1.7 - Techniques Used in Security Assessments Flashcards
1
Q
Threat Hunting
A
- Attackers are always looking for the next threat
- Strategies of today won’t likely be the strategies of tomorrow
- Attackers are constantly modifying strategy
- One big problem, you can’t react until you’re getting attacked
- One goal: speed up reaction time or prevent attack
- Ex: Firewalls get stronger, so phishing gets better
2
Q
Intelligence Fusion
A
- Overwhelming amount of security data
- Too much data to properly detect, analyze, and react
- Data sources are different (server data is different from firewall different from IPS, etc)
- Also there are different personnel teams (security teams, security intelligence, threat response)
- Add external sources (threat feeds, governemental alerts, social media bulletins)
- All these internal / external sources goes into DB
- Goal: Fuse the security data together and use big data analytics to analyze and pick out correlations
3
Q
Cybersecurity maneuvers
A
- Start deploying security technology (ex: additional firewalls, intrusion prevention, deleting malicious software)
- These maneuvers are often automated, when the big data analytics spots potential threats the computer can react instantly
- Combined with Fused Intelligence
- This is an on going process
4
Q
Vulnerability Scans
A
- Designed to look at systems and see if potential vulnerabilities exist (ex: in the OS, network device, or application)
- Usually minimally invasive (unlike a penetration test)
- Common to run this on all systems that are connected to the network (ex: servers, workstations, laptops)
- Don’t dismiss insider threats, pretend you have insider access too
5
Q
Penetration Test
A
- Invasive
- Tries to gain access to your system
- Unlike a vulnerability scan
- another intrusive test is to take a known exploit and see if it can get into your system
6
Q
Port Scan
A
- Looks at what ports are responding on a particular IP address
- A type of vulnerability scan
- poke around, see what’s open
- May be able to gather information about things that are less than secure
- Ex: you might see port 23 is running a telnet service and you know that telnet service inherently sends info that is not secure (not encrypted), this is a potential vulnerability
7
Q
Scan Types
A
- Scanners are very powerful
- use many different techniques to identify vulnerabilities
- “non-invasive” but a little invasive. It’s gathering information, not trying to exploit a vulnerability. (as opposed to a penetration test)
- Never run a scan on your network where you do not have explicit permission to do so
- You must understand exactly what scan will do (there have been cases where a scan trips a bug that causes system to become unavailable)
8
Q
Non-Credentials Scan
A
- User doesn’t have login access
- Run from their perspective
9
Q
Credentialed Scan
A
- Run scan as a user who has rights, how much vulnerability exists?
10
Q
Scan Vulnerability Examples
A
- Vulnerability scanner DB needs to be constantly updated
- Can have application scans ( desktop, mobile apps)
- Can have web application scans (software on a webserver)
- Can have Network scans ( misconfigured firewalls, open ports, vulnerable devices)
11
Q
Vulnerability Research
A
- Will do a lot of reserach before and after scan
- Resources: CVE - Common Vulnerabilities and Exposures
- Resources: National Vulnerability Database - NVD
- Microsoft Security Bulletins
- Some vulnerabilities cannot be definitively tied identified by a CVE, need to do more research, but the scanner will alert you to the fact there’s an issue
12
Q
NVD
A
- National Vulnerability Database
- This is the consolidated CVE DB
- summary of all CVEs you can also find at mitre’s CVE website
- Synchronized with the CVE list from Mitre
- It also includes a CVSS (Common Vulnerability Scoring System)
- http://nvd/nist.gov
- very common resource for vulnerability scans
- Industry collaboration, if you’re building a project you’ll want to involve this DB
13
Q
CVE
A
- Common Vulnerabilities and Exposures
- https://cve.mitre.org/cve
14
Q
CVSS
A
- Common Vulnerability Scoring System
- a feature in the NVD (National Vulnerability Database)
- tells you severity threat
- Quantitative scoring of vulnerability 0 to 10
- Scoring standards change over time
- 2 Different scoring methods, one for CVSS2.0 and one for CVSS3.x (use different criteria, need the picks the one that works for you)
15
Q
Things Vulnerability Scans can expose
A
- Lack of security controls (ex: if no firewall, anti-virus, anti-spyware. Things that should be in place)
- Misconfigurations (Ex: open shares, guest access)