Vulnerability Analysis Flashcards
What does the term vulnerability assessment mean?
Vulnerability assessment plays a major role in providing security to any organizations resources and infrastructure from various interanl and exteral threats.
What are the different vulnerability scoring systme and databases?
Base
Threat
Environmental
Supplemental
What does Base Metric CVSS tell you?
Represents the intrinsic characteristics of a vulnerability that are constant over time and across user enviornments.
What does Threat Metric CVSS tell you?
Reflects the characteristics of a vulnerability that are relevant and unique to a particular consumers environment.
What does Environmental Metric CVSS tell you?
REpresents the characteristics of a vulnerability that are relevant and unique to a particular consumers environment.
What does Supplemental Metric CVSS tel you?
Includes metrics that provide context as well as describe and measure additional extrinsic attributes of a vulnerability.
What are the 6 vulnerability assessment tools?
Host-Based Vulnerability assessment tools
Depth assessment tools
Application Layer vulnerability assessment tools
Scope assessment tools
Active and passive tools
Location and Data examination tools
What are Host-Based Vulnerablility assessment tools features?
These host-based scanners can detect high levels of vulnerabilities and probide required infromation about the fixes.
What are Depth assessment tools features?
Depth assessment tools are used to discover and identify previously unknown vulnerabilities ina system. Tools such as fuzzers which provide arbitrary input to a systems interface are used to identify vulnerabilites to an unstable depth.
What are application-layer vulnerability assessment tools features.
OBserving system vulnerabilities through the internet using an exterior router, firewall or webserver. These vulnerabilities could be externals DDOS threats, network data interception or other issues.
What are Scope assessment tools features?
They provide standatd controls and a reporting interface that allows the user to select a suitable scan.
What are the Active and passive tools features?
Active scanners perform vulnerability checks on the network functions. The administrator has control over the timing and the parameters of the scans.
Passive scanners only ovserve system data and perform data processing on a separate analysis machine. Does not use lots of resources.
What are the Location and Data examination tools Features?
Network based scaners
Agent-based scanner
proxy scanner
cluster scanner
What are the key points for a vulnerability assessment report?
Vulnerability name
Mapped CVE ID
Date of discovery
The CVE score
Detailed description of the vulnerability
Impact of the vulnerability
Details regarding the affected systems
Details regarding the process needed to correct the vulnerability, including information patches, onfiguration fixes and ports to be blocked
A proof of concept of the bulnerability for the system.
Vulnerability classifcation:
Misconfigurations/Weak configurations:
Network Misconfigurations:
Insecure Protocols, Open ports and services, erros, weak encryption.
Host Misconfirguations:
Open permissions, unsecured root accounts
Aplication Flaws:
Buffer over flows
Memory Leaks
Resource Exhaustion
Integer Overflows
Null Pointer/Object Dereference
DLL Injection
Race Conditions:
Time of Check/Time of Use
Improper Input Handling
Improper Error Handling
Code Signing Weakness
Poor patch management