HOME > SOLUTIONS > VIA AGENT > SCAN PROCEDURES


Following a highly effective and systematic scanning approach, VIA Agent's aim is to provide fast and accurate scan results without compromise. The first two phases, Reconnaissance and Analysis, involve utilizing many different methods to find out as much information about the scan target as possible. VIA Agent then carefully analyzes the results in order to execute a vulnerability assessment that is most relevant to the target platform and network infrastructure. In so doing, not only can VIA Agent help reduce false-positive but also save the time taken to complete an assessment. Scanning and Fuzzing are where VIA Agent checks the scan target for the latest known vulnerabilities as well as testing dynamic web applications for previously unknown vulnerabilities. In the final phase, Eradication, VIA Agent provides vulnerability remediation and patch information details to help the customers remove the discovered vulnerabilities.

Scan Procedures

[1] Reconnaissance

This is the first phase of the whole process in which VIA Agent must gather as much information about the scan target as possible. VIA Agent tries to determine whether the scan target is alive, and if it is, what network ports are open. With all this information in hand, VIA Agent goes one step further to find out the Operating System (OS) of the scan target. Knowing open network ports and the underlying OS of the scan target is key to an accurate and effective vulnerability assessment; therefore, VIA Agent is packed with many different powerful techniques and tools to achieve that. Besides trying to find out open ports and OS of the scan target, VIA Agent also performs various non-intrusive reconnaissance techniques, such as whois, reverse DNS, traceroute, ping so that it can understand better the target network characteristics.

[2] Analysis

The second phase is pre-scanning phase where VIA Agent starts to do more thorough footprinting on the scan target based on the information gathered previously. Instead of just assuming port 21 will be running FTP service, VIA Agent proactively identifies the software that is really running behind the port by using various application mapping techniques, which helps make the audit more accurate and comprehensive. Once the application is identified, VIA Agent proceeds to identify its version number, patch information, and its associated running modules (if there's any).

[3] Scanning

During this phase, VIA Agent relies on its regularly updated threats database to check whether the scan target is susceptible to known vulnerabilities. Based on information about open network ports, OS platform, running network services, configurations, and other useful discoveries, VIA Agent only scans for vulnerabilities that are most relevant to the scan target's infrastructure, instead of blindingly performing +20,000 checks which is extremely time consuming and ineffective.

Some major vulnerability categories that VIA Agent will attempt to scan include but not necessarily limited to the following:

  • Local Checks (require valid login credential)
  • Backdoors
  • DoS
  • Database Services
  • DNS Services
  • FTP Services
  • Mail Services
  • Web Services
  • Netware
  • Unix/Linux
  • Windows
  • Firewall, Routers, SNMP
  • Peer-to-Peer
  • Remote File Access
  • Remote Shell Access

Click here to browse VIA Agent's threats database.

[4] Fuzzing

Web application vulnerabilities contribute significantly to the number of security incidents recorded each year thanks to the ease of exploitation and prevalence of automated hacking tools. However, known flaws in web application, insecure default installation, or weak configuration are not the main reason to blame. Statistics show that most security breaches reported are due to unknown flaws in web applications with SQL Injection vulnerabilities take up to 50%. Mere scanning for known vulnerabilities is no longer suffice in today's world and VIA Agent therefore goes an extra step to help protect the customers by fuzzing their web applications for unknown vulnerabilities.

First, VIA Agent needs to crawl the scan's target web site to account all of its directories, files, forms, fields, CGIs, and scripts. Once the crawling is complete, VIA Agent passes the findings to its Fuzzing engine to perform intensive checks on each individual CGIs, active scripts, and so on to unearth vulnerabilities. Fuzzing will attempt to identify:

  • Cross Site Scripting
  • SQL Injection
  • Code Execution
  • Directory Traversal
  • File Inclusion
  • Buffer Overflow
  • Source Code Disclosure
  • PHP Code Injection
  • XPATH Injection
  • Cookie Manipulation
  • Hidden Fields Manipulation
  • URL Redirection

Advanced Fuzzing techniques, only available with VIA Agent Web edition, provides far more advanced and custom vulnerabilities checks than many other web scanners currently on the market. With hundreds of additional checks on SQL Injection, Blind SQL Injection, Cross Site Scripting, and Code Injection/Execution vulnerabilities, VIA Agent Web edition provides the best SCAN, ALERT, and SECURE platform for customers' web sites.

[5] Eradication

In this last phase of the process, VIA Agent carefully examines discovered vulnerabilities, and thereby, suggests possible vulnerability remediation and patch information to help customers eradicate the vulnerabilities and maintain the network or server healthy.



VIA Agent Login