1. Trang chủ
  2. » Tất cả

LPTv4 module 17 vulnerability analysis

61 279 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 61
Dung lượng 2,07 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Before starting a penetration test, you must identify vulnerabilities against network systems using vulnerability scannerg y g b y Produce and analyze the vulnerability assessment report

Trang 1

/ ECSA/ LPT

Vuln erability An alysis y y

Trang 2

Penetration Testing Roadmap

Penetration Testing

Internal Network

Penetration Testing

IDS

Penetration Testing

Wireless Network

Penetration Testing

Denial of Service

Penetration Testing

Password Cracking

Stolen Laptop, PDAs and Cell Phones

Social Engineering Application

Cont’d

Penetration Testing Penetration Testing Penetration Testing

Penetration Testing

Trang 3

Penetration Testing Roadmap

Penetration Testing

Log Management

Penetration Testing

File Integrity Checking

Blue Tooth and Hand held Device

Penetration Testing

Telecommunication And Broadband Communication

Email Security

Penetration Testing

Security Patches

Penetration Testing

Trang 4

Why Assess?

Before starting a penetration test, you must identify vulnerabilities

against network systems using vulnerability scannerg y g b y

Produce and analyze the vulnerability assessment report

Identify areas where penetration is possible

Locate hacking tools

Attempt to penetrate

Trang 5

Vulnerability Classification

Misconfigurations Default installations Buffer Overflows Unpatched servers Default passwords Open services

Application flaws Operating systems flaws Design flaws

Trang 6

What is Vulnerability Assessment?

Vulnerability assessment is an examination of the ability of a system or

application, including current security procedures and controls, to

withstand assault

A vulnerability assessment may be used to:

• Identify weaknesses that could be exploited

• Predict the effectiveness of additional security measures in

A vulnerability assessment may be used to:

y protecting information resources from attack.

Trang 7

Types of Vulnerability Assessment

An Active Assessment scans the network using any network scanner

to find hosts, services, and vulnerabilities

A Passive Assessment is a technique that sniffs the network traffic to

find out active systems, network services, applications, andvulnerabilities present

A Host-based Assessment is a sort of security check that carries out

a configuration level test through command line

An Internal Assessment is a technique to scan the internal

infrastructure to find out the exploits and vulnerabilities.p

Trang 8

Types of Vulnerability Assessment (cont’d)

An External Assessment assesses the network from a hacker's point

of view to find out what exploits and vulnerabilities are accessible to theoutside world

Application Assessments tests the web server infrastructure for any

misconfiguration, outdated content, and known vulnerabilities

Network Assessments determine the possible network security

attacks that may occur on the organizations system

Wireless Network Assessments determine and track all the wireless

networks prevalent at the client’s site

Trang 9

How to Conduct a Vulnerability

Assessment

Use vulnerability assessment tools

Check for misconfigured web servers, mail servers, firewalls, etc

Search the web for posting about the company’s vulnerability:

• Example: A hacker would post something like “I could not believe the XSECURITY’s website had serious SQL injection flaws! Oh my God!”

Search at underground websites for more postings about the company’svulnerabilities

Hackers frequently exchange attack information with one another

Trang 10

How to Obtain a High Quality

Vulnerability Assessment

Select the adviser carefully:

• Check if he/she has good experience with various applications and operating systems

• Check if he/she has good understanding of the core protocol / g g p

• Check if he/she has an idea of the detection techniques

• Check if he/she has good communication skills and has the ability

to offer proper mitigation recommendation

Define the scope of the vulnerability assessment

Define the rules that will manage the assessment

Classify the vulnerabilities that need instant notification

Trang 11

Vulnerability Assessment Phases

Trang 12

Pre-Assessment Phase

Describes the scope of the assessment

Creates proper information protection procedures such as effective

planning, scheduling, coordination, and logistics

Identifies and ranks the critical assets

Trang 13

• Evaluates the threat environment

• Allows penetration testing

• Examines and evaluates physical security

• Performs a physical asset analysis

• Observes policies and procedures

• Conducts an impact analysis

• Performs a risk characterization

Trang 14

Post-Assessment Phase

The post-assessment phase involves:

• Prioritizing assessment recommendations

• Providing action plan development to implement the

Trang 15

Vulnerability Analysis Stages

Vulnerability analysis refers to identifying areas where vulnerability

i t

exists

Perform vulnerability analysis and list the areas that needs testing and

t tipenetration

Vulnerability penetration capabilities can be

• Locating nodes

• Performing service discoveries on them

broken down into three steps:

• Performing service discoveries on them

• Testing those services for known security holes

Trang 16

Comparing Approaches to Vulnerability Assessment

Product-based versus service-based assessments solution

They are installed in the organization’s

internal network

They are offered by third party, such

as auditing firms or security consultant firms

They are installed in private or non

routable, or Internet addressable

portion of an organization’s network

Some of the solutions are hosted inside the network and others are hosted outside the network

If it is installed in the private network

or in other words, behind the firewall,

it cannot always detect outside attacks

Trang 17

Comparing Approaches to Vulnerability Assessment (cont’d)

Tree-based versus inference-based assessment

Tree-based assessment Inference-based assessment

In a tree-based assessment, administrator

selects the tree appropriate for each

machine

In an inference-based assessment, scanning starts by building an inventory of protocol found on the machine.

For example, administrator selects trees

for server running window, databases,

and web services.

After finding protocol, scanning process starts to detect which ports are attached to the service such as an email server, web, or database server.

This approach relies on the administrator

to provide starting shot of intelligence and

then to start scanning continuously

without incorporating any information

After finding services, it selects vulnerabilities on each machine and starts

to execute only those relevant tests.

without incorporating any information

found at the time of scanning.

Trang 18

Characteristics of a Good Vulnerability Assessment Solution

Ensures correct outcomes by testing network, network resources, ports,

protocols and operating systems

Uses well-organized inference-based approach for testing

Automatic scan against continuously updated database

Creates brief, actionable, customizable reports, including report of

vulnerabilities by severity level and trend analysis

Supports various networks

Gives tested remedies and workarounds to correct vulnerabilities

Trang 19

Vulnerability Assessment

Considerations

What parts of the organization will be included?

How much (if not all) of the network will be reviewed?

How many people will be consulted?

How many people will be working on the project?

Trang 20

Vulnerability Assessment Reports

Trang 21

Vulnerability Report Model

Target Information

Results

Scanner Node

Target Information

Summary Target

Vulnerability

Vulnerability Node

OS Date

y Information Classification

Name URL

Date

Security

Trang 22

A typical vulnerability assessment can take as long as 12 weeks

A typical vulnerability assessment can take as long as 12 weeks.

Trang 23

Penetration Attempts

Analyze Vulnerability Assessment Report

Start

Vulnerability assessment

Penetration Attempts

Identify areas

Of vulnerability assessment

Locate Hacking tools

Trang 24

Types of Vulnerability

Assessment Tools

Host-based vulnerability assessment tools:

• A host-based vulnerability assessment tool finds and identifies the OS running on a particular host computer and tests it for known deficiencies

• Searches for common applications and services Searches for common applications and services

Application-layer vulnerability assessment tools:

• Application-layer vulnerability assessment tools are directed toward web servers or databases

Trang 25

Types of Vulnerability Assessment Tools (cont’d)

Scope assessment tools:

• They provide security to the IT system by testing for vulnerabilities in the applications and OS

Depth assessment tools:

• These tools find and identifies previously unknown vulnerabilities in a system

• Such types of tools include ‘fuzzers’

Trang 26

Types of Vulnerability Assessment

Tools (cont’d)

Active/passive tools:

• Active scanners perform vulnerability checks on the network that consumes resources on the network

Passive scanners though does not affect system resources

• Passive scanners though, does not affect system resources considerably, they only observe system data and performs data processing on a separate analysis machine

• Network based scanner

Location/data examined tools:

Trang 27

Choosing a Vulnerability

Assessment Tool

Vulnerability assessment tools are used to test a host or application for vulnerabilities While choosing these tools, they should satisfy the following requirements:

• Test from dozens to 30,000 different vulnerabilities, depending on the product

• Contain several hundred different attack signatures

• Match with your environment and expertise

• Have accurate network, application mapping and penetration tests

• Number of vulnerability scripts the tools have for the platforms you're scanning and how often they're updated

• Generate reports

• Check different levels of penetration to prevent lockups

Trang 28

Choosing a Vulnerability Assessment Tool (cont’d) Assessment Tool (cont d)

Types of vulnerabilities being assessed

Testing the capability of scanning

Ability to provide accurate reports

Efficient and accurate scanning

Capability to perform smart search

Functionality for writing own tests

Test run scheduling

Trang 29

Vulnerability Assessment Tools

collect before starting

Decide source location of the scan, based on the what information you

want to collect

Enable the loggings everytime you scan on every computer

Users should scan their systems frequently for vulnerabilities

Users should scan their systems frequently for vulnerabilities

Trang 30

Vulnerability Assessment Tools

Qualys Vulnerability Scanner

Cycorp CycSecure Scanner

eEye Retina Network Security Scanner

Foundstone Professional Scanner

GFI LANguard Network Security Scanner

ISS Internet Scanner

SAINT Vulnerability Scanner

Symantec NetRecon Scanner

Shadow Security Scanner

Open Source Nessus

Microsoft Baseline Security Analyzer(MBSA)

SPIKE Proxy

Foundstone’s ScanLine

Trang 31

Qualys Vulnerability Scanner:

Screenshot

Trang 32

Cycorp CycSecure Scanner

Features:

• Automated network state detection

• Compound vulnerability analysis

• Identifying the most critical vulnerabilities to be corrected

• Reporting the actual sequences of actions that can compromise your network

• "What if" analysis

• Network state and compliance monitoring

• Non-invasive and continuous assessment

Trang 33

eEye Retina Network Security

Scanner

The eEye Retina Network security scanner performs an audit

scan for identified vulnerabilities and configuration related

problems.

Trang 34

Foundstone Professional Scanner

Comprehensive map of the entire network, including wireless accesspoints and load balancers

Prices for Foundstone Professional TL start at $12,000/year

Trang 35

GFI LANguard Network Security

Trang 36

ISS Internet Scanner

The Internet Scanner performs distributed or event-driven probes of

network services operating systems routers/switches servers firewallsnetwork services, operating systems, routers/switches, servers, firewalls,and application routers to identify potential risks

Trang 37

SAINT Vulnerability Scanner

SAINT screens every live system on a network for TCP and UDP services

SAINT screens every live system on a network for TCP and UDP services.

For each service it finds running, it launches a set of probes designed to detect anything that could allow an attacker to gain unauthorized access, create a denial-of-service, or gain sensitive information about the network.

Trang 38

Symantec NetRecon Scanner

Tests the entire network infrastructure for security vulnerabilities and

provides recommendations on how to fix them

Displays scan progress with a real-time graphic view, revealing the root

cause of vulnerabilities

Provides customizable management reports for a range of audiences

Scans multiple operating systems, including UNIX, Linux, Windows

2000, and NetWare.,

Trang 39

Shadow Security Scanner

Shadow Security Scanner can audit more than 2 000 vulnerabilities in

UNIX, Windows, Linux, routers, devices, etc

The report can be delivered in XML, PDF, RTF and CHM (compiled

HTML) formats

Trang 40

Shadow Database Scanner

Shadow Database Scanner scans vulnerabilities in

databases such as, Oracle, IBMDB2, MiniSql, MySQL, and

Lotus Domino

Trang 41

Open source-based

Nessus is a remote security scanner for Linux, BSD,

Solaris, and other Unices

It is plug-in based, has a GTK interface, and

performs over 1200 remote security checks

It allows for reports to be generated in HTML, XML,

LaTeX, and ASCII text, and suggests solutions for

security problems

Trang 42

Microsoft Baseline Security

Analyzer (MBSA)

MBSA is a tool designed for the IT professional which helps

small- and medium-sized businesses to determine their security

state in accordance with Microsoft security recommendations.

It detects common security misconfigurations and missing

security updates on computers

security updates on computers.

Trang 43

Microsoft Baseline Security

Analyzer: Screenshot

Trang 44

SPIKE Proxy

SPIKE Proxy is a tool to find application-level vulnerabilities in webapplications

applications

Trang 45

Foundstone’s ScanLine

ScanLine is a command-line port scanner for all Windows platforms

ScanLine is a command-line port scanner for all Windows platforms

It performs traditional ICMP "pinging" optional additional ICMP

Trang 46

Foundstone’s ScanLine:

Screenshot

Trang 47

Cerberus Internet Scanner

Cerberus Internet Scanner (CIS) is a tool that scans a remote host for many known vulnerabilities including XSS web service checks FTP SMTP POP3 NT

known vulnerabilities including XSS, web service checks, FTP, SMTP, POP3, NT, NetBIOS, and MS SQL checks.

Trang 48

Cerberus Internet Scanner:

Screenshot

Trang 49

Other Vulnerability Tools

Trang 50

Record your activities

Collect various reports generated by different vulnerability scannersp g y y

Trang 51

Vulnerability Assessment Reports

Security vulnerability report:

• This report gives the information about:

• New vulnerabilities

• Open ports and detected services

• Open ports and detected services.

• Suggestion for remediation.

• Links to patches.

• This report is produced for every server after scanning which

id d il f

Security vulnerability summary:

provides details of:

• Current security flaws.

• Resolved prior detected vulnerabilities.

Trang 52

Security Vulnerability Report

Trang 53

Security Vulnerability Summary

Trang 54

Automated Scanning Server

Reports

Standard report:

• It provides complete analysis of vulnerabilities found

• It shows summary of risks found in the scan using charts and

hgraphs

• It also gives the technical information for each vulnerabilitydetected such as short summary, impact, and solution

Trang 55

Automated Scanning Server

Reports

Ngày đăng: 14/12/2021, 21:12

TỪ KHÓA LIÊN QUAN