Explore chapters and articles related to this topic
A New Compromising Security Framework for Automated Smart Homes Using VAPT
Published in Amit Kumar Tyagi, Niladhuri Sreenath, Handbook of Research of Internet of Things and Cyber-Physical Systems, 2022
Y. V. Akileswar Reddy, Ch. Ajay Kumar, P. Rukmani, Sannasi Ganapathy
The assessment phase which is final that involves for detecting the vulnerability by using a vulnerability detection method namely the National Vulnerability Database for identifying the vulnerabilities in the fore mentioned asset. This process generates reports along with results and risk data. Vulnerability scans have different devices on network and looks for potential holes namely obsolete software with known vulnerabilities, open ports, and default password over the devices. If they find anything, these vulnerabilities will be tested and a way is found to exploit them [14]. Nessus is an open-source network vulnerability scanner which makes use of Nessus attack scripting language (NASL), a simple language which describes the specific threats and the potential attacks. A network scan is performed first through Nessus to know about the systems in the operating Smart Home network, through that the details of systems are known as a list of existing addresses (IP’S) that are functional. Then for basic outline of system vulnerabilities, the vulnerabilities are scanned through passive scanning as shown in Figure 14.10 to prioritize which system to lookup first through the risk score obtained during this scan results. Figure 14.10 shows the scan report for device running on meta data.
Security in Smart Grids
Published in Hongjian Sun, Chao Wang, Bashar I. Ahmad, From Internet of Things to Smart Cities, 2017
Julia. Sánchez, Agustín Zaballos, Ramon. Martin de Pozuelo, Guiomar. Corral, Alan. Briones
Different vulnerability assessment tools [72] exist in the market. Some of them are free scanners, like Nessus, OpenVAS, Microsoft Baseline Security Analyzer (MBSA), Qualys FreeScan and Secunia PSI. Other commercial tools are GFI LANguard, Retina, Rapid7 Nexpose, Core Impact, QualysGuard, Nipper and SAINT. The latest version of Nessus is closed source, but it is still free without the latest plugins and for home users. The most popular and free web vulnerability scanners are Nikto, Grabber, Vega, Wapiti and ZAP whereas WebInspect, AppScan, Sentinel and N-Stealth are commercial web vulnerability scanners [54]. Not only is cost an important matter in commercial solutions, but also proprietary methodologies that hide the internal testing process and vulnerability assessment.
Malware Detection and Mitigation
Published in Nicholas Kolokotronis, Stavros Shiaeles, Cyber-Security Threats, Actors, and Dynamic Mitigation, 2021
Gueltoum Bendiab, Stavros Shiaeles, Nick Savage
Nessus51 is a free remote security scanning tool, which can be used to scan a computer or a group of computers to find potential vulnerabilities that malicious hackers could exploit. It is not a complete security solution, but it could be part of a good security strategy by running over 1200 checks on a given computer, testing to see if an attack could be used to break into the computer or otherwise harm it. It offers to security administrators a variety of services including Nessus scans that cover a wide range of technologies including OS, network devices, hypervisors, databases, web servers, cloud environment and critical infrastructure, malware detection, control systems auditing and configuration auditing, and compliance checks.
AI-enabled IoT penetration testing: state-of-the-art and research challenges
Published in Enterprise Information Systems, 2023
Claudia Greco, Giancarlo Fortino, Bruno Crispo, Kim-Kwang Raymond Choo
- Nessus is a vulnerability scanner and can be used to study the target machine, able to detect running services and vulnerabilities, along with a list of feasible attack vectors for gaining access to the target network or system.