{"id":665,"date":"2021-04-20T13:05:58","date_gmt":"2021-04-20T12:05:58","guid":{"rendered":"https:\/\/www.seven-stones.biz\/blog\/?p=665"},"modified":"2021-04-20T13:05:59","modified_gmt":"2021-04-20T12:05:59","slug":"what-is-your-va-scanner-really-doing","status":"publish","type":"post","link":"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/","title":{"rendered":"What Is Your VA Scanner Really Doing?"},"content":{"rendered":"\n<p>It&#8217;s clear from social media and first hand reports, that the awareness of what VA (Vulnerability Assessment) scanners are really doing in testing scenarios is quite low. So I setup up a test box with Ubuntu 18 and exposed some services which are well known to the hacker community and also still popular in production business use cases: Secure Shell (SSH) and an Apache web service.<\/p>\n\n\n\n<p>This post isn&#8217;t an attack on VA products at all. It&#8217;s aimed at setting a more healthy expectation, and I will cover a test scenario with a packet sniffer (<a href=\"https:\/\/www.wireshark.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Wireshark<\/a>), <a href=\"https:\/\/www.tenable.com\/products\/nessus\/nessus-professional\" target=\"_blank\" rel=\"noreferrer noopener\">Nessus Professional<\/a>, and <a href=\"https:\/\/www.openvas.org\/\">OpenVAS<\/a>, that illustrates the point.<\/p>\n\n\n\n<p>I became aware 20 years ago, from validating VA scanner output, that a lot of what VA scanners barf out is alarmist (red flags, CRITICAL [fix NOW!]) and also based purely on guesswork &#8211; when the scanner &#8220;sees&#8221; a service, it grabs a service banner (e.g. &#8220;OpenSSH 7.6p1 Ubuntu 4ubuntu0.3&#8221;), looks in its database for public disclosed vulnerability with that version, and flags vulnerability if there are any associated <a href=\"https:\/\/cve.mitre.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">CVE<\/a>s. Contrary to popular belief, there is no actual interaction in the way of further investigating or validating vulnerability. All vulnerability reporting is based on the service banner. <strong><em>So if i change my banner to &#8220;hi OpenVAS&#8221;, nothing will be reported.<\/em><\/strong> And in security, we like to advise hiding product names and versions &#8211; this helps with <a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/drive-by-download\" target=\"_blank\" rel=\"noreferrer noopener\">drive-by style automated attacks<\/a>, in a much more effective way than for example, <a href=\"https:\/\/serverfault.com\/questions\/316516\/does-changing-default-port-number-actually-increase-security\" target=\"_blank\" rel=\"noreferrer noopener\">changing default service ports<\/a>.<\/p>\n\n\n\n<p>This article then demonstrates the VA scanner behaviour described above and covers developments over the past 20 years (did things improve?) with the two most commonly found scanners: Nessus and OpenVAS, which even if are not used directly, are used indirectly (vendors in this space do not recreate the wheel, they take existing IP &#8211; all legal I&#8217;m sure &#8211; and create their own UI for it). It was fairly well-known that Nessus was the basis of most commercial VAs in the 00s, and it seems unlikely that scenario has changed a great deal.<\/p>\n\n\n\n<h2><span style=\"font-size: 22px\">Test Setup<\/span><\/h2>\n\n\n\n<p>So if I look at my test box setup I see from port scan results (nmap): <\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">PORT STATE SERVICE VERSION<br>22\/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)<br>25\/tcp open smtp Postfix smtpd<br>80\/tcp open http Apache httpd 2.4.29 ((Ubuntu))<br>139\/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)<br>445\/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)<br>3000\/tcp open http Apache httpd 2.4.29 ((Ubuntu))<br>5000\/tcp open http Docker Registry (API: 2.0)<br>8000\/tcp open http Apache httpd 2.4.29<\/pre>\n\n\n\n<p>So&#8230;naughty, naughty. Apache is not so old but still I&#8217;d expect to see some CVEs flagged, and I can say the same for the SSH service. Samba is there too in a default format. Samba is Linux&#8217;s implementation of MS Windows SMB (Server Message Block) and is full of holes. The Postfix mail service is also quite old, and there&#8217;s a Docker API exposed! All this would get an attacker quite excited, and indeed there&#8217;s plenty of automated attack scenarios which would work here.<\/p>\n\n\n\n<p>There was also an <a href=\"https:\/\/www.sagiss.com\/small_business_technology_blog\/what-is-eol-software-and-why-should-you-care\" target=\"_blank\" rel=\"noreferrer noopener\">EOL<\/a> <a href=\"https:\/\/www.phpmyadmin.net\/\" target=\"_blank\" rel=\"noreferrer noopener\">Phpmyadmin<\/a> and EOL <a href=\"https:\/\/jquery.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">jQuery<\/a> wrapped up in the web service.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"font-size: 22px\">Developments in Two Decades<\/span><\/h2>\n\n\n\n<p>So there has been some changes. For want of a better word, there&#8217;s now more honesty. In the case of OpenVAS, for vulnerability that involves grabbing a banner and assuming vulnerability based on this, there is a Quality of Detection (<em>QoD<\/em>) rating, which is set as default at around 70%. This is a kind of probability rating for a finding not being a false positive. Interestingly those findings that involve a banner grab are way down there under 50, and most are no longer flagged as &#8220;critical&#8221;. <\/p>\n\n\n\n<p>Nessus, for its banner-grabbed vulnerabilities, is more explicit and it is report will state &#8220;Note that Nessus has not tested for this issue but has instead relied only on the application&#8217;s self-reported version number.&#8221;<\/p>\n\n\n\n<p>Even 7 years ago, there would be lots of issues reported for an outdated Apache or SSH service, many of which would be flagged wrongly as CRITICAL, but not necessarily exploitable, and the existance of the vulnerability was based only on a text banner. So these more recent VA versions are an improvement, but its clear the awareness out there of these issues is still quite low. The problem is now &#8211; we do want to see if services are downlevel, so please $VENDOR, don&#8217;t hide them (more on this later). <\/p>\n\n\n\n<h2><span style=\"font-size: 22px\">First Scan &#8211; Banners On Display<\/span><\/h2>\n\n\n\n<p>So using Wireshark, sniffing HTTP on port 80 (plain text) we have the following&#8230; <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/Screenshot-2021-04-19-at-17.28.32.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"531\" src=\"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/Screenshot-2021-04-19-at-17.28.32-1024x531.png\" alt=\"\" class=\"wp-image-668\" srcset=\"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/Screenshot-2021-04-19-at-17.28.32-1024x531.png 1024w, https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/Screenshot-2021-04-19-at-17.28.32-300x156.png 300w, https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/Screenshot-2021-04-19-at-17.28.32-768x398.png 768w, https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/Screenshot-2021-04-19-at-17.28.32-500x259.png 500w, https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/Screenshot-2021-04-19-at-17.28.32.png 1068w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption>Wireshark window showing the OpenVAS interaction with the text box target<\/figcaption><\/figure>\n\n\n\n<p>The packets highlighted in black are the only two of any interest, wherein OpenVAS has used the HTTP GET method to request for &#8220;\/&#8221;, and receives a response where the header shows the product (Apache) and version (2.4.29).<\/p>\n\n\n\n<p>Note the Wireshark filter used (<code>tcp.port == 80 and http<\/code>). Other than the initial exchange where a banner was grabbed, there was no further interaction. This was the same for Nessus.<\/p>\n\n\n\n<p>What was reported? Well, for OpenVAS, a handful of potential CVEs were reported but I had to lower the QoD to see them! Which is interesting. If anything this is moving the bar too far in the opposite direction. I mean as an owner of this system, <strong>I do want to know if i am running old warez!<\/strong> <\/p>\n\n\n\n<p>For Nessus, 6 Apache CVEs were reported with either critical or &#8220;high&#8221; severity. Overall, I had a similar experience with that of OpenVAS except to even see the Apache issues reported I had to beg the scanner with the following scan configuration setup: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Settings &#8211;&gt; Assessment &#8211;&gt; Override normal accuracy and show potential false alarms<\/li><li>Settings &#8211;&gt; Assessment &#8211;&gt; perform thorough tests<\/li><li>Settings &#8211;&gt; Advanced &#8211;&gt; enable safe checks on (and i also tried the &#8220;off&#8221; option)<\/li><li>Settings &#8211;&gt; Advanced &#8211;&gt; plugins &#8211;&gt; web servers &#8211;&gt; enabled. This is the Apache vulnerability section<\/li><\/ul>\n\n\n\n<p>For the SSH service, OpenVAS reported 3 medium issues which is roughly what i was expecting. Nessus did not report any at all! Answers on a postcard for that one.<\/p>\n\n\n\n<h2><span style=\"font-size: 22px\">Banners Concealed<\/span><\/h2>\n\n\n\n<p>What was interesting was that the Secure Shell service doesn&#8217;t present an option to hide the banner any more, and on investigation, the majority-held community-version of this story is that the banner is needed in some cases. <\/p>\n\n\n\n<p>Apache however did present a banner obfuscation option. For Ubuntu 18 and Apache 2.4.29, this involved:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code>apt install libapache2-mod-security2<\/code><\/li><li><code>a2enmod security2<\/code><\/li><li>edit \/etc\/apache2\/conf-available\/security.conf<\/li><li>ServerTokens set to &#8220;Prod&#8221;<\/li><li><code>systemctl restart apache2<\/code><\/li><\/ul>\n\n\n\n<p>This setup results in the following banner for Apache: <code>Apache httpd<\/code> &#8211; so no version number.<\/p>\n\n\n\n<p>The outcome? As expected, all mention of Apache has now ended. Neither OpenVAS or Nessus reported anything to do with Apache of any note. <\/p>\n\n\n\n<h2><span style=\"font-size: 22px\">What DID The Scanners Find?<\/span><\/h2>\n\n\n\n<p>Just to summarise the findings when the banners were fully on display&#8230;it wasn&#8217;t a blank slate. There were some findings. Here are the highlights &#8211; for OpenVAS:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>All Critical issues detected were related to PHPMyAdmin, plus one related to jQuery being EOL, but not stating any particular vulnerability. These version numbers are remotely queriable and this is the basis on which these issues were reported.<\/li><li>The SSH and Apache issues.<\/li><li>Other lower criticality issues were around certificate ciphers.<\/li><li>Some CVSS 6, medium issues with Samba &#8211; again these are banner-grabbed guesswork findings.<\/li><\/ul>\n\n\n\n<p>Nessus didn&#8217;t report anything outside of what OpenVAS flagged. OpenVAS reported significantly more issues.<\/p>\n\n\n\n<p>It should be said that both scanners did a lot of querying for HTTP application layer issues that could be seen in the packet sniffer output. For example, queries were made for Python\/Django settings.py (database password), and other HTTP gotchas.<\/p>\n\n\n\n<h2><span style=\"font-size: 22px\">Unauthenticated Versus Credentialed Testing<\/span><\/h2>\n\n\n\n<p>With VA Scanners, the picture hasn&#8217;t really changed in 20 years. If anything the picture is worse now because the balance with banner-grabbing guesswork has swung too far the other way, and we have to plead with the scanners to tell us about downlevel software versions. This is presumably an effort to reduce the number of false positives, but its not an advisable strategy. It&#8217;s perfectly ok to let us know we are running old wares and if we want, we should be able to see the CVEs associated with our listening services, even if many of them are false positives (and I can say from 20 years of network penetration testing, there will be plenty).<\/p>\n\n\n\n<p>With this type of unauthenticated VA scanning though, the real problem has always been false negatives (to the extent that an open Docker API wasn&#8217;t flagged as a problem by either scanner), but none of the other commercial tools out there (I have tried a few in recent years) will be in a better position, because there is hard-limit that can be achieved non-locally with no adminstrative authentication credentials. <\/p>\n\n\n\n<p>Both Nessus and OpenVAS allow use of credentialled based testing but its clear this aspect was never a part of the core design. Nessus has expanded its portfolio of credentialed tests but in the time allocated I could not get it to work with <a href=\"https:\/\/www.ssh.com\/academy\/ssh\/public-key-authentication\" target=\"_blank\" rel=\"noreferrer noopener\">SSH public key authentication<\/a>. In any case, a <a href=\"https:\/\/www.cisecurity.org\/cis-benchmarks\/\" target=\"_blank\" rel=\"noreferrer noopener\">CIS benchmark<\/a> approach will always be not-so-great, for reasons outside the scope of this article. We also have to be careful about where authentication credentials are stored. In the case of SSH keys, this means storing a private key, and with some vendors the key will be stored in their cloud somewhere out there.<\/p>\n\n\n\n<h2><span style=\"font-size: 22px\">Conclusion<\/span><\/h2>\n\n\n\n<p>This post focusses on one major aspect of VA scanning that is grabbing banners and reporting on vulnerability based on the findings from the banner. This is better than nothing but its futility is hopefully illustrated here, and this approach is core to most of what VA scanners do for us.<\/p>\n\n\n\n<p>The market priority has always been towards unauthenticated scanning. Little focus was ever given to credentialed scanning. This has to change because the unauthenticated approach is like trying to diagnose a problem with your car without ever lifting the bonnet\/hood, and moreover we could be moving into an era where accreditation bodies <strong><em>mandate<\/em><\/strong> credentialed scanning.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>All vulnerability reporting is based on the service banner. So if i change my banner to &#8220;hi OpenVAS&#8221;, nothing will be reported.  <a href=\"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":416,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[175,65,50,169,120,121,10,102,176,101,214,23,31,9],"tags":[221,222,223,190,217,79,72],"class_list":["post-665","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ci-cd","category-cis-benchmarks","category-cloud","category-devops-and-security","category-nessus","category-openvas","category-penetration-testing","category-port-scanning","category-security-testing","category-security-tools","category-threat-hunting","category-tools","category-vulnerability-assessment","category-vulnerability-management","tag-nessus","tag-openvas","tag-security-testing","tag-threat-and-vulnerability-management","tag-threat-hunting","tag-vulnerability-assessment","tag-vulnerability-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is Your VA Scanner Really Doing? - Security Macromorphosis<\/title>\n<meta name=\"description\" content=\"How do VA tools most operate? Most vulnerability reporting is based on the service banner. So if i change my banner to &quot;hi OpenVAS&quot;, nothing will be reported.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Your VA Scanner Really Doing? - Security Macromorphosis\" \/>\n<meta property=\"og:description\" content=\"How do VA tools most operate? Most vulnerability reporting is based on the service banner. So if i change my banner to &quot;hi OpenVAS&quot;, nothing will be reported.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Macromorphosis\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-20T12:05:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-20T12:05:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/wp-header-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"288\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"itibble@gmail.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@seven_stones\" \/>\n<meta name=\"twitter:site\" content=\"@seven_stones\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"itibble@gmail.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/\",\"url\":\"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/\",\"name\":\"What Is Your VA Scanner Really Doing? - Security Macromorphosis\",\"isPartOf\":{\"@id\":\"https:\/\/www.seven-stones.biz\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/wp-header-1.jpg\",\"datePublished\":\"2021-04-20T12:05:58+00:00\",\"dateModified\":\"2021-04-20T12:05:59+00:00\",\"author\":{\"@id\":\"https:\/\/www.seven-stones.biz\/blog\/#\/schema\/person\/dd7adbe0152f2279b133661b823e0c28\"},\"description\":\"How do VA tools most operate? Most vulnerability reporting is based on the service banner. So if i change my banner to \\\"hi OpenVAS\\\", nothing will be reported.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/#primaryimage\",\"url\":\"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/wp-header-1.jpg\",\"contentUrl\":\"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/wp-header-1.jpg\",\"width\":1000,\"height\":288,\"caption\":\"Sacred holy Cows\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.seven-stones.biz\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is Your VA Scanner Really Doing?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.seven-stones.biz\/blog\/#website\",\"url\":\"https:\/\/www.seven-stones.biz\/blog\/\",\"name\":\"Security Macromorphosis\",\"description\":\"Ian Tibble&#039;s Security Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.seven-stones.biz\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.seven-stones.biz\/blog\/#\/schema\/person\/dd7adbe0152f2279b133661b823e0c28\",\"name\":\"itibble@gmail.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.seven-stones.biz\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g\",\"caption\":\"itibble@gmail.com\"},\"description\":\"Author of Security De-engineering, CTO at Seven Stones (Indonesia)\",\"sameAs\":[\"http:\/\/www.seven-stones.biz\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is Your VA Scanner Really Doing? - Security Macromorphosis","description":"How do VA tools most operate? Most vulnerability reporting is based on the service banner. So if i change my banner to \"hi OpenVAS\", nothing will be reported.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/","og_locale":"en_US","og_type":"article","og_title":"What Is Your VA Scanner Really Doing? - Security Macromorphosis","og_description":"How do VA tools most operate? Most vulnerability reporting is based on the service banner. So if i change my banner to \"hi OpenVAS\", nothing will be reported.","og_url":"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/","og_site_name":"Security Macromorphosis","article_published_time":"2021-04-20T12:05:58+00:00","article_modified_time":"2021-04-20T12:05:59+00:00","og_image":[{"width":1000,"height":288,"url":"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/wp-header-1.jpg","type":"image\/jpeg"}],"author":"itibble@gmail.com","twitter_card":"summary_large_image","twitter_creator":"@seven_stones","twitter_site":"@seven_stones","twitter_misc":{"Written by":"itibble@gmail.com","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/","url":"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/","name":"What Is Your VA Scanner Really Doing? - Security Macromorphosis","isPartOf":{"@id":"https:\/\/www.seven-stones.biz\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/#primaryimage"},"image":{"@id":"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/wp-header-1.jpg","datePublished":"2021-04-20T12:05:58+00:00","dateModified":"2021-04-20T12:05:59+00:00","author":{"@id":"https:\/\/www.seven-stones.biz\/blog\/#\/schema\/person\/dd7adbe0152f2279b133661b823e0c28"},"description":"How do VA tools most operate? Most vulnerability reporting is based on the service banner. So if i change my banner to \"hi OpenVAS\", nothing will be reported.","breadcrumb":{"@id":"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/#primaryimage","url":"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/wp-header-1.jpg","contentUrl":"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/wp-header-1.jpg","width":1000,"height":288,"caption":"Sacred holy Cows"},{"@type":"BreadcrumbList","@id":"https:\/\/www.seven-stones.biz\/blog\/what-is-your-va-scanner-really-doing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.seven-stones.biz\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is Your VA Scanner Really Doing?"}]},{"@type":"WebSite","@id":"https:\/\/www.seven-stones.biz\/blog\/#website","url":"https:\/\/www.seven-stones.biz\/blog\/","name":"Security Macromorphosis","description":"Ian Tibble&#039;s Security Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.seven-stones.biz\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.seven-stones.biz\/blog\/#\/schema\/person\/dd7adbe0152f2279b133661b823e0c28","name":"itibble@gmail.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.seven-stones.biz\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g","caption":"itibble@gmail.com"},"description":"Author of Security De-engineering, CTO at Seven Stones (Indonesia)","sameAs":["http:\/\/www.seven-stones.biz"]}]}},"_links":{"self":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts\/665","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/comments?post=665"}],"version-history":[{"count":13,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts\/665\/revisions"}],"predecessor-version":[{"id":680,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts\/665\/revisions\/680"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/media\/416"}],"wp:attachment":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/media?parent=665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/categories?post=665"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/tags?post=665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}