Key Terms Active assessment Passive assessment Internal assessment
TESTOUT CYBERDEFENSE PRO
Key Definitions Active assessment: A network evaluation that is obtained by actively testing the network for weaknesses. Passive assessment: A network evaluation that is obtained by looking for weaknesses through observation with no direct network interaction. Internal assessment: A network evaluation that is obtained by testing and analyzing processes and systems inside the network.
TESTOUT CYBERDEFENSE PRO
Vulnerability Assessment
ESTOUT CYBERDEFENSE PRO
Vulnerability Assessment Expected data Active vs passive scanning Scanning limitations Assessment types Vulnerability research Identify weaknesses Plan security measures
TESTOUT CYBERDEFENSE PRO
Expected Results Open ports App vulnerabilities Configuration errors Weak passwords
TESTOUT CYBERDEFENSE PRO
Vulnerability Assessment
TESTOUT CYBERDEFENSE PRO
Vulnerability Assessment
TESTOUT CYBERDEFENSE PRO
Vulnerability Assessment
TESTOUT CYBERDEFENSE PRO
Passive Assessment Operating system Current users
TESTOUT CYBERDEFENSE PRO
External Assessment Network maps exist External service devices Web applications Rule set for routers Rule set for firewalls External open ports DNS zones
TESTOUT CYBERDEFENSE PRO
Internal Assessment Physical security Internal open ports Viruses and malware Remote management Internal flaws and patches
TESTOUT CYBERDEFENSE PRO
Host-Based Assessment Malicious users Uneducated users Vendors Administrators Databases Firewalls Files Web servers Configuration errors TESTOUT CYBERDEFENSE PRO Application Assessment Input controls Data processing
Operating System Flaws Viruses Trojan horses Worms through script Undesirable software or code
TESTOUT CYBERDEFENSE PRO
Application Flaws Validation Authorization
TESTOUT CYBERDEFENSE PRO
Vulnerability Assessment
TESTOUT CYBERDEFENSE PRO
Open Services Unsecure ports Open ports Unnecessary ports
TESTOUT CYBERDEFENSE PRO
Summary Expected data Active and passive scanning Scanning limitations Assessment types Vulnerability research
TESTOUT CYBERDEFENSE PRO
Class Discussion What are the top nine areas to research when conducting an assessment? What are seven types of assessments? What are the limitations of scans? Why is vulnerability assessment important?
Key Definitions Vulnerability assessment: A phase of testing the network for vulnerabilities. Risk assessment: A phase of evaluating the found vulnerabilities for threat level. Remediation: A phase of patching, hardening, and correcting weaknesses. Verification: A phase of retesting the system to verify that patching and hardening was effective. Monitoring: A phase where continuous monitoring of systems is implemented.
TESTOUT CYBERDEFENSE PRO
Vulnerability Management Life Cycle
ESTOUT CYBERDEFENSE PRO
Vulnerability Management Life Cycle
TESTOUT CYBERDEFENSE PRO
Vulnerability Management Life Cycle
TESTOUT CYBERDEFENSE PRO
Vulnerability Management Life Cycle
TESTOUT CYBERDEFENSE PRO
Vulnerability Management Life Cycle
TESTOUT CYBERDEFENSE PRO
Vulnerability Management Life Cycle
TESTOUT CYBERDEFENSE PRO
Vulnerability Management Life Cycle
TESTOUT CYBERDEFENSE PRO
Vulnerability Management Life Cycle
TESTOUT CYBERDEFENSE PRO
Vulnerability Management Life Cycle
TESTOUT CYBERDEFENSE PRO
Vulnerability Assessment Best times to test Best tools to use
TESTOUT CYBERDEFENSE PRO
Vulnerability Management Life Cycle
TESTOUT CYBERDEFENSE PRO
PIan of Action Control weaknesses Protect information Harden systems
Class Discussion Why is it important to create a baseline before testing begins? How important is the vulnerability assessment phase to the rest of the cycle? Why should you take the time to evaluate the threat levels of the results of your assessment? Which phase includes fixing weaknesses that are found? Why would you retest the system after remediation? Why is ongoing monitoring a valuable practice?
TESTOUT CYBERDEFENSE PRO
7.3 VULNERABILITY MANAGEMENT
Vulnerability Scoring Systems
TESTOUT CYBERDEFENSE PRO
Key Terms Common Vulnerability Scoring System (CVSS) CVSS calculator Cybersecurity and Infrastructure Security Agency (CISA) National Vulnerability Database (NVD) Full Disclosure
TESTOUT CYBERDEFENSE PRO
Key Definitions Common Vulnerability Scoring System (CVSS): A system that categorizes vulnerabilities by threat level. CVSS calculator: A calculator for determining risk level of vulnerabilities based on base, temporal, and environmental metrics. Cybersecurity and Infrastructure Security Agency (CISA): A large government-sponsored organization that provides many resources for cybersecurity. National Vulnerability Database (NVD): A government-sponsored, detailed database of known vulnerabilities.
TESTOUT CYBERDEFENSE PRO
Key Definitions Full Disclosure: A public, vendor-neutral forum for the discussion of vulnerabilities and threats that often has the newest information. It also has tools, papers, news, and events related to vulnerabilities and threats.
TESTOUT CYBERDEFENSE PRO
Vulnerability Scoring Systems
ESTOUT CYBERDEFENSE PRO
Vulnerability Scoring Systems
TESTOUT CYBERDEFENSE PRO
Vulnerability Scoring Systems
TESTOUT CYBERDEFENSE PRO
CVSS Calculator Metrics Base: unique traits Temporal: changeable traits Environmental: only present in certain environments
TESTOUT CYBERDEFENSE PRO
Common Vulnerabilities and Exposures Standardized identifiers cve.mitre.org Evaluation baseline Standardization Assessment tools
TESTOUT CYBERDEFENSE PRO
National Vulnerability Database nvd.nist.gov More specific than CVE Searchable
TESTOUT CYBERDEFENSE PRO
Cybersecurity and Infrastructure Security Agency us-cert.gov Information exchange Training and exercises Risk assessments Data synthesis/analysis Operational planning Watch operations Incident response
TESTOUT CYBERDEFENSE PRO
Common Weakness Enumeration cwe.mitre.org Community-developed Common descriptions Standardized assessment
TESTOUT CYBERDEFENSE PRO
Common Attack Pattern Enumeration and Classification capec.mitre.org Dictionary of patterns Multiple search criteria
TESTOUT CYBERDEFENSE PRO
Japanese Vulnerability Notes Affected products Possible impacts Solutions Vendor statements Reference documents
TESTOUT CYBERDEFENSE PRO
Full Disclosure (Nmap) Newest vulnerabilities Vendor-neutral forum Events of interest seclists.org/fulldisclosure
TESTOUT CYBERDEFENSE PRO
Summary CISA NVD CVE CWE CAPEC JPCERT OR JVN Full Disclosure
TESTOUT CYBERDEFENSE PRO
Class Discussion Why is it helpful to use tools based on known vulnerability databases? What are five helpful government-sponsored resources? What is the value of a CVSS score to an ethical hacker? What are the three metrics used to determine a CVSS score?
TESTOUT CYBERDEFENSE PRO
7.4 VULNERABILITY MANAGEMENT
Vulnerability Analysis
TESTOUT CYBERDEFENSE PRO
Section Skill Overview Scan for vulnerabilities on a Windows workstation Scan for vulnerabilities on a Linux server Scan for vulnerabilities on a domain controller Scan for vulnerabilities on a security appliance Scan for vulnerabilities on a WAP
Key Definitions Vulnerability assessment tool: A service or program that tests systems and devices for weaknesses that could be exploited. Open source tool: A tool that is free to use and can be modified and shared. Vulnerability report: A report generated by a vulnerability assessment tool that gives information such as weak passwords, open ports, and lack of encryption. It also provides suggestions for remediation. Remediation: The actions taken to patch, repair, fix, or harden weaknesses in a network.
TESTOUT CYBERDEFENSE PRO
Vulnerability Assessment Tools
ESTOUT CYBERDEFENSE PRO
Qualys Vulnerability Management Cloud-based Good for large enterprises Data is always encrypted Only scanners in network
TESTOUT CYBERDEFENSE PRO
Nessus Professional Resides on network Smaller organizations Comprehensive scanning Reporting Remediation Continuous monitoring
Summary Network assessment tools Mobile assessment tools Assessment reports
TESTOUT CYBERDEFENSE PRO
Vulnerability Scan Analysis
ESTOUT CYBERDEFENSE PRO
Web App Scanners Web crawling Link discovery Data analysis
TESTOUT CYBERDEFENSE PRO
Vulnerability Scan Analysis
TESTOUT CYBERDEFENSE PRO
Vulnerability Scan Analysis
TESTOUT CYBERDEFENSE PRO
Vulnerability Scan Analysis
TESTOUT CYBERDEFENSE PRO
Vulnerability Scan Analysis
TESTOUT CYBERDEFENSE PRO
Vulnerability Scan Analysis
TESTOUT CYBERDEFENSE PRO
Infrastructure Vulnerability Scanners Networks Internal systems Applications
TESTOUT CYBERDEFENSE PRO
Vulnerability Scan Analysis
TESTOUT CYBERDEFENSE PRO
Vulnerability Scan Analysis
TESTOUT CYBERDEFENSE PRO
Vulnerability Scan Analysis
TESTOUT CYBERDEFENSE PRO
Summary Vulnerability scanners Web scanners Infrastructure vulnerability scanners
TESTOUT CYBERDEFENSE PRO
In-Class Practice Do the following labs: 7.4.7 Scan for Vulnerabilities on a Windows Workstation 7.4.8 Scan for Vulnerabilities on a Linux Server
TESTOUT CYBERDEFENSE PRO
Class Discussion Why is it important to be familiar with assessment tools? What are the top assessment tools for networks and mobile devices? Why is it important to include mobile devices in your assessment testing? What information can you expect from vulnerability reports?