Knowledge

Security Administrator Tool for Analyzing Networks

Source 📝

195:
SATAN's popularity diminished after the 1990s. It was released in 1995 and development has ceased. In 2006, SecTools.Org conducted a security popularity poll and developed a list of 100 network security analysis tools in order of popularity based on the responses of 3,243 people. Results suggest that
186:
such as Netscape, Mosaic or Lynx to provide the user interface. This easy to use interface drove the scanning process and presents the results in summary format. As well as reporting the presence of vulnerabilities, SATAN also gathered large amounts of general network information, such as which hosts
174:
SATAN was designed to help systems administrators automate the process of testing their systems for known vulnerabilities that can be exploited via the network. This was particularly useful for networked systems with multiple hosts. Like most security tools, it was useful for good or malicious
135:. It featured a web interface, complete with forms to enter targets, tables to display results, and context-sensitive tutorials that appeared when a vulnerability had been found. 125:) was a free software vulnerability scanner for analyzing networked computers. SATAN captured the attention of a broad technical audience, appearing in 336: 326: 341: 132: 87: 287: 346: 331: 351: 24: 248: 229: 311: 175:
purposes – it was also useful to would-be intruders looking for systems with security holes.
187:
are connected to subnets, what types of machines they are and which services they offered.
8: 168: 276: 143:
For those offended by the name SATAN, the software contained a special command called
283: 201: 205: 57: 147:, which rearranged the letters in the program's acronym from "SATAN" to "SANTA". 320: 160: 204:
and to a lesser degree SARA (Security Auditor's Research Assistant), and
183: 164: 127: 156: 36: 69: 306: 101: 20: 197: 179: 62: 49: 249:"Improving the Security of Your Site by Breaking Into it" 19:"SATAN" redirects here. For the religious concept, see 246: 275: 273: 119:Security Administrator Tool for Analyzing Networks 318: 278:Computer Forensics: Incident Response Essentials 223: 221: 337:Internet Protocol based network software 227: 230:"Internet Scanner Finds Security Holes" 218: 319: 255:. Eindhoven University of Technology 228:Tabibian, O. Ryan (April 23, 1996). 247:Farmer, Dan; Wietse Venema (1993). 133:United States Department of Justice 13: 16:Vulnerability scanner for networks 14: 363: 300: 267: 240: 150: 1: 327:Unix network-related software 211: 171:for the SATAN documentation. 131:and drawing threats from the 178:SATAN was written mostly in 41:Dan Farmer and Wietse Venema 7: 274:Heiser & Kruse (2002). 196:SATAN has been replaced by 10: 368: 342:Computer security software 155:The tool was developed by 18: 190: 138: 96: 86: 78: 68: 56: 45: 35: 282:. Lucent Technologies. 25:Satan (disambiguation) 23:. For other uses, see 347:Security technology 32: 307:Official home page 236:. Ziff Davis, Inc. 74:767k, uncompressed 37:Original author(s) 30: 332:Network analyzers 116: 115: 92:Security software 359: 312:History of SATAN 294: 293: 281: 271: 265: 264: 262: 260: 253:Sun Microsystems 244: 238: 237: 225: 112: 109: 107: 105: 103: 58:Operating system 33: 29: 367: 366: 362: 361: 360: 358: 357: 356: 317: 316: 303: 298: 297: 290: 272: 268: 258: 256: 245: 241: 226: 219: 214: 193: 182:and utilized a 153: 141: 100: 52:, Shell scripts 28: 17: 12: 11: 5: 365: 355: 354: 349: 344: 339: 334: 329: 315: 314: 309: 302: 301:External links 299: 296: 295: 288: 266: 239: 216: 215: 213: 210: 192: 189: 152: 149: 140: 137: 114: 113: 98: 94: 93: 90: 84: 83: 80: 76: 75: 72: 66: 65: 60: 54: 53: 47: 43: 42: 39: 15: 9: 6: 4: 3: 2: 364: 353: 352:1995 software 350: 348: 345: 343: 340: 338: 335: 333: 330: 328: 325: 324: 322: 313: 310: 308: 305: 304: 291: 285: 280: 279: 270: 254: 250: 243: 235: 231: 224: 222: 217: 209: 207: 203: 199: 188: 185: 181: 176: 172: 170: 166: 162: 161:Wietse Venema 158: 148: 146: 136: 134: 130: 129: 124: 120: 111: 99: 95: 91: 89: 85: 81: 77: 73: 71: 67: 64: 61: 59: 55: 51: 48: 44: 40: 38: 34: 26: 22: 277: 269: 257:. Retrieved 252: 242: 233: 194: 177: 173: 154: 144: 142: 126: 122: 118: 117: 79:Available in 234:PC Magazine 184:web browser 165:Neil Gaiman 151:Description 128:PC Magazine 321:Categories 289:0201707195 212:References 157:Dan Farmer 104:.porcupine 46:Written in 167:drew the 169:artwork 97:Website 82:English 286:  259:30 May 202:Nessus 191:Status 145:repent 139:Naming 108:/satan 206:SAINT 123:SATAN 31:SATAN 21:Satan 284:ISBN 261:2014 198:nmap 180:Perl 159:and 106:.org 88:Type 70:Size 63:Unix 50:Perl 102:www 323:: 251:. 232:. 220:^ 208:. 200:, 163:. 292:. 263:. 121:( 110:/ 27:.

Index

Satan
Satan (disambiguation)
Original author(s)
Perl
Operating system
Unix
Size
Type
www.porcupine.org/satan/
PC Magazine
United States Department of Justice
Dan Farmer
Wietse Venema
Neil Gaiman
artwork
Perl
web browser
nmap
Nessus
SAINT


"Internet Scanner Finds Security Holes"
"Improving the Security of Your Site by Breaking Into it"
Computer Forensics: Incident Response Essentials
ISBN
0201707195
Official home page
History of SATAN
Categories

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.