Network Security v1.0 - Module 22
Network Security v1.0 - Module 22
Security Testing
Module Objective: Describe the various techniques and tools for network security.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
22.1 Network Security Testing
Techniques
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Network Security Testing Techniques
Operations Security
Operations security starts with the planning and implementation process of a network. During
these phases, the operations team analyzes designs, identifies risks and vulnerabilities, and
makes the necessary adaptations. The actual operational tasks begin after the network is set up
and include the continual maintenance of the environment.
Some security testing techniques are predominantly manual, and others are highly automated.
Regardless of the type of testing, the staff that sets up and conducts the security testing should
have significant security and networking knowledge in these areas:
• Device hardening
• Firewalls
• IPSs
• Operating systems
• Basic programming
• Networking protocols, such as TCP/IP
• Network vulnerabilities and risk mitigation
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Network Security Testing Techniques
Testing and Evaluating Network Security
During the implementation stage, security testing is conducted on specific parts of the network.
After a network is fully integrated and operational, a Security Test and Evaluation (ST&E) is
performed. An ST&E is an examination of the protective measures that are placed on an
operational network.
Tests should be repeated periodically and whenever a change is made to the system.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Network Security Testing Techniques
Types of Network Tests
After a network is operational, ascertain its security status. Many security tests can be conducted to assess
the operational status of the network:
• Penetration testing - Simulate attacks to determine the feasibility of an attack and possible
consequences if one were to occur.
• Network scanning - Includes software that can ping computers, scan for listening TCP ports and
display which types of resources are available on the network.
• Password cracking - Tests and detects weak passwords that should be changed.
•
• Log review - Filter and review security logs to detect abnormal activity.
• Virus detection - Detects and removes computer viruses and other malware.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Network Security Testing Techniques
Applying Network Test Results
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
22.2 Network Security Testing
Tools
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Network Security Testing Tools
Network Testing Tools
There are many tools available to test the security of systems and networks. Some of these tools are open
source while others are commercial tools that require licensing. Various software tools can be used to perform
network testing including:
• Nmap/Zenmap - This discovers computers and services on a computer network, thus creating a map
of the network.
• SuperScan - Designed to detect open TCP and UDP ports, determine what services are running on
those ports, and to run queries, such as whois, ping, traceroute, and hostname lookups.
• SIEM (Security Information Event Management) - Used in enterprise organizations to provide real
time reporting and long-term analysis of security events.
• GFI LANguard - This is a network and security scanner which detects vulnerabilities.
• Tripwire - Assesses and validates IT configurations.
• Nessus - Vulnerability scanning software, focusing on remote access, misconfigurations, and DoS
against the TCP/IP stack.
• L0phtCrack - Password auditing and recovery application.
• Metasploit - Provides information about vulnerabilities and aids in penetration testing and IDS
signature development.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Network Security Testing Tools
Nmap and Zenmap
Nmap is a commonly used, low-level scanner that is available to the public. It has an array of
excellent features which can be used for network mapping and reconnaissance.
The basic functionality of Nmap allows the user to accomplish several tasks, as follows:
• Classic TCP and UDP port scanning -This searches for different services on one host.
• Classic TCP and UDP port sweeping - This searches for the same service on multiple
hosts.
• Stealth TCP and UDP port scans and sweeps - This is similar to classic scans and
sweeps, but harder to detect by the target host or IPS.
• Remote operating system identification - This is also known as OS fingerprinting.
Advanced features of Nmap include protocol scanning, known as Layer 3 port scanning.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Network Security Testing Tools
SuperScan
SuperScan is a Microsoft Windows port scanning tool. It runs on most versions of Windows and
requires administrator privileges. SuperScan version 4 has a number of useful features:
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Network Security Testing Summary
What Did I Learn in this Module?
• Operations security starts with the planning and implementation process of a network.
• The staff that sets up and conducts the security testing should have significant security and networking
knowledge in these areas: device hardening, firewalls, IPSs, operating systems, basic programming,
networking protocols, such as TCP/IP, and network vulnerabilities and risk mitigation.
• Many security tests can be conducted to assess the operational status of the network and include:
penetration testing, network scanning, vulnerability scanning, password cracking, log review, integrity
checkers, and virus detection.
• There are many tools available to test the security of systems and networks including: Nmap/Zenmap,
SuperScan, SIEM, GFI LANguard, Tripwire, Nessus, L0phtCrack, and Metasploit.
• Nmap and Zenmap (its graphical frontend) are commonly used and free low-level scanners. SuperScan is
also a free Microsoft Windows port scanning tool.
• Security Information Event Management (SIEM) is a technology used in enterprise organizations to provide
real time reporting and long-term analysis of security events. SIEMs provide correlation, aggregation,
forensic analysis, and retention.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Network Security Testing Summary
New Terms and Commands
• Security Test and Evaluation (ST&E)
• Penetration testing
• Network scanning
• Log review
• Integrity checkers
• Virus detection
• Nmap/Zenmap
• SuperScan
• SIEM (Security Information Event Management)
• GFI LANguard
• Tripwire
• Nessus
• L0phtCrack
• Metasploit
• Forensic analysis
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15