and sometimes also called Lucifer in Christianity, is an entity in the Abrahamic religions that seduces humans into sin or falsehoo ...
(Security Administrator Tool for Analyzing Networks) which was developed by Dan Farmer and
Wietse Venema Wietse Zweitze Venema (born 1951) is a Dutch programmer and physicist best known for writing the Postfix email system. He also wrote TCP Wrapper and collaborated with Dan Farmer to produce the computer security tools SATAN and The Coroner's ...
and released in 1995. SAINT Corporation (formerly World Wide Digital Security, Inc. (WWDSI)) continued development and released SAINT in July 1998. WWDSI changed its name to SAINT Corporation in January 2002. SAINT products are developed by SAINT Corporation, headquartered in
Bethesda, Maryland Bethesda () is an unincorporated, census-designated place in southern Montgomery County, Maryland. It is located just northwest of Washington, D.C. It takes its name from a local church, the Bethesda Meeting House (1820, rebuilt 1849), which ...
.


References


External links


SAINT home page
{{DEFAULTSORT:Saint (Software) Computer security software Network analyzers