195:
SATAN's popularity diminished after the 1990s. It was released in 1995 and development has ceased. In 2006, SecTools.Org conducted a security popularity poll and developed a list of 100 network security analysis tools in order of popularity based on the responses of 3,243 people. Results suggest that
186:
such as
Netscape, Mosaic or Lynx to provide the user interface. This easy to use interface drove the scanning process and presents the results in summary format. As well as reporting the presence of vulnerabilities, SATAN also gathered large amounts of general network information, such as which hosts
174:
SATAN was designed to help systems administrators automate the process of testing their systems for known vulnerabilities that can be exploited via the network. This was particularly useful for networked systems with multiple hosts. Like most security tools, it was useful for good or malicious
135:. It featured a web interface, complete with forms to enter targets, tables to display results, and context-sensitive tutorials that appeared when a vulnerability had been found.
125:) was a free software vulnerability scanner for analyzing networked computers. SATAN captured the attention of a broad technical audience, appearing in
336:
326:
341:
132:
87:
287:
346:
331:
351:
24:
248:
229:
311:
175:
purposes – it was also useful to would-be intruders looking for systems with security holes.
187:
are connected to subnets, what types of machines they are and which services they offered.
8:
168:
276:
143:
For those offended by the name SATAN, the software contained a special command called
283:
201:
205:
57:
147:, which rearranged the letters in the program's acronym from "SATAN" to "SANTA".
320:
160:
204:
and to a lesser degree SARA (Security
Auditor's Research Assistant), and
183:
164:
127:
156:
36:
69:
306:
101:
20:
197:
179:
62:
49:
249:"Improving the Security of Your Site by Breaking Into it"
19:"SATAN" redirects here. For the religious concept, see
246:
275:
273:
119:Security Administrator Tool for Analyzing Networks
318:
278:Computer Forensics: Incident Response Essentials
223:
221:
337:Internet Protocol based network software
227:
230:"Internet Scanner Finds Security Holes"
218:
319:
255:. Eindhoven University of Technology
228:Tabibian, O. Ryan (April 23, 1996).
247:Farmer, Dan; Wietse Venema (1993).
133:United States Department of Justice
13:
16:Vulnerability scanner for networks
14:
363:
300:
267:
240:
150:
1:
327:Unix network-related software
211:
171:for the SATAN documentation.
131:and drawing threats from the
178:SATAN was written mostly in
41:Dan Farmer and Wietse Venema
7:
274:Heiser & Kruse (2002).
196:SATAN has been replaced by
10:
368:
342:Computer security software
155:The tool was developed by
18:
190:
138:
96:
86:
78:
68:
56:
45:
35:
282:. Lucent Technologies.
25:Satan (disambiguation)
23:. For other uses, see
347:Security technology
32:
307:Official home page
236:. Ziff Davis, Inc.
74:767k, uncompressed
37:Original author(s)
30:
332:Network analyzers
116:
115:
92:Security software
359:
312:History of SATAN
294:
293:
281:
271:
265:
264:
262:
260:
253:Sun Microsystems
244:
238:
237:
225:
112:
109:
107:
105:
103:
58:Operating system
33:
29:
367:
366:
362:
361:
360:
358:
357:
356:
317:
316:
303:
298:
297:
290:
272:
268:
258:
256:
245:
241:
226:
219:
214:
193:
182:and utilized a
153:
141:
100:
52:, Shell scripts
28:
17:
12:
11:
5:
365:
355:
354:
349:
344:
339:
334:
329:
315:
314:
309:
302:
301:External links
299:
296:
295:
288:
266:
239:
216:
215:
213:
210:
192:
189:
152:
149:
140:
137:
114:
113:
98:
94:
93:
90:
84:
83:
80:
76:
75:
72:
66:
65:
60:
54:
53:
47:
43:
42:
39:
15:
9:
6:
4:
3:
2:
364:
353:
352:1995 software
350:
348:
345:
343:
340:
338:
335:
333:
330:
328:
325:
324:
322:
313:
310:
308:
305:
304:
291:
285:
280:
279:
270:
254:
250:
243:
235:
231:
224:
222:
217:
209:
207:
203:
199:
188:
185:
181:
176:
172:
170:
166:
162:
161:Wietse Venema
158:
148:
146:
136:
134:
130:
129:
124:
120:
111:
99:
95:
91:
89:
85:
81:
77:
73:
71:
67:
64:
61:
59:
55:
51:
48:
44:
40:
38:
34:
26:
22:
277:
269:
257:. Retrieved
252:
242:
233:
194:
177:
173:
154:
144:
142:
126:
122:
118:
117:
79:Available in
234:PC Magazine
184:web browser
165:Neil Gaiman
151:Description
128:PC Magazine
321:Categories
289:0201707195
212:References
157:Dan Farmer
104:.porcupine
46:Written in
167:drew the
169:artwork
97:Website
82:English
286:
259:30 May
202:Nessus
191:Status
145:repent
139:Naming
108:/satan
206:SAINT
123:SATAN
31:SATAN
21:Satan
284:ISBN
261:2014
198:nmap
180:Perl
159:and
106:.org
88:Type
70:Size
63:Unix
50:Perl
102:www
323::
251:.
232:.
220:^
208:.
200:,
163:.
292:.
263:.
121:(
110:/
27:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.