Facebook Google Plus Twitter LinkedIn YouTube RSS 功能表 搜尋 資源 - 部落格資源-線上研討會資源-報告資源 - 活動icons_066 icons_067icons_068icons_069icons_070

Tracking Down Privilege Escalation Failures

Credentialed scanning is a key aspect of any vulnerability management program, but how can you be sure the scans are successful?Changes to infrastructure or specific hosts could result in the wrong credentials being used to elevate privileges during scans.If this happens, your scans could fail to gather the vulnerability data essential to effectively implementing your vulnerability management plan.The Tenable.io™ Elevated Privilege Failures report can give you detailed insight into the *nix hosts in your network that may not be getting scanned as thoroughly as believed.

Privilege escalation in credentialed scans

Configuring a non-root account on all scan targets is recommended when running credentialed scans

When SSH is used for credentialed scanning, you have the option of specifying an account to use for privilege elevation.This feature lets you use a non-root account for the scan to log in via SSH.The scan will then escalate privileges with the configured root account to gather data that is not available to non-root users.The method of separately logging in and elevating privileges keeps root credentials off the wire, thereby being more secure.Therefore, configuring a non-root account on all scan targets is recommended when running credentialed scans.

Elevated Privilege Failures report:scan credentials

The Tenable.io solution

Tenable.io can efficiently identify hosts where privilege escalation in credentialed scans has failed.The Elevated Privilege Failures report provides detailed information on these hosts.

Elevated Privilege Failures report

The Elevated Privilege Failures report provides you with comprehensive and detailed lists of the hosts on your network that may not be getting scanned thoroughly.This information is broken down by operating system and host.The Elevated privilege failure summary by Operating System pie chart shows privilege escalation failures by operating system and could indicate whether recent configuration changes may have caused the failures to start happening.For example, you will be better able to track the source of failures if the root account password has been changed for a specific operating system but not network-wide.

Elevated Privilege Failures report pie chart

The Systems with elevated privilege failures table lists which hosts’ failures have been detected based on the results of the Authenticated Check: OS Name and Installed Package Enumeration plugin (ID 12634).The table filters for plugin results that contain a phrase indicating that local privileges were not successfully elevated.This table also acts as an index for the next table, which provides more in-depth information about the hosts impacted.

Elevated Privilege Failures report IP list

The vulnerability details table lists results from plugin ID 12634, including the plugin output, for each host impacted.Details about the host, such as the IP and MAC addresses, are provided along with the plugin output that describes the attempt and failure to elevate the privileges of the scan account.

Elevated Privilege Failures report IP detail

Regardless of your approach to credentialed vulnerability scanning with Tenable.io, ensuring proper credential configuration is the first step to gathering thorough scan results.Tenable.io provides information security professionals with the tools and resources needed to perform accurate and rigorous credentialed vulnerability scanning.The Elevated Privilege Failures report provides insight into potential failures impacting the accuracy of credentialed scanning.Armed with Tenable.io, you can be sure that your credentialed scans are able to gather all available data.

Ensuring proper credential configuration is the first step to gathering thorough scan results

免費試用 Tenable.io

Tenable.io provides accurate information on how well your organization is addressing security risks and helps track improvements over time.Get a free trial of Tenable.io Vulnerability Management for 60 days.

訂閱 Tenable 部落格

免費試用 立即購買

試用 Tenable.io 弱點風險管理

免費試用 60 天

享受對現代化、雲端基弱點風險管理平台的完全使用權限,使您能夠查看和追蹤您的所有資產,且具有無與倫比的準確性。立即註冊並在 60 秒內進行第一次掃描。

購買 Tenable.io 弱點風險管理


65 資產

免費試用 Nessus Professional

免費試用 7 天

Nessus® 是現今市場上最全面的弱點掃描軟體。Nessus Professional 將幫助自動化弱點掃描過程,在您的合規性週期內節省時間,並讓您的 IT 團隊參與其中。