1.5 Explain vulnerability scanning concepts. Flashcards

1
Q

Vulnerability scanning

A

Usually minimally invasive, unlike a penetration test
• Port scan - Poke around and see what’s open
• Identify systems and security devices
• Test from the outside and inside
• Don’t dismiss insider threats
• Gather as much information as possible
• We’ll separate wheat from chaff later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Scan types

A

Scanners are very powerful
• Use many different techniques
to identify vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

• Non-intrusive scans

A

Gather information, don’t try to

exploit a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

• Intrusive scans

A

• You’ll try out the vulnerability to see if it works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

• Non-credentialed scans

A

• The scanner can’t login to the remote device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

• Credentialed scan

A

• You’re a normal user,

emulates an insider attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identify vulnerability

A

The scanner looks for everything
• Well, not everything
• The signatures are the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vulnerability scan results

A

Lack of security controls
• No firewall, no anti-virus, no anti-spyware
• Misconfigurations - Open shares, guest access
• Real vulnerabilities
• Especially newer ones, occasionally the old ones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dealing with false positives

A

A vulnerability is identified that

doesn’t really exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

False negatives

A

A vulnerability exists, but you didn’t detect it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

• Update to the latest signatures

A

If you don’t know about it, you can’t see it
• Work with the vulnerability
detection manufacturer
• They may need to update their signatures
for your environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly