Ready to Start Your Career?

By: Uladzislau Murashka
February 27, 2019
Vulnerability Assessment: How quickly assess networks

By: Uladzislau Murashka
February 27, 2019
Today we going to speak about how quickly execute security scanning and assessment of big networks, which tools we will need and in which cases it may be required.
In which cases do we need to scan big networks
Some compliance's like PCI DSS or HIPAA may require to execute security scans against huge networks and subnets, including testing of isolated environment and network segmentation at all. This process may require lots of time but here all will depend on your experience and tools set of course.Main reason of such activities - identify live hosts, find open ports and available services for possible outdated versions, vulnerabilities or services which communicate through not encrypted protocols as this is critical in such compliance's and user data can be at risk, our main aim here to reduce such risks.Testing approach
Such kind of scans / tests usually done under the model of so called white box when you have access to internal network or if speak about external - your targets were specified by the customer and there no need in any additional research and targets finding.Tools
As this is mostly network scanning project, here we going to use tools for network security analysis:- arp-scan
- masscan
- nmap
- OpenVAS (optional)
- Hydra
- Dirb
- Nikto
Recon
First we'll need to identify live hosts in our network (internal or external):$ nmap -sn -T5 192.168.0.0/24
To not waste our time for inactive host, we going to filter them out and work only with live hosts. On next step we going to identify open ports and grab banners, output will make in grapable format:Scanning & Vulnerabilities finding
$ nmap -sV -T4 -F 192.168.0.1 192.168.0.3 192.168.0.15 --script banner -oG /tmp/nmap-banners.txt
The same action we can do in case if have loads of live hosts but with masscan:$ masscan 192.168.0.0/24 -p0-5000 --banners -oG /tmp/masscan-banners.txt
After we have results of those scan, on next step we can do following:- Apply nmap vulnerability scan (nmap -sV -p <ports> <hosts> -T4 --script vuln)
- Apply Dirb for web apps (dirb https://192.168.0.15 as example) to find sensitive files & directories
- Use Nikto for some simple web security checks (nikto -host http://192.168.0.15 as example)
- Finally we'll need to check network isolation with arp-scan (segmentation also can be checked with nmap as well)
$ arp-scan --interface=eth0 --localnet
By changing adapters on your machine you may check each subnet.