Google reveló un código fuente para el escáner de vulnerabilidades Tsunami

Google Unveiled Tsunami Code

Google has unveiled the source code for the Tsunami scanner, a scalable solution for detecting dangerous vulnerabilities with a minimum of false positives. The scanner is aimed at large corporate networks consisting of thousands or even millions of Internet-connected systems. El código ya está disponible. en GitHub.

Tsunami will not be registered as a Google product, but will be supported by the open source community. Más temprano, the company acted in a similar way with its other internal tool, Kubernetes, which also became available to the masses.

Déjame recordarte también que Google Maps ayuda a los usuarios a protegerse del COVID-19.

Como se ha mencionado más arriba, Tsunami differs from other similar tools in terms of scale, because Google created its own scanner for truly giant companies (such as itself). Their list also consists of companies that manage networks, including hundreds of thousands of servers, estaciones de trabajo, network equipment and IoT devices.

“Tsunami is well adapted to large and heterogeneous networks of this kind and solves the problem of launching various scanners for each type of device. Para hacer esto, the scanner is divided into two main parts, and is also equipped with an extensible plug-in support mechanism”, – say Google engineers.

The first and main component of Tsunami is the scanner itself or the intelligence module. It scans the company’s network for open ports, and then checks all the ports and determines the exact protocols and services running on them (to prevent incorrect port marking and not to scan devices for the wrong vulnerabilities). This fingerprint module is based on nmap, but also uses custom code.

The second Tsunami component works based on the results of the first. It interacts with each device and its open ports: it selects a list of vulnerabilities for testing and runs safe exploits to check whether the device is really vulnerable to attacks.

The capabilities of this module for checking for vulnerabilities can be expanded using plug-ins.

“The current version of the scanner comes with plug-ins for checking open strategic UIs (Jenkins, Jupyter, Hadoop Yarn and so on), as well as weak credentials. To implement the latter, Tsunami uses open source tools such as ncrack, which help to detect weak passwords used by various protocols and tools, including SSH, ftp, RDP and MySQL”, – say developers of the scanner.

Google developers promise to expand the list of plugins for Tsunami in the next months.

They will be published in a separate GitHub repository.

Por Vladimir Krasnogolovy

Vladimir es un especialista técnico al que le encanta dar consejos y sugerencias cualificados sobre los productos de GridinSoft. Está disponible las 24 horas del día, los 7 días de la semana para ayudarte con cualquier pregunta relacionada con la seguridad en Internet.

Dejar un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *