Jump to content

Security Administrator Tool for Analyzing Networks: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
m diction
add citation
Line 11: Line 11:
SATAN was written mostly in [[Perl]] and utilized a [[web browser]] such as Netscape, Mosaic or Lynx to provide the user interface. This easy to use interface drove the scanning process and presents the results in summary format. As well as reporting the presence of vulnerabilities, SATAN also gathered large amounts of general network information, such as which hosts are connected to subnets, what types of machines they are and which services they offered.<ref>{{cite journal|last=Farmer|first=Dan|coauthors=Wietse Venema|title=Improving the Security of Your Site by Breaking Into it|journal=Sun Microsystems|date=1993|volume=Eindhoven University of Technology|url=http://www.porcupine.org/satan/admin-guide-to-cracking.html|accessdate=30 May 2014}}</ref>
SATAN was written mostly in [[Perl]] and utilized a [[web browser]] such as Netscape, Mosaic or Lynx to provide the user interface. This easy to use interface drove the scanning process and presents the results in summary format. As well as reporting the presence of vulnerabilities, SATAN also gathered large amounts of general network information, such as which hosts are connected to subnets, what types of machines they are and which services they offered.<ref>{{cite journal|last=Farmer|first=Dan|coauthors=Wietse Venema|title=Improving the Security of Your Site by Breaking Into it|journal=Sun Microsystems|date=1993|volume=Eindhoven University of Technology|url=http://www.porcupine.org/satan/admin-guide-to-cracking.html|accessdate=30 May 2014}}</ref>


SATAN has fallen from popularity after the height of its popularity in the 1990s. SATAN was released in 1995 and development has ceased. In 2006, [http://sectools.org SecTools.Org] conducted a security popularity poll and developed a list of 100 network security analysis tools in order of popularity based on the responses of 3,243 people. Results suggest that SATAN has been replaced by [[Nmap|nmap]], [[Nessus (software)|Nessus]] and to a lesser degree [http://www-arc.com/sara/ SARA] (Security Auditor′s Research Assistant; discontinued 9/1/2009), and [[SAINT (software)|SAINT]].
SATAN has fallen from popularity after the height of its popularity in the 1990s. SATAN was released in 1995 and development has ceased. In 2006, [http://sectools.org SecTools.Org] conducted a security popularity poll and developed a list of 100 network security analysis tools in order of popularity based on the responses of 3,243 people. Results suggest<ref>{{cite book|last=Heiser & Kruse|title=Computer Forensics: Incident Response Essentials|date=2002|publisher=Lucent Technologies|isbn=0201707195}}</ref> that SATAN has been replaced by [[Nmap|nmap]], [[Nessus (software)|Nessus]] and to a lesser degree [http://www-arc.com/sara/ SARA] (Security Auditor′s Research Assistant; discontinued 9/1/2009), and [[SAINT (software)|SAINT]].


==Naming==
==Naming==

Revision as of 00:38, 30 May 2014

Security Administrator Tool for Analyzing Networks (SATAN) was penetration testing and reporting software that collected a variety of information about networked hosts in order to analyze their security. It featured a web interface, complete with forms to enter targets, tables to display results, and context-sensitive tutorials that appeared when a vulnerability had been found.

Description

The tool was developed by Dan Farmer and Wietse Venema. Neil Gaiman drew the artwork for the SATAN documentation.

SATAN was designed to help systems administrators automate the process of testing their systems for known vulnerabilities that can be exploited via the network. This was particularly useful for networked systems with multiple hosts. Like most security tools, it was useful for good or malicious purposes – it was also useful to would-be intruders looking for systems with security holes.

SATAN was written mostly in Perl and utilized a web browser such as Netscape, Mosaic or Lynx to provide the user interface. This easy to use interface drove the scanning process and presents the results in summary format. As well as reporting the presence of vulnerabilities, SATAN also gathered large amounts of general network information, such as which hosts are connected to subnets, what types of machines they are and which services they offered.[1]

SATAN has fallen from popularity after the height of its popularity in the 1990s. SATAN was released in 1995 and development has ceased. In 2006, SecTools.Org conducted a security popularity poll and developed a list of 100 network security analysis tools in order of popularity based on the responses of 3,243 people. Results suggest[2] that SATAN has been replaced by nmap, Nessus and to a lesser degree SARA (Security Auditor′s Research Assistant; discontinued 9/1/2009), and SAINT.

Naming

For those offended by the name SATAN, the software contained a special command called repent, which rearranged the letters in the program's acronym from "SATAN" to "SANTA".

  1. ^ Farmer, Dan (1993). "Improving the Security of Your Site by Breaking Into it". Sun Microsystems. Eindhoven University of Technology. Retrieved 30 May 2014. {{cite journal}}: Unknown parameter |coauthors= ignored (|author= suggested) (help)
  2. ^ Heiser & Kruse (2002). Computer Forensics: Incident Response Essentials. Lucent Technologies. ISBN 0201707195.