Security Administrator Tool for Analyzing Networks: Difference between revisions
“&” → “and” as per MOS:AMP; although in an infobox, length of this text isn't the limiting factor |
m WP:CHECKWIKI error fix for #61. Punctuation goes before References. Do general fixes if a problem exists. - using AWB |
||
Line 18: | Line 18: | ||
}} |
}} |
||
'''Security Administrator Tool for Analyzing Networks''' ('''SATAN''') was a free software vulnerability scanner for analyzing networked computers. SATAN captured the attention of a broad technical audience, appearing in [[PC Magazine]]<ref name="pcmag-96">{{cite news|last=Tabibian|first=O. Ryan|title=Internet Scanner Finds Security Holes|url=https://encrypted.google.com/books?id=LYp7r6OrMdIC&pg=RA1-PA80&lpg=RA1-PA80&dq=pc+magazine+satan+1995&source=bl&ots=YXb5mtFg8P&sig=mH0TQ0YLB5QoXubTFC9AIV271_M&hl=en&sa=X&ei=x9OHU5J_kI7IBJDNgYgH&ved=0CDEQ6AEwAg#v=onepage&q=pc%20magazine%20satan%201995&f=false|accessdate=30 May 2014|newspaper=PC Magazine|date=April 23, 1996}}</ref> and drawing threats from the United States [[United States Department of Justice |
'''Security Administrator Tool for Analyzing Networks''' ('''SATAN''') was a free software vulnerability scanner for analyzing networked computers. SATAN captured the attention of a broad technical audience, appearing in [[PC Magazine]]<ref name="pcmag-96">{{cite news|last=Tabibian|first=O. Ryan|title=Internet Scanner Finds Security Holes|url=https://encrypted.google.com/books?id=LYp7r6OrMdIC&pg=RA1-PA80&lpg=RA1-PA80&dq=pc+magazine+satan+1995&source=bl&ots=YXb5mtFg8P&sig=mH0TQ0YLB5QoXubTFC9AIV271_M&hl=en&sa=X&ei=x9OHU5J_kI7IBJDNgYgH&ved=0CDEQ6AEwAg#v=onepage&q=pc%20magazine%20satan%201995&f=false|accessdate=30 May 2014|newspaper=PC Magazine|date=April 23, 1996}}</ref> and drawing threats from the United States [[United States Department of Justice|Department of Justice]].<ref name="pcmag-96" /> It featured a web interface, complete with forms to enter targets, tables to display results, and context-sensitive tutorials that appeared when a vulnerability had been found. |
||
==Naming== |
==Naming== |
||
Line 31: | Line 31: | ||
==Status== |
==Status== |
||
SATAN has fallen from popularity after the height of its popularity in the 1990s. SATAN was released in 1995 and development has ceased. In 2006, [http://sectools.org SecTools.Org] conducted a security popularity poll and developed a list of 100 network security analysis tools in order of popularity based on the responses of 3,243 people. Results suggest<ref>{{cite book|last=Heiser & Kruse|title=Computer Forensics: Incident Response Essentials|date=2002|publisher=Lucent Technologies|isbn=0201707195}}</ref> that SATAN has been replaced by [[ |
SATAN has fallen from popularity after the height of its popularity in the 1990s. SATAN was released in 1995 and development has ceased. In 2006, [http://sectools.org SecTools.Org] conducted a security popularity poll and developed a list of 100 network security analysis tools in order of popularity based on the responses of 3,243 people. Results suggest<ref>{{cite book|last=Heiser & Kruse|title=Computer Forensics: Incident Response Essentials|date=2002|publisher=Lucent Technologies|isbn=0201707195}}</ref> that SATAN has been replaced by [[nmap]], [[Nessus (software)|Nessus]] and to a lesser degree [http://www-arc.com/sara/ SARA] (Security Auditor′s Research Assistant; discontinued 9/1/2009), and [[SAINT (software)|SAINT]]. |
||
== References == |
== References == |
||
Line 46: | Line 46: | ||
[[Category:Security technology]] |
[[Category:Security technology]] |
||
[[Category:1995 introductions]] |
[[Category:1995 introductions]] |
||
{{security-software-stub}} |
{{security-software-stub}} |
Revision as of 04:43, 2 June 2014
File:SATAN-security-scanner-logo.gif | |
Original author(s) | Dan Farmer and Wietse Venema |
---|---|
Written in | Perl, Shell scripts |
Operating system | Unix |
Size | 767k, uncompressed |
Available in | English |
Type | Security software |
Website | www |
Security Administrator Tool for Analyzing Networks (SATAN) was a free software vulnerability scanner for analyzing networked computers. SATAN captured the attention of a broad technical audience, appearing in PC Magazine[1] and drawing threats from the United States Department of Justice.[1] It featured a web interface, complete with forms to enter targets, tables to display results, and context-sensitive tutorials that appeared when a vulnerability had been found.
Naming
For those offended by the name SATAN, the software contained a special command called repent, which rearranged the letters in the program's acronym from "SATAN" to "SANTA".
Description
The tool was developed by Dan Farmer and Wietse Venema. Neil Gaiman drew the artwork for the SATAN documentation.
SATAN was designed to help systems administrators automate the process of testing their systems for known vulnerabilities that can be exploited via the network. This was particularly useful for networked systems with multiple hosts. Like most security tools, it was useful for good or malicious purposes – it was also useful to would-be intruders looking for systems with security holes.
SATAN was written mostly in Perl and utilized a web browser such as Netscape, Mosaic or Lynx to provide the user interface. This easy to use interface drove the scanning process and presents the results in summary format. As well as reporting the presence of vulnerabilities, SATAN also gathered large amounts of general network information, such as which hosts are connected to subnets, what types of machines they are and which services they offered.[2]
Status
SATAN has fallen from popularity after the height of its popularity in the 1990s. SATAN was released in 1995 and development has ceased. In 2006, SecTools.Org conducted a security popularity poll and developed a list of 100 network security analysis tools in order of popularity based on the responses of 3,243 people. Results suggest[3] that SATAN has been replaced by nmap, Nessus and to a lesser degree SARA (Security Auditor′s Research Assistant; discontinued 9/1/2009), and SAINT.
References
- ^ a b Tabibian, O. Ryan (April 23, 1996). "Internet Scanner Finds Security Holes". PC Magazine. Retrieved 30 May 2014.
- ^ Farmer, Dan (1993). "Improving the Security of Your Site by Breaking Into it". Sun Microsystems. Eindhoven University of Technology. Retrieved 30 May 2014.
{{cite journal}}
: Unknown parameter|coauthors=
ignored (|author=
suggested) (help) - ^ Heiser & Kruse (2002). Computer Forensics: Incident Response Essentials. Lucent Technologies. ISBN 0201707195.
External links