90 likes | 373 Views
Chapter 7: Reconnaissance, Vulnerabilities, and Cyber Testing. Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions. Types of Cyber Security Evaluations. Body of Evidence (BOE) Review Penetration Tests
E N D
Chapter 7: Reconnaissance, Vulnerabilities, and Cyber Testing Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Types of Cyber Security Evaluations • Body of Evidence (BOE) Review • Penetration Tests • Vulnerability Assessment • Security Controls Audit • Software Inspection • Iterative/Incremental Testing Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Understanding the Cybersecurity Testing Method • Reconnaisance • Network and Port Scanning • Policy Scanning • Vulnerability Probes and Fingerprinting • Penetration • Enumeration and Cracking • Escalation • Backdoors and Rootkits • Exfiltration and Abuse Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Reconnaissance and Google Hacks • Google is a powerful tool that can search the entire Internet within seconds • It is useful to know Google search operators, such as: site, -minus, inurl, intitle, “exact phase”, link • Google Hacks are famous and amusing techniques for finding vulnerable systems and devices on the Internet. • The Google Hacking database is at: www.hackersforcharity.org/ghdb/ • Other useful reconnaisance commands include: nslookup, whois, dig and host Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Network and Port Scanning • Common nmap commands for scanning: • # nmap –A 10.10.100.1-254 • # nmap –A --reason –vvv –PN 10.10.100.100 –p0-65536 • For located hosts, some tests include: • # tcpdump –w capture.cap host 10.10.100.99 and host 10.10.100.5 • # hping3 –S --scan all –spoof 10.10.100.99 10.10.100.5 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Policy Configuration Scanning • Scanning for installed executables from the command line: • dkpg (Debian), rpm/yum (Red Hat), pkginfo (Solaris) • On windows: dir /s “C:\Program Files” • Widely used policy config tools include: Retina, AppDetective, and the DISA SRR, and Navy WASSP/SECSCAN Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Vulnerability Probes and Fingerprinting • A popular tool is Tenable’s Nessus • It is web based with configurable scanning policies, multiple simultaneous scans, and detailed reporting from a knowledge base • Nmap and Amap can be used together: • # nmap –oM netmap.txt 192.168.10.1-255 • # amap –i netmap.txt –bqv –H • OpenVAS and Nikto are on Backtrack • OpenVAS is similar in purpose to Nessus • Nikto is a web application probe • WebInspect is a popular web application probe Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Cyber Security Test Planning and Reporting • Key testing documents include: • Risk Analysis • Test Preparation Checklist • Certification Test Plan • Security Assessment Plan • Rules of Engagement • Security Assessment Report • Plan of Actions and Milestones • Initial Authority to Test • Authority to Operate Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions
Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions REVIEW Chapter Summary