SAINT Architecture Architecture overview Magic cookie generator Policy engine Proximity levels Target acquisition Range and subnet scans Data acquisition Scanning levels Inference engine Reporting and Analysis The SAINT User Interface The Basics Gathering Data Data Management Looking at and understanding the results Excluding vulnerabilities from results Hints, Further tricky security implications, or Getting The Big Picture (tm) Using SAINT Remotely Using SAINT With Apache (or another web server) The Command-line Interface Scheduling Scans Using cron The most important file of all - saint.cf The SAINT database record format facts - just the facts, m'am all-hosts - all the hosts seen todo - all the things it did cve - CVE and Top-10 information SAINT Rulesets - what makes SAINT Go Mapping facts to CVE numbers Overriding/dropping SAINT data Generating new facts Ascertaining host types Determining network services Creating internal task lists Trust relation classification Adding your own probes and vulnerabilities Back to the Documentation TOC
Back to the Documentation TOC