1.7 Vulnerability Scans Flashcards
What do you need to remember about credentialed vs non-credentialed vulnerability scans?
Credentialed means the scanner has authenticated to the to the device. Any un-credentialed scan would only be able to gain information available without authentication, meaning they cant see internal details.
What does a credentialed scan emulate?
An attack from an insider
What is a vulnerability scanning tool that we need to know for Security+?
Nessus
Nmap for network discovery of networks, services, OS info, ports.
How does the vulnerability scanner detect issues?
Signature based detection. It will also detect a lack of security controls such as no firewall, antivirus, guest accounts, open files, outdated software.
It will also point out vulnerabilities for informational purposes
What types of scan do vulnerability scanners provide?
Applications, Web Apps, Network Scans (misconfigured firewalls, open ports, vulnerable devices)
Note for test
Vulnerabilities can be cross referenced online, and some can not be definitively identified so you will need to investigate yourself by testing the issue.
You can always do audits/configuration reviews without a vulnerability scanner.
What are possible actions to take if you get false positives or false negatives?
Make sure your scanner is up to date, or work with the vulnerability detection manufacturer to make sure they are aware of something they don’t know.