Time
10 hours 28 minutes
Difficulty
Advanced
CEU/CPE
15

Video Description

This lesson introduces the module which focuses on security analysis and assessments. Participants will learn how to search for vulnerabilities on a network and see if it can withstand an attack. This lesson also discusses the following methods that can be used to search for vulnerabilities:

  • Security audit
  • Vulnerability assessment: physical, administrative or technical
  • Penetration testing: reconnaissance, testing and reporting

Video Transcription

00:04
Welcome back to Cyber Aires, cop Tia. Advanced Security Professionals Class. My name is Kelly Hander Han, and I am your subject matter expert, and we're gonna pick up with the new domain on security analysis and assessments. This is a relatively short domain. Um,
00:23
what we're going to do in this chapter is we're going to look for vulnerabilities on our network and try to determine whether or not our network is able to withstand an attack. So we'll talk about some of the methodologies, some of the general ways that we approach vulnerability assessments in pen testing.
00:42
All right, So when we talk about the methodology, when we talk about how we're gonna approach looking for weaknesses on our network, there a couple of ways that we do that one of the first and foremost ways that we do on a very regular basis is we audit, we conduct security audits.
00:59
Um, we have automated audit tools. We review those audit logs.
01:03
We have professionals within our organization that conduct security audits. That's usually the Security Administration team. Those audits air regularly reviewed. And most importantly, the results of that audit log are used
01:21
to shape the way the organization moves forward. So, for instance, if they were department that failed a security audit, we don't just say better luck next time we immediately implement some sort of corrective action plan and we bring those departments back on board and make sure that we move forward
01:40
in a state of compliance. So security audits are very, very important.
01:45
Next, we move to vulnerability assessments. All right, well, with vulnerability assessments, what we're looking for, we're looking for weaknesses on the network. OK, they can come from individual hosts. They can come from network infrastructure itself from configurations of network devices.
02:01
You know, vulnerabilities come from a wide range of ideas, but what we're looking for, we're looking for weaknesses
02:07
and vulnerability assessments. Ca NBI physical, administrative or technical. So many times, we immediately in our mind think about Oh, we're pen testing a system. Uh, sure, and that's fine. But vulnerability assessments, pen tests, all those mean by nature is,
02:27
can I find a weakness? And can I exploit it? So vulnerability assessments from a physical perspective, checking for door seeing the doors are unlocked, checking to see if I can get in through a, uh, loading dock when the front doors require additional security,
02:44
are sensitive areas isolated?
02:46
Did anybody leave classified materials out on their desk? You know, those are the types of things that we look for. Now there is a difference between a vulnerability assessment and a pennant test. Often they go hand in hand. The vulnerability assessment piece would be first. I'm looking for known weaknesses,
03:06
so I want to find out if we're conducting this on on, uh, from a technical perspective.
03:10
First thing I want to do is I want to find out what operating systems your computers air running, because every operating system has its own unique set of vulnerabilities. So some operating systems come with a Web service installed automatically listening Import 80 for instance. Other operating systems have different security vulnerabilities,
03:30
so an important piece of vulnerability assessment
03:32
is learning what I can find out and then seeing if there's known security flaws. Air there have users change default passwords. Have they renamed administrative accounts All those things that we're looking for
03:45
now? Penetration testing takes that goes a step farther, and it says, Can I exploit those weaknesses just because I have Port 80 listening on my device doesn't necessarily mean that Port 80 traffic that you can exploit and gain access to my system through port 80. So we look for vulnerabilities first,
04:04
and then we look to see if they could be exploited
04:08
when we talk about conducting a vulnerability assessment or penntraffic test there, a couple of things that we want to do before we even get started with the test itself. First of all, we want to meet with management and determine ago our goal.
04:20
So we're gonna meet with management and figure out why we're conducting the pin test in the first place. Are we doing it for certification and accreditation process?
04:30
Are we doing it? Uh, just for due diligence sake. And by the way, pen testing is due diligence. I am researching. I'm looking for weaknesses on my network. Do care would be closing up those weaknesses.
04:46
So at any rate, how I approach this process is gonna be driven by what we're trying to accomplish. So I'm gonna meet with management
04:53
and determined my goals.
04:55
Second piece. I want a document called Rules of Engagement
05:01
and Rules of Engagement is gonna be a document that's going to clearly specify What I can do is part of my pin test and what I cannot do. What systems are to be tested? What hours can I conduct this PIN test? Are there certain tools that I'm forbidden to use? Is it a free for all
05:19
who is to know about the pen tester vulnerability assessment?
05:24
Are there certain methods that I'm barred from using? All that should go into a document called Rules of Engagement Now for many of you that have done pin tests out in the world and and myself as well, I've generally work off documents called Statement of Work Sells.
05:42
The statement of work, though, really should be much
05:45
broader, and it really should be commissioning. My service is to perform a penetration test and should be a high level overview. Really. A statement of work should not be getting into the very details of naming tools and naming individual I p address ranges. So for this test, as well as a consideration to take back to the real world,
06:04
we really wanna build a document specifically to detail what the rules are off this pen test
06:11
or vulnerability assessment. Don't forget what I'm really doing when I do a vulnerability assessment
06:16
or PIN test. I'm hacking the network. I'm looking for vulnerabilities and then I'm gonna try to exploit them.
06:24
Chances are very good. Senior management frowns upon people hacking their network, so I want to make sure that this is something that's authorized from them. And then it's well defined the process that dates the tools and so on and so forth. And because
06:41
I know that pin testing can be risky,
06:45
it can cause resource is on the network to fail. It can
06:49
call security violations. It can trigger alarms. Some companies, when there's ah scan, automatically call law enforcement. There could be repercussions to doing a vulnerability assessment pen test. The last thing that I want is my get out of jail free
07:06
card,
07:08
and that comes in the form of Sign off
07:11
from senior management.
07:13
Hey,
07:14
so this
07:15
is what I want to accomplish before I ever start the pin test. I want to make sure I know why we're conducting the pen testing. What are broad goals are I want a document called Rules of Engagement. That's very, very specific and very particular as to what tools and activities I can perform. What dates would I P addresses and so on?
07:34
And then I won't sign off from senior management ranting me permission.
07:39
And so all of these elements are very important. But before I would even move forward, what's here on the screen?
07:45
I would certainly make sure that I have the three documents over here on the left.

Up Next

CompTIA CASP

In our online CompTIA CASP training, you will learn how to integrate advanced authentication, how to manage risk in the enterprise, how to conduct vulnerability assessments and how to analyze network security concepts and components.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor