While traditional vulnerability scanning techniques provide valuable insights from the outside, authenticated scans offer a deeper, more comprehensive understanding of system security by providing more vulnerability details on the scanned system from an internal perspective.
By leveraging valid system credentials, Greenbone’s authenticated scans provide critical insights about system configurations, software versions, and potential internal weaknesses that could be exploited by internal attackers in addition to the externally visible vulnerabilities.
During this type of scan the Greenbone appliance logs into the system using the configured credentials and runs local security checks that should not cause any malfunctions or unwanted behavior since they are designed to be safe and non-invasive, focusing on reading configurations and identifying vulnerabilities without modifying the system. Anyway, there may be some performance issues or, if the credentials provided have administrative or root privileges, the appliance may access critical resources, which is never a good practice.
Credentials to use in scans must be created in Configurations tab and then Credentials:
After entering Username e Password (e.g., for SSH or SMB) of a valid user and set the other configuration parameters (Allow insecure login whether the appliance can use the credential for unencrypted or insecure authentication methods or Auto-generate whether the appliance creates a random password), use the credentials while configuring the Greenbone target:
Different type of credentials can be used for authenticated checks based on the nature of the target that are:
An authenticated scan is similar to a white box approach since the appliance can access the target, especially the registry, software versions and patch levels. An example is the following result that was detected by an authenticated scan test, while the same scan on the same machine without configured credentials did not detect it:
For a successful authenticated scan, some requirements must be met depending on the target systems. The main ones are reported here for Microsoft Windows systems, and here for Linux/Unix targets.
With this blog post, I would like to point out and highlight the presence of this additional functionality offered by Greenbone, that is, to run authenticated scans for deeper checks and discover vulnerabilities that require privileged access, such as internal configuration issues or vulnerable applications. Even if the Local Security Checks performed by Greenbone during an authenticated scan should not cause any malfunctions, it is always recommended to monitor the performance of the target system and to first perform tests on staging products to verify the response capacity. During our tests, no disruptions or other relevant problems were detected except for the greater duration of the authenticated scans compared to the same scan without credentials, especially for Windows systems. It should also be noted that if the full and fast scan config is in place, only those vulnerability tests that are safe (safe_checks set to yes) will be executed.
In conclusion, authenticated scans with Greenbone provide critical insights by uncovering vulnerabilities that are typically missed in traditional, non-authenticated automated scans.