Vulnerability Analysis and Nessus Flashcards
What are the 4 basic steps in the vulnerability management workflow?
- Detection
- Reporting
- Remediation
- Reassessment
prioritize the found vuls. based on their severities
What type of vulnerability scan accesses configuration information from the systems it is run against as well as information that can be accessed via services available via the network?
Authenticated scans use a read-only account to access configuration files, allowing more accurate testing of vulnerabilities
What to do if vulnerability scanner continues to incorrectly flag the system as vulnerable after it was patched?
- information security team needs to flag the issue as resolved
- many vulnerability scanners rely on version or banner information and may flag patched versions if the software provider does not update the information they see
When vulnerability scanner identifies a potential problem, what is necessary to do next?
validation, to verify that the issue exists
When should be assets scanned?
routinely and after major changes
What cybersecurity roles contain work that includes aspects of Vulnerability Management
?
-
Threat Intelligence Analyst
- receiving and reporting on intelligence about newly released vulnerabilities, or vulnerabilities that are actively being exploited in the wild
- have access to commercial tools that allow them to observe exploitation activity on a global scale
-
Vulnerability Analyst
- vulnerability scanning, analyzing results, performing manual checks, reporting on security flaws, and keeping up-to-date with the latest publicly available news regarding vulnerabilities
-
Incident Responder
- knowledge about vulnerabilities, and how to deal with compromises as a result of successful exploitation is key in knowing how to respond
-
Penetration Tester / Red Teamer
- knowing how to identify and scan for vulnerabilities and security flaws is key to this role so they can be exploited
Name examples of 3 most common vulnerability scanners
- Nessus
- OpenVAS
- Nikto
What is a Nessus policy?
- sets of configuration settings that define how a vulnerability scan is conducted
- determine the scope, depth, and behavior of a vulnerability scan
What are Nessus policy templates?
predefined configurations provided by Nessus to simplify the process of setting up vulnerability scans
What do you find in the My Scans section in Nessus?
- any scans that have been conducted by the currently signed-in user
- includes completed, scheduled, pending, and failed scans
What do you find in the All Scans section in Nessus?
- any scans that have been conducted by any users within an organisation
- includes completed, scheduled, pending, and failed scans
What are Nessus plugins?
- small programs or scripts that perform specific tasks during a vulnerability scan
- each plugin is designed to check a particular aspect of a target system, such as a software application, service, or configuration, for vulnerabilities, misconfigurations, or security issues
What are Nessus scanners?
- different hosts that are able to perform enumeration
- useful if there are multiple V-LANs or physical networks that need to be scanned, and the hosts can’t communicate directly
Which company created Nessus?
Tenable