SAINT 1.4.1 release now available

SAINT 1.4.1 release now available

Post by kli.. » Tue, 28 Dec 1999 04:00:00



SAINT 1.4.1 is now available for download.

SAINT (based upon SATAN) is a freely available
network security scanner which runs on UNIX
platforms. This release includes all of the new
checks found in SAINT 1.4.1 beta 1, with additional
checks for sadmind, Trinoo, DRAT backdoor,
SSH, and QPOP vulnerabilities.  This release
also fixes a number of bugs that were present
in earlier versions.

SAINT 1.4.1 is available at
http://www.wwdsi.com/saint

Sam Kline
Information Security Specialist
World Wide Digital Security, Inc.

Sent via Deja.com http://www.deja.com/
Before you buy.

 
 
 

SAINT 1.4.1 release now available

Post by Kevi » Thu, 30 Dec 1999 04:00:00



>SAINT 1.4.1 is now available for download.

Does anyone hae any hints on setting this up on Linux?  I looked at
their website and the system is primarily designed for SunOS and IRIX,
neither of which I have.  I have a RedHat 6.1 box sitting next to me
and would like to use it to scan a (primarily) windows NT network,
espeially now that SAINT looks for the RDS bug in IIS.

thanks,
Kevin

--
In vino veritas
http://www.eden.com/~ktneely

 
 
 

SAINT 1.4.1 release now available

Post by Daniel Hartmei » Thu, 30 Dec 1999 04:00:00



>Does anyone hae any hints on setting this up on Linux?  I looked at
>their website and the system is primarily designed for SunOS and IRIX,
>neither of which I have.  I have a RedHat 6.1 box sitting next to me
>and would like to use it to scan a (primarily) windows NT network,
>espeially now that SAINT looks for the RDS bug in IIS.

Linux is supported. Read the README.

  perl reconfig
  make linux
  ./saint

 
 
 

SAINT 1.4.1 release now available

Post by Bill Unr » Fri, 31 Dec 1999 04:00:00



]Does anyone hae any hints on setting this up on Linux?  I looked at
]their website and the system is primarily designed for SunOS and IRIX,
]neither of which I have.  I have a RedHat 6.1 box sitting next to me
]and would like to use it to scan a (primarily) windows NT network,
]espeially now that SAINT looks for the RDS bug in IIS.

Compile it and run it. No problem, at least on a REdhat 5.2 system. Just
ran it over Christmas.

 
 
 

SAINT 1.4.1 release now available

Post by kli.. » Fri, 31 Dec 1999 04:00:00




Quote:

> Does anyone hae any hints on setting this up on Linux?  I looked at
> their website and the system is primarily designed for SunOS and IRIX,
> neither of which I have.  I have a RedHat 6.1 box sitting next to me
> and would like to use it to scan a (primarily) windows NT network,
> espeially now that SAINT looks for the RDS bug in IIS.

To ensure that all RDS vulnerabilities are detected,
I'd suggest raising the timeout value for the http.saint
module. 60 works for me. The default setting tends to
timeout due to the recent increase
in the number of www vulnerability checks. (This will
be fixed in a future release.)
Change the "medium" timeout value in Configuration
Management, and then exit and re-start SAINT.
(You must re-start in order for the change
to take effect.) Alternatively, you can specify a timeout
value specifically for the http.saint module in
the %timeouts array in config/saint.cf.

In response to your original question, SATAN (the
precursor of SAINT) was originally tested on Solaris
and IRIX, but it will run on almost any UNIX/Linux
that has PERL 5.x.

Sam Kline
Information Security Specialist
World Wide Digital Security, Inc.

Sent via Deja.com http://www.deja.com/
Before you buy.

 
 
 

SAINT 1.4.1 release now available

Post by Eric Mye » Fri, 31 Dec 1999 04:00:00





>]Does anyone hae any hints on setting this up on Linux?  I looked at
>]their website and the system is primarily designed for SunOS and IRIX,
>]neither of which I have.  I have a RedHat 6.1 box sitting next to me
>]and would like to use it to scan a (primarily) windows NT network,
>]espeially now that SAINT looks for the RDS bug in IIS.

>Compile it and run it. No problem, at least on a REdhat 5.2 system. Just
>ran it over Christmas.

For Red Hat 6.1 you apparently need to say

  make linux-glibc21

This worked for me (while "make linux" did not).

--

High Energy Theoretical Physics     Tel: 734-763-4325
Department of Physics               Fax: 734-763-2213
University of Michigan, Ann Arbor   http://feynman.physics.lsa.umich.edu/~myers

 
 
 

SAINT 1.4.1 release now available

Post by Stephen Keh » Fri, 31 Dec 1999 04:00:00


I am unable to get Saint 1.4.1 to compile under Red Hat 6.1.  I get the
following output from the make linux command:

make[1]: Entering directory `/usr/local/saint-1.4.1'
cd src/misc; make "LIBS=" "XFLAGS=-I/usr/local/saint-1.4.1/include
-D_BSD_SOURC
E -DSYS_ERRLIST_DECLARED -DAUTH_GID_T=int -g" "RPCGEN=rpcgen"
make[2]: Entering directory `/usr/local/saint-1.4.1/src/misc'
cc -O -I. -I/usr/local/saint-1.4.1/include  -D_BSD_SOURCE
-DSYS_ERRLIST_DECLARED
 -DAUTH_GID_T=int -g   -c rex.c -o rex.o
In file included from /usr/include/rpc/rpc.h:45,
                 from rex.c:23:
/usr/include/rpc/xdr.h:303: parse error before `uint8_t'
/usr/include/rpc/xdr.h:305: parse error before `uint16_t'
/usr/include/rpc/xdr.h:307: parse error before `uint32_t'
/usr/include/rpc/xdr.h:309: parse error before `uint64_t'
In file included from /usr/include/rpc/rpc.h:56,
                 from rex.c:23:
/usr/include/rpc/auth_des.h:40: parse error before `uint32_t'
/usr/include/rpc/auth_des.h:40: warning: no semicolon at end of struct
or union
/usr/include/rpc/auth_des.h:47: field `adc_fullname' has incomplete type

/usr/include/rpc/auth_des.h:48: parse error before `uint32_t'
/usr/include/rpc/auth_des.h:48: warning: no semicolon at end of struct
or union
/usr/include/rpc/auth_des.h:54: parse error before `uint32_t'
/usr/include/rpc/auth_des.h:54: warning: no semicolon at end of struct
or union
/usr/include/rpc/auth_des.h:55: warning: data definition has no type or
storage
class
/usr/include/rpc/auth_des.h:63: field `adv_ctime' has incomplete type
/usr/include/rpc/auth_des.h:67: parse error before `uint32_t'
/usr/include/rpc/auth_des.h:67: warning: no semicolon at end of struct
or union
rex.c: In function `rex_command':
rex.c:178: warning: passing arg 3 from incompatible pointer type
rex.c:178: warning: passing arg 5 from incompatible pointer type
rex.c: In function `rex_exit':
rex.c:222: warning: passing arg 3 from incompatible pointer type
rex.c:222: warning: passing arg 5 from incompatible pointer type
make[2]: *** [rex.o] Error 1
make[2]: Leaving directory `/usr/local/saint-1.4.1/src/misc'
make[1]: *** [all] Error 2
make[1]: Leaving directory `/usr/local/saint-1.4.1'
make: *** [linux] Error 2

Any help would be greatly appreciated.

Stephen Kehl




> > Does anyone hae any hints on setting this up on Linux?  I looked at
> > their website and the system is primarily designed for SunOS and IRIX,
> > neither of which I have.  I have a RedHat 6.1 box sitting next to me
> > and would like to use it to scan a (primarily) windows NT network,
> > espeially now that SAINT looks for the RDS bug in IIS.

> To ensure that all RDS vulnerabilities are detected,
> I'd suggest raising the timeout value for the http.saint
> module. 60 works for me. The default setting tends to
> timeout due to the recent increase
> in the number of www vulnerability checks. (This will
> be fixed in a future release.)
> Change the "medium" timeout value in Configuration
> Management, and then exit and re-start SAINT.
> (You must re-start in order for the change
> to take effect.) Alternatively, you can specify a timeout
> value specifically for the http.saint module in
> the %timeouts array in config/saint.cf.

> In response to your original question, SATAN (the
> precursor of SAINT) was originally tested on Solaris
> and IRIX, but it will run on almost any UNIX/Linux
> that has PERL 5.x.

> Sam Kline
> Information Security Specialist
> World Wide Digital Security, Inc.

> Sent via Deja.com http://www.deja.com/
> Before you buy.

 
 
 

SAINT 1.4.1 release now available

Post by Bill Unr » Sat, 01 Jan 2000 04:00:00


]To ensure that all RDS vulnerabilities are detected,
]I'd suggest raising the timeout value for the http.saint
]module. 60 works for me. The default setting tends to
]timeout due to the recent increase
]in the number of www vulnerability checks. (This will
]be fixed in a future release.)
]Change the "medium" timeout value in Configuration
]Management, and then exit and re-start SAINT.
](You must re-start in order for the change
]to take effect.) Alternatively, you can specify a timeout
]value specifically for the http.saint module in
]the %timeouts array in config/saint.cf.

o Is there some way of launching Saint against a specific list
of targets. The current situation seems to be that you can either
launch against a single target or a whole subnet. I have a finite number
or machines I would like to test, but there are in no sort of "subnet".

 
 
 

SAINT 1.4.1 release now available

Post by Bill » Sat, 01 Jan 2000 04:00:00



in comp.security.unix :


>]To ensure that all RDS vulnerabilities are detected,
>]I'd suggest raising the timeout value for the http.saint
>]module. 60 works for me. The default setting tends to
>]timeout due to the recent increase
>]in the number of www vulnerability checks. (This will
>]be fixed in a future release.)
>]Change the "medium" timeout value in Configuration
>]Management, and then exit and re-start SAINT.
>](You must re-start in order for the change
>]to take effect.) Alternatively, you can specify a timeout
>]value specifically for the http.saint module in
>]the %timeouts array in config/saint.cf.

>o Is there some way of launching Saint against a specific list
>of targets. The current situation seems to be that you can either
>launch against a single target or a whole subnet. I have a finite number
>or machines I would like to test, but there are in no sort of "subnet".

You could use a pretty simplistic sh or pl script.

--
Bill "Houdini" Weiss
PGP key: http://home.att.net/~bill_weiss/bill_weiss.asc
ICQ#: 43270740

--
666 ^ (-1) - Imaginary number of the Beast

 
 
 

SAINT 1.4.1 release now available

Post by kli.. » Tue, 04 Jan 2000 04:00:00


Quote:> o Is there some way of launching Saint against a specific list
> of targets. The current situation seems to be that you can either
> launch against a single target or a whole subnet. I have a finite
number
> or machines I would like to test, but there are in no sort

of "subnet".

SAINT-1.4.1 allows you to specify a list of
addresses to scan, but only when being run from
the command line.  The syntax for this would be:

./saint [options] <address1> <address2> <address3> ...

./saint -h (to display a list of options)

After the scan completes, you can then view the
results in the usual manner by running saint
and choosing "Data Analysis" from the menu.

The next release of SAINT will allow you to scan
a list of hosts, an address range,
a subnet, or any combination of the above from
either the GUI or the command line. This will
probably be available in February or March.

Sam Kline
Information Security Specialist
World Wide Digital Security, Inc.

Sent via Deja.com http://www.deja.com/
Before you buy.

 
 
 

SAINT 1.4.1 release now available

Post by Eric Mye » Tue, 04 Jan 2000 04:00:00



>I am unable to get Saint 1.4.1 to compile under Red Hat 6.1.  I get the
>following output from the make linux command:

Try   `make linux-glibc21`  instead.  Worked for me.

--

High Energy Theoretical Physics     Tel: 734-763-4325
Department of Physics               Fax: 734-763-2213
University of Michigan, Ann Arbor   http://www.umich.edu/~myers

 
 
 

1. SAINT 1.5 release now available

SAINT 1.5 is now available from
http://www.wwdsi.com/saint

SAINT, based upon SATAN, is a free user-friendly
network security scanner which runs on UNIX.
New features include:
Ability to scan a range of addresses, new checks
for Stacheldraht, amd, AIX ftpd vulnerability, Linux lpd vulnerability,
three new CGI's, and nine new Windows backdoors.  Also added support for
Tru64, new severity categories, and improved OS typing.

Sam Kline
Information Security Specialist
World Wide Digital Security, Inc.

Sent via Deja.com http://www.deja.com/
Before you buy.

2. LILO and aic7870 - Netserver LS

3. SAINT 2.0.1 now available

4. hd partition sizing?

5. SAINT 2.0 beta 1 now available

6. "Cannot find Red Hat install directory tree"?? <- problem during install of RH5.0

7. SAINT 1.4.1 BETA 1 now available

8. inport mouse in RH5

9. is Saint available for Obsd ?

10. SAINT 1.5 beta 1 available

11. Announce: Kernel Build for 2.5, Release 1.12 is available

12. Debian Linux Distribution Release 1.1 Now Available

13. Announce: Kernel Build for 2.5, Release 2.4 is available