Security: Vulnerability Scanning Concepts - Paiet/Tech-Journal-for-Everything GitHub Wiki
-
- Vulnerability scanners give the ability to identify a variety of systems across the network including:
- Laptops
- Desktops
- Client and Servers
- Client-side vulnerabilties
- Server-side vulnerabilities
- Passively test security controls
- Can be performed by PVSs or Passive Vulnerabilty Scanner
- Passive scan does not locate wireless SSIDs that have be hidden
- Active scan emit probes to the APs to locate them
- Identify vulnerabilities
- Classify
- Low Importance
- Medium Importance
- High Importance
- Types
- SMB Detection
- DCE Enumeration Detection
- OS Identification
- Open Ports
- Open Systems
- Classify
- Identify lack of security controls
- Types(Lack of)
- Physical Controls
- Locks
- Fences
- Man-traps
- Access Controls
- Data
- Programs
- Systems
- Equipment
- Physical Controls
- Potential Outcome
- Intercepting Data
- Accessing a remote host to steal, modifying data
- Impersonation of a user/employee/contractor
- Inserting communications
- replaying communications
- Types(Lack of)
- Identify common misconfigurations
- Password Management
- Weak passwords
- Password reuse
- Password Sharing
- Shared Accounts
- Unecessary Services
- Disablng Firewall
- Use Windows Server 2016 with MBSA
- Use scan results talking about best practices
- Password Management
- Intrusive vs. non-intrusive
- Intrusive
- Remember that not all companies can afford downtime while a thorough vulernability scan is performed
- Intrusive scans could introduce the possibility of downtime
- destructive security auditing or intrusive scanning can yield more accurate results as the intent is to use the exact same methods an attack would use
- Intrus
- Non-intrusive
- This technique usually employs simple scans such aa file systems, missing updates
- Intrusive
- Credentialed vs. non-credentialed
- Credentialed scans can give acccess to more information
- Non-credentialed scans give limited information
- False positive
- False negative = Incorrectly identified
- Malicious traffic identified as legitimate
- False positive = Incorrectly identified
- Legitimate traffic identified as malicious
- An IDS/IPS learning process will start with a lot of false positives intially then over time will be reduced as the process continues
- True negative = Correctly identified
- True positive = Correctly identified
- False negative = Incorrectly identified
- Vulnerability scanners give the ability to identify a variety of systems across the network including:
-
False = Incorrect
-
True = Correct
-
Positive = Malicious
-
Negative = Non-malicious
-
False Positive = Incorrectly identified as malicious
-
False Negative = Incorrectly identified as non-malicious
-
True Positive = Correctly identified as malicious
-
True Negative = Correctly identified as non-malicious