Domain 6 - Security Assessment Flashcards
Three components of a security testing program
- Security tests: such as automated scans, and tool assisted penetrtion testing
- Security assessments:
- Security audits:
Categories of vulnerability scans
- Network discovery scans
network discovery scanning
Nmap
Network vulnerability
Nessus, Qualys
Web Vulnerability
Nessus, Wapti
Database vulnerability scanning
SQLMap
Vulnerability Management Workflow
- Detection: initial identification
- Validation: admins confirm a detected vulnerability is not a false positive
- Remediation: such as applying a vendor supplied security patch.
Penetration Test Process
- Planning: includes scoping the engagment, and defining the rules of the engagement
- Information gathering and discovery: Uses manual and automated tools to collect information about the targeted environment. This includes basic reconnaissance to determine system function, conduct network discovery tests.
- Vulnerability scanning: perform vulnerability scan
- Exploitation: Look to defeat security
- Reporitng: Summarise results of the test and make recommendations for improvements to system security
White box testing
Bypasses many of the reconnaissance steps
Grey box testing
Commonly used when black box results are desired but costs or time constraints mean that ome knowledge is needed to complete the testing
Black box testing
Does not provide attackers with any information prior to attack, other than publically available information.
Fuzz Testing
Provides many different types of input to stress test and find previously undetected flaws. Supplies invalid input,
Mutation (dumb) Fuzzing
Takes previous input values and mutates it to create fuzzed input. Such as alter the characters
Generational (smart) fuzzing
Develops data models, and creates new fuzzed input based on an understanding of the types of data used by the programs
Limitations of fuzz testing
Does test full code, and limited to detecting simple vulnerabilities