You are on page 1of 13

Scuba Database

Vulnerability
Scanner
Presented By:

Nivedita
119011012642
IVth Year B.Tech CSE
PMIST,Vallam

1
Introduction
1. Released on November 7, 2008
2. Uncovers hidden security risks
3. Scan enterprise databases for vulnerabilities and misconfiguration.
4. Available for all kinds of Operating systems.
5. Scuba offers over 2,300 assessment tests.
6. With this tool we can:
a. Scan enterprise databases for vulnerabilities and misconfiguration
b. Know the risks to our databases
c. Get recommendations on how to mitigate identified issues
7. An average Scuba scan normally takes 2-3 minutes.
8. Free Trial available.

2
Prerequisites

1. Internet access must be allowed.


2. Verify that we have a user with all required database permissions.
3. Scuba requires a number of baseline permissions.

3
Five Tips for Getting Started with Scuba
1 Selecting a User

Reading the Scan Results. 2

3 Identifying Vulnerabilities
Finding Suggested
Remediation for 4

Assessments
Checking Compliance
5
Status

4
Running a Scan : LOcal network
1. Local network: The database resides on a local network.
2. We can run a scan on a database that resides on our local network, or a cloud
database:
a. that has a public address

b. that we are connected to via network peering

c. on whose machine we run the scan using a Remove


Connection

3. When the scan ends, the application closes.

5
Running a Scan using the SSH Tunnel Option
1. Cloud (SSH Tunnel) option is used to scan when :
1. If the database we are scanning is on the public cloud
2. does not have a public address
3. nor is accessible to your own machine via peering
4. nor is having the scan run on the database machine
itself via a remote connection

6
What kinds of users and organization
types does Scuba Database
Vulnerability Scanner work with?

7
What kind of support options does
Scuba Database Vulnerability
Scanner offer?

8
What languages does Scuba
Database Vulnerability Scanner
support in their product?

9
Does Scuba Database
Vulnerability Scanner offer a
free trial?

10
Who are the audience
of scuba database
vulnerability
scanner?

11
CONCLUSION

12
Thank you!

13

You might also like