Presentation is loading. Please wait.

Presentation is loading. Please wait.

Module 5 – Vulnerability Identification  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.

Similar presentations


Presentation on theme: "Module 5 – Vulnerability Identification  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification."— Presentation transcript:

1 Module 5 – Vulnerability Identification  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification ○ Penetration ○ Gaining Access & Privilege Escalation ○ Enumerating Further ○ Compromise Remote Users/Sites ○ Maintaining Access ○ Cover the Tracks Heorot.net

2 Vulnerability Identification  Purpose behind Vulnerability Identification “... find flaws within the network, servers, services and other attached information resources.” Heorot.net

3 Vulnerability Identification  Identify vulnerable services using service banners  Perform vulnerability scan to search for known vulnerabilities  Perform false positive and false negative  Enumerate discovered vulnerabilities  Estimate probable impact (classify vulnerabilities found)‏  Identify attack paths and scenarios for exploitation Heorot.net

4 Identify Vulnerable Services Using Service Banners Heorot.net

5 Identify Vulnerable Services Using Service Banners Apache Demonstration

6 Perform Vulnerability Scan  *Tools: Nessus Sara Internet Scanner Retina Network Security Scanner Netrecon Core IMPACT *None of these tools are found on the BackTrack Disk Heorot.net

7 Perform Vulnerability Scan  Advantage of Vulnerability Scanners: “Click-and-Go” Basic knowledge of IT and Security Powerful Up-to-date  Disadvantage of Vulnerability Scanners: “Click-and-Go” Basic knowledge of IT and Security Heorot.net

8 Perform False Positive and False Negative “False positives refer to non-issues that were incorrectly detected. Accordingly, false negatives refer to existent issues that were not detected during an assessment. In every assessment there is always the risk of any of these being present.”

9 Enumerate Discovered Vulnerabilities  Identified Vulnerability Apache/2.0.55 (UNIX) PHP/5.1.2  Tools : Web Sites: ○ Milw0rm.org ○ Securityfocus.com ○ Cert.org ○ Packetstormsecurity.com ○ National Vunerability Database http://nvd.nist.gov/ Metasploit Vulnerability Scanners Heorot.net

10 Enumerate Discovered Vulnerabilities Apache / milw0rm Demonstration

11 Estimate Probable Impact  High Risk Vulnerability ○ “...immediate threat of high and adverse impact on the business critical processes of the target organization”  Medium Risk Vulnerability ○ “...threat of high and adverse impact to non-critical systems in terms of business. ○ “...no immediate threat nor a big impact and the vulnerability affects critical business systems.”  Low Risk Vulnerability ○...”the technical and business impact is low.” Heorot.net

12 Identify Attack Paths and Scenarios for Exploitation  Game plan on how to attack the system  List of vulnerabilities Threat Level based on Impact to business goals  Measures to mitigate vulnerabilities  Stopping point About to move away from “Blue Team” and move into “Red Team” Heorot.net

13 Hands-On Exercise Identify Live Hosts  Tools: The Internet List of Services ○ Version Information Operating System ○ Version Information  Find known Vulnerabilities Bugtraq ○ http://securityfocus.com/archive/1 National Vunerability Database ○ http://nvd.nist.gov/  Find Potential Exploits milw0rm.org (that’s a “zero”) Securityfocus.com Cert.org Packetstormsecurity.com Heorot.net

14 Module 5 – Conclusion  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification Identify vulnerable services using service banners Perform vulnerability scan Perform false positive and false negative Enumerate discovered vulnerabilities Estimate probable impact Identify attack paths and scenarios for exploitation Heorot.net


Download ppt "Module 5 – Vulnerability Identification  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification."

Similar presentations


Ads by Google