150 likes | 301 Views
Module 5 – Vulnerability Identification. Phase II Controls Assessment Scheduling Information Gathering Network Mapping Vulnerability Identification Penetration Gaining Access & Privilege Escalation Enumerating Further Compromise Remote Users/Sites Maintaining Access
E N D
Module 5 – Vulnerability Identification • Phase II Controls Assessment Scheduling • Information Gathering • Network Mapping • Vulnerability Identification • Penetration • Gaining Access & Privilege Escalation • Enumerating Further • Compromise Remote Users/Sites • Maintaining Access • Cover the Tracks Heorot.net
Vulnerability Identification • Purpose behind Vulnerability Identification “...find flaws within the network, servers, services and other attached information resources.” Heorot.net
Vulnerability Identification • Identify vulnerable services using service banners • Perform vulnerability scan to search for known vulnerabilities • Perform false positive and false negative • Enumerate discovered vulnerabilities • Estimate probable impact (classify vulnerabilities found) • Identify attack paths and scenarios for exploitation Heorot.net
Identify Vulnerable ServicesUsing Service Banners Heorot.net
Apache Demonstration Identify Vulnerable ServicesUsing Service Banners
Perform Vulnerability Scan • *Tools: • Nessus • Sara • Internet Scanner • Retina Network Security Scanner • Netrecon • Core IMPACT *None of these tools are found on the BackTrack Disk Heorot.net
Perform Vulnerability Scan • Advantage of Vulnerability Scanners: • “Click-and-Go” • Basic knowledge of IT and Security • Powerful • Up-to-date • Disadvantage of Vulnerability Scanners: • “Click-and-Go” • Basic knowledge of IT and Security Heorot.net
“False positives refer to non-issues that were incorrectly detected. Accordingly, false negatives refer to existent issues that were not detected during an assessment. In every assessment there is always the risk of any of these being present.” Perform False Positive and False Negative
Enumerate Discovered Vulnerabilities • Identified Vulnerability • Apache/2.0.55 (UNIX) PHP/5.1.2 • Tools: • Web Sites: • Milw0rm.org • Securityfocus.com • Cert.org • Packetstormsecurity.com • National Vunerability Database • http://nvd.nist.gov/ • Metasploit • Vulnerability Scanners Heorot.net
Apache / milw0rm Demonstration Enumerate Discovered Vulnerabilities
Estimate Probable Impact • High Risk Vulnerability • “...immediate threat of high and adverse impact on the business critical processes of the target organization” • Medium Risk Vulnerability • “...threat of high and adverse impact to non-critical systems in terms of business. • “...no immediate threat nor a big impact and the vulnerability affects critical business systems.” • Low Risk Vulnerability • ...”the technical and business impact is low.” Heorot.net
Identify Attack Paths and Scenarios for Exploitation • Game plan on how to attack the system • List of vulnerabilities • Threat Level based on Impact to business goals • Measures to mitigate vulnerabilities • Stopping point About to move away from “Blue Team”and move into “Red Team” Heorot.net
Hands-On Exercise Identify Live Hosts • Tools: • The Internet • List of Services • Version Information • Operating System • Version Information • Find known Vulnerabilities • Bugtraq • http://securityfocus.com/archive/1 • National Vunerability Database • http://nvd.nist.gov/ • Find Potential Exploits • milw0rm.org (that’s a “zero”) • Securityfocus.com • Cert.org • Packetstormsecurity.com Heorot.net
Module 5 – Conclusion • Phase II Controls Assessment Scheduling • Information Gathering • Network Mapping • Vulnerability Identification • Identify vulnerable services using service banners • Perform vulnerability scan • Perform false positive and false negative • Enumerate discovered vulnerabilities • Estimate probable impact • Identify attack paths and scenarios for exploitation Heorot.net