Module 05: Vulnerability Analysis Flashcards

1
Q

What are some examples of vulnerabilities?

A
  • TCP/IP protocols
  • OS
  • Network Devices
  • User account
  • System account
  • Internet service misconfiguration
  • Default password and settings
  • Network device misconfiguration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a vulnerability?

A

A vulnerability refers to the existence of weakness in an asset that can be exploited by threat agents, and compromises the CIA triad.
- Hardware of software misconfiguration, including default configurations
- Insecure of poor network or application design
- Inherent technology weaknesses, including poor code design
- Careless approach of end users

Vulnerability analysis is part of the scanning process for all intents and purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some vulnerability research websites and databases?

A
  • Packet Storm
  • Dark Reading
  • Trend Micro
  • Security Magazine
  • PenTest Magazine
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some standard references applied to catalogued and labeled vulnerabilities?

A
  • CVE
  • National Vulnerability Database (NVD)
  • Microsoft Security Response Center
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do scanning tools work?

A

Scanning tools automatically identifies the live systems, open ports, OS’s - similar discovery as nmap - and runs plugins that are configured to probe for specific vulnerabilities, examining the system or application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CVSS

A

Common Vulnerability Scoring System, rates how bad a vulnerability is on a scale of 1-10

Low, medium, high, critical.

Also whether locally or remotely exploitable. Source based on NIST.gov

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CVE

A

Common Vulnerabilities and Exposures

Maintained by MITRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NVD

A

National Vulnerability Database

Maintained by NIST, includes reference IDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CWE

A

Common Weakness Enumeration, also maintained by MITRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ExploitDB

A

proof of concept exploit tool, gives proof of concept code to prove something is exploitable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vulnerability Management Lifecycle

A

Pre-Assessement Phase: Identify assests and create a baseline (cataloging - software versions, protocol versions etc)

Vulnerability Assessment Phase: Vulnerability Scan

Post-Assessment Phase: what do you do with what you discover

  • Risk Assessment
  • Remediation
  • Verification - when you fix the issue, re-scan and make sure it’s been remediated.
  • Monitoring
    It’s an ongoing process - it never ends! The higher base score vulnerabilities need to be patched first.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Active vs Passive assessments

A

Active - if you don’t care about getting detected, crashing servers etc - use a network scanner to find hosts, services, and vulnerabilities. Can do a more aggressive scan but be more cautious in more sensitive environments (ie SCADA).

Passive - just sniffing network traffic to discover present active systems, network services, applications and vulnerabilities present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some other types of assessments?

A

External vs. Internal

Host-based vs. Network-based assessment

Application assessment (web apps) - more of a specialized scanner like Web Inspection, Accunetics.

Database assessment

Wireless network

Distributed assessment - looking at communications between endpoints

Credentialed vs. non-credentialed assessment (credentialed = white box)

Manual vs. automated assessment - utilities like Nessus or OpenVAS
→ can still use Nessus for non-professional purposes (16 IPs for free)

OpenVAS = free open source solution, run with Greenbone Security Assistant

Nikto = web server assessment tool that examines web servers for problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does a vulnerability assessment report contain?

A

A Vulnerability Assessment report discloses the risks detected after scanning a network, and alerts the organization of possible attacks and suggest countermeasures. Provide information to fix security flaws. Come back and re-test after a month or so.

Components: exec summary, assessment overview, findings, risk assessment, recommendations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A