SARA evolved out of SAINT which, in turn, evolved out of SATAN. The core engine remains the same, with updated vulnerability tests and an improved user interface. In default mode, it gathers information on its primary targets via port scanning and interrogation of open ports. In exploratory mode it also analyzes the trust dependencies of its targets and scans any trusted systems for vulnerabilities. It does not require any permissions on the hosts being scanned, and one of the major concerns in using it is keeping it from wandering into inappropriate hosts. It uses an intuitive hypertext interface for both running the tests and reporting the results.
URL: http://www-arc.com/sara/sara.html
The documentation states that SARA has been run successfully on
Pros
Axes:
Static vs. Dynamic: Dynamic
Library vs. Instrumenting: Library
Testing vs. Production: Production
Opaque vs. Clear: Opaque
List vs. Heuristic: List
Conservative vs. Liberal: Either, depending on settings
Concurrent vs. Single Program: Concurrent
Alert vs. Fix: Alert with suggestions for fix
Evaluated by Homer Briggs on 8/21/2000