ESDS launches MTvS­can

OpenSource For You - - IN THE NEWS -

ESDS Soft­ware So­lu­tion Pvt Ltd is a well known name in the Web host­ing in­dus­try. With five of its ma­jor brands be­ing present in mar­kets spread across three con­ti­nents, ESDS has al­ways of­fered its cus­tomers ef­fec­tive and cost-ef­fi­cient so­lu­tions for the past nine years. ESDS has launched a first-of-its-kind ser­vice that can be con­sid­ered as a com­plete on­line threat and vul­ner­a­bil­ity man­age­ment ser­vice. It is known as ‘MTvS­can’, which is a short form of Mal­ware Tro­jan Vul­ner­a­bil­ity Scan. MTvS­can au­dits the web­site or Web ap­pli­ca­tion on­line, so users need not give server level ac­cess to ESDS.

The fea­tures of MTvS­can

1. Checks do­main rep­u­ta­tion in Google, SURBL, Mal­ware Pa­trol, Clean-Mx, Phishtank: MTvS­can checks whether its client’s do­main is listed with the data­bases men­tioned above, as they store IP ad­dresses and do­mains that lead to mal­ware, spam­ming and phish­ing ac­tiv­i­ties. 2. Checks mail server IP in 58 RBL repos­i­to­ries: RBL (Real-time Black­hole List) or DNSBL (DNS-based Black­hole List) is a list of IP ad­dresses whose own­ers refuse to stop the pro­lif­er­a­tion of spam. The RBL usu­ally lists server IP ad­dresses from ISPs whose cus­tomers are re­spon­si­ble for the spam, and from ISPs whose servers are hi­jacked for spam re­lay. 3. Scans MySQL, MSSQL, PGSQL, Or­a­cle data­bases for SQL in­jec­tions: It is a trick that ex­ploits poorly fil­tered or not cor­rectly es­caped SQL queries into pars­ing vari­able data from user in­put. 4. Scans Lo­cal File In­jec­tions (LFI): An LFI in­jects files on a server through the Web browser. This vul­ner­a­bil­ity oc­curs when a page that is in­cluded is not prop­erly sani­tised and al­lows di­rec­tory tra­ver­sal char­ac­ters to be in­jected. 5. Scans Re­mote File In­clu­sion (RFI): An RFI al­lows an at­tacker to in­clude a re­mote file, usu­ally through a script on the Web server. The vul­ner­a­bil­ity oc­curs due to the use of user-sup­plied in­put with­out proper val­i­da­tion. This can cause code ex­e­cu­tion on the Web server. Code ex­e­cu­tion on the client-side, such as JavaScript, can lead to other at­tacks such as cross site script­ing (XSS), DoS, data theft, etc. 6. Scans XSS or cross site script­ing • This is a type of com­puter se­cu­rity vul­ner­a­bil­ity typ­i­cally found in Web ap­pli­ca­tions. XSS en­ables at­tack­ers to in­ject a client-side script into Web pages viewed by other users. • De­tects forms on the Web pages and scans for GET and POST re­quests. • Cur­rently, it scans for re­flected XSS. There are fu­ture plans for stored XSS, which oc­curs when a Web ap­pli­ca­tion gath­ers in­put from a user which might be ma­li­cious, and then stores that in­put in a data store for later use. 7. Scans mal­ware • Web­site de­face­ment checks: Web­site de­face­ment is an at­tack on a web­site that changes the vis­ual ap­pear­ance of the site or a Web page. • Force­ful re­di­rect in­jec­tion test­ing. • Scans JavaScript code snip­pets against generic sig­na­tures: Checks for dan­ger­ous JavaScript func­tions like eval, base64_de­code, char, etc. Checks for Iframes. • Spe­cial al­go­rithm de­vel­oped to de­tect JavaScript ob­fus­ca­tion: Ob­fus­ca­tion is used to con­vert vul­ner­a­ble code into un­read­able for­mat. • Third party links check: It checks third party links with rep­u­ta­tion data­bases. 8. In­tel­lis­can: This is agent-based server­side source code scan­ning. • Scans all files for generic sig­na­tures. • Scans all files with LMD MD5 and Hex sig­na­tures. • JavaScript ob­fus­ca­tion de­tec­tion. 9. De­tects and scans CMS • Very few scan­ners pro­vide this fea­ture. • Scans Word­Press, Joomla and vBul­letine. • Scans themes, plug­ins and un­pro­tected ad­min ar­eas. • User enu­mer­a­tion. • Brute forc­ing to de­tect sim­ple pass­words. • FPD - File Path Dis­clo­sure scan­ning. • Scans CMS in all direc­to­ries. 10. Checks for open ports on the server 11. Ban­ner scan­ning: Ad­min­is­tra­tors can use this to take an in­ven­tory of the sys­tems and ser­vices on their net­work. An in­truder can use ban­ner grab­bing in or­der to find net­work hosts that are run­ning ver­sions of ap­pli­ca­tions and op­er­at­ing sys­tems with known ex­ploits. 12. Di­rec­tory scan­ning: The goal of this scan is to or­der an ap­pli­ca­tion to de­tect a com­puter file that is not in­tended to be ac­ces­si­ble. This is caused by a lack of se­cu­rity for di­rec­tory ac­cess on the Web server. 13. De­tects open or sen­si­tive ad­min ar­eas of the site: Scans for sen­si­tive ar­eas on the sites, which ought not to be open to all. 14. Re­verse IP do­main check: Finds out all other do­mains hosted on the same server (the server on which the scan­ning do­main is hosted).

Newspapers in English

Newspapers from India

© PressReader. All rights reserved.