IS3110 LAB 5
Identify Threats and Vulnerabilities in an IT Infrastructure
1. What are the differences between ZeNmap GUI (Nmap) and Nessus? NMAP is primarily a host detection and port discovery tool. Instead of using Nessus to look for specific vulnerabilities against a known quantity of hosts, NMAP discovers active IP hosts using a combination of probes. On the other hand Nessus takes the open ports into account and notifies you if these ports have potential security vulnerabilities attached to them.
Nessus is typically installed on a server and runs as a web-based application. Nessus uses plugins to determine if a vulnerability is present on a specified machine.
2. Which scanning application is better for performing a
…show more content…
What is the source IP address of the Cisco Security Appliance device (refer to page 6 of the pdf report)? 192.168.0.1
7. How many IP hosts were identified in the Nessus® vulnerability scan? List them.
8. While Nessus provides suggestions for remediation steps, what else does Nessus provide that can help you assess the risk impact of the identified software vulnerability? Through passive monitoring, PVS can reveal devices and software on the network that are not authorized, or that may indicate a network compromise.
9. Are open ports necessarily a risk? Why or why not? They are a risk because a trojan can be used to transmit data to an attacker. They hold a port open, e.g. Port 31337. The attacker connects to the trojan and sends requests to do a certain task, for example to make a screenshot. The trojan makes the screenshot and sends the image via the port to the attacker. On newer trojans, the port number is quite freely configurable, which makes identifying the trojan by the port number difficult. There are no control mechanisms available which can prevent a trojan from using an specific port. If a trojan does use the port 80, for instance, a novice user could imagine the program is a webserver, and may even simply ignore the port.
10. When you identify a known software vulnerability, where can you go to assess the risk impact of the software vulnerability? Nessus can detect thousands of problems, and it classifies each as one of
Exploiting known vulnerabilities with PenTest apps it is very easy to discover if a server is vulnerable (Nessus, metasploit, etc.) SNMP hacking to reveal server uptime (for Windows it is OID 1.3.6.1.2.1.1.3.0) for critical always-on systems they may not have been rebooted for months/years. Easy to back-date in a vulnerability database and see which patches require a reboot and know for certain they aren’t properly applied. If you have an account on the server you can use “net statistics server” or “net statistics workstation” to determine uptime. Security compliance manager is the framework used for Stripping, Hardening, and Compliance purposes. Use this to make a Gold/Master image for mass distribution or for individual stand-alone machines. Explicit guides are defined for hardening the registry and other file system settings. Templates for OS, Roles, Features, and Applications. With System
Utilizing two simple command switches, -O and -v, provided a wealth of information about the host system. Most notably, it listed all of the open ports, protocols, and the operating system of the target system. This quick gathering of information enabled the execution of more detailed commands against specific ports to expose specific vulnerabilities. This information can then be used to address any specific vulnerabilities that are
HTML5 will also allow pen-testers to review new scans, create new policies, and view scans from any device on the scanner, which means the entire network will be secure. This magnificent security tool is capable of providing any vulnerability within the IP address range, network or host located on the network. Within the configuration and compliance auditing, it can be compared to the Security Content Automation Protocol (SCAP), which is a method used to enable automated vulnerability management (National Institute of Standards and Technology, 2016). Nessus will also ensure the system is configured to be compliant within the security structure of Windows, Linux, Mac OS and applications. One more feature included is the integration of patch management, which allows patch information to be retrieved and to be included in the patch management report. Nessus will go one step further and check to ensure that patches have been properly installed, will audit mobile device weaknesses, gathering data and writing reports about potential threats for the devices connected to the network, whether it be iOS, Android, or Windows operating
Since the system/application domain involves business’s mission-critical systems and applications, as well as data, it is important to ensure security of this domain. Failure to do so can result in a large loss of information and can ultimately lead to the cease of productions. This will ensure the protection of confidential data and its integrity. By implementing monitoring software tools, this will analyze any potential vulnerability that may exist on the
The following are a list of recommendations that should be considered to resolve the vulnerabilities
When performing a BIA, you are trying to assess and align the affected IT systems, applications, and resources to their required recovery time objectives (RTOs). The
What is the risk impact or risk factor (critical, major, minor) that you would qualitatively assign to the risks, threats, and vulnerabilities you identified for the LAN-to-WAN Domain for the healthcare and HIPPA compliance scenario?
Nmap when introduced was all command line interface, ZeNmap was created to make the software user friendly. Nmap doesn’t tell you the vulnerabilities on a system that requires knowledge of the computer network, the network baseline, to figure out where the vulnerabilities exist. Nessus is like Nmap in that it can do network discovery, but unlike Nmap, it is designed to scan systems to determine their vulnerabilities. Nessus has the ability to create policies which are composed of scanning specifications.
Nessus scans for vulnerability’s and Zenmap GUI is used to map network host within an open port.
This is because it is capable of scanning for IP addresses during port scanning, check for services that are open and also test for the commonly known vulnerabilities when the listening services are detected. In addition to testing for the vulnerabilities OpenVAS uses a database which has over 38000 NVT CHECKS misconfiguration, thereafter gathers the result obtained and then filed into a comprehensive and detailed information about the whole scanning processes in terms of the vulnerabilities it is often advisable to review the results to avoid risks and unforeseen security
In the three maintained products the threats and risks are to be identified. Such as the data base securing, user identification, authorizing proper managers, protections from hackers and updated firewalls and less vulnerable software.
Nessus is a top-notch vulnerability scanner produced by Tenable and is used by home and corporate users. Basically, it looks for bugs in your software. It sets the standard for accuracy and scanning speed for vulnerability assessment. Nessus will test for security problems that a hacker may use to get into your system. The Tenable research staff constantly designs programs to detect new vulnerabilities called plugins. Plugins use a set of generic remediation actions and algorithms to test for vulnerabilities. (Tenable) It is written using Tenable’s own NASL, Nessus Attack Scripting Language. (TechTarget Network) The NASL language lets individual attacks be described simply by security professionals. Nessus administrators use the NASL to customize their own scans with the descriptions of the vulnerabilities. (TechTarget Network) It will ensure compliance and help reduce an organization’s attack surface. (Tenable) Nessus constantly
The Metasploit Framework includes an official Java-based GUI and also Armitage. It offers penetration testing software and tools for automating the assessment of an application vulnerability and its fix. Metasploit Framework has a built-in of Anti-forensic and advanced evasion tools that allow a will be attacker to evade IPS/IDS and firewalls. (TechTarget)
The objective of a vulnerability assessment is to validate host configurations and produce a list of known vulnerabilities existing on in-scope systems. The testing is limited to relatively safe checks designed to limit any negative impact in risk-averse environments.
Though there are various kind of tools and methods for manipulating application vulnerabilities, there are some that are far more well-known than others.