Time
10 hours 32 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:00
Welcome the CyberRays video, Siri's and the Company of Security Plus 5 +01 Certification and exam.
00:07
I'm your instructor, Ron Warner.
00:10
This video is on section two dot too.
00:13
Given a scenario, use appropriate software tools to assess the security posture of an organization.
00:20
This session is all about the tools.
00:23
A variety of tools, applications and software programs help assess the security of systems to identify vulnerabilities and together make up complete vulnerability management program.
00:35
These tools include protocol analyzers, vulnerability scanners, honey pots and password crackers.
00:41
This section discusses the purpose and use of these tools. Vulnerability assessment tools such as protocol analyzers and scanners. Help the organization find the weaknesses before Attackers take advantage of them.
00:55
The goal. Find weaknesses and fix them.
00:58
No your security posture By using these tools,
01:03
the first category of security tools I will discuss our protocol analyzers, also known as packets, differs.
01:10
They help you troubleshoot network issues by gathering packet level information across the network.
01:15
This type of application is used to gather information on hub or switch supervisor. Report were in line with network connectivity to enable the analysis of network communications.
01:27
Protocol analyzers can identify individual protocols specific endpoints and sequential access attempts. These applications capture packet and can conduct protocol decoding, turning the information into readable data for analysis.
01:44
Protocol analyzers can do more than just look at packets, though they're useful in many other areas, such as network management and network monitoring. Looking for unexpected events? I'll discuss a few specific protocol analyzers.
01:57
Next, we'll talk about a common protocol analyzing tool
02:02
wire Shark is the most prevalent and widely known network packet sniffer. Often a penetration tester can learn a great deal from simply sniffing the network traffic on a target system.
02:15
Wire Shark provides a convenient graphical user interface for examining network traffic. It's free, which you can get from wire shark dot org's.
02:23
It's available for Windows and for Macintosh.
02:28
On your screen is the wire shark website.
02:30
I recommend you go out to a wire short dot org's and review the information under screen. You see an example of a wire shark dump. There are three different sections associated with it. One shows the network layer traffic, the second and the third shows actually in depth into the packet.
02:50
As previously mentioned. In other videos, you could watch the TCP three way handshake as well as ARP request basically anything that's happening on the network you can see with wire shark, so it's a must have tool.
03:02
The next category of tools. I will discuss our network scanners and mappers. Network scanners identify active hosts on a network, one of the most common network scanning tools. Our network mappers network mapper is a software you to utility used to conduct network assessments
03:21
over a range of I P addresses.
03:23
Basically, you use it to search through a range of eyepiece to see active servers. Hosts, devices, etcetera. Anything on your network can be determined.
03:35
The network mapper compiles a listing of all of those system and hardware present within the network segment.
03:42
The information could be used to conduct a network inventory, identify single points of failure and create graphical detail suitable for reporting on network configurations.
03:54
It's used for that network immune oration. What's on my network?
04:00
Let me show you a few examples of some tools.
04:02
Solar Winds is a commercial product that also has freeware versions that are available.
04:09
It provides numerous capabilities to help you explore your network and understand the security and systems on it.
04:15
They provide network performance monitors. You see an example on your screen
04:20
with solar winds. You can see multi vendor network monitoring
04:26
network insides for deeper visibility, intelligent maps across your network so will tell you not only what systems are there, but what are the applications. And operating systems in place as well, could even dive into the level of patches.
04:42
It's a very powerful tool you should be familiar with,
04:45
and map is arguably one of the most powerful and oldest network mappers out there. It's a free and open source utility for network discovery and security auditing.
04:57
Many systems and network administrators also find it useful for tasks such as network inventory, managing service, grades, schedules and monitoring. Host and service up time
05:06
and map uses raw I P packets in novel ways to determine what hosts are available on the network. What service is such as applications and versions? Those hosts are offering what operating systems are running, what type of packet filters and firewalls are in use and dozens of other characteristics.
05:27
It was designed to rapidly scan large networks, but works find against single host
05:31
and map runs on all major computing operating systems in addition to the classic man line and map excusable the end maps. We also includes an advanced, gooey and results of your Zen map, which you see on your screen.
05:46
Ah, flexible data transfer, redirection and debugging tool and cat,
05:51
a utility for comparing scan results and if
05:57
and a packet generation response, analysis tool
06:00
and pink
06:02
on your screen, you see the end map dot org's Web site
06:06
highly recommend you go out there and read all about and map. It has a long history,
06:14
but in addition to the site talking about end map,
06:17
it also provides a list of many other security tools.
06:21
Here's the list of the top 125 network security tools.
06:27
For example, Wire shark, which I already discussed.
06:30
Medicine Boy will discuss in a while
06:32
necessary vulnerability Scanning tool aircraft for wireless scanning,
06:38
snort and intrusion detection system cane. Enable for password cracking.
06:43
Backtrack. Now known as Callie, which provides a framework and operating system for pen testing,
06:48
neck hat
06:50
and TCP dump.
06:53
There's a lot of tools. Go out to SEC tools dot org's and explore and learn more about these tools.
07:00
Another tool you can use for network scanning is available on IOS and Android Mobile devices.
07:08
It's known as thing F I N G. You see an example on your screen.
07:13
I'll use it when I'm on a guest wife. I just to see what other systems are around.
07:17
It provides a lot of the same functionality. A Zen map will tell me the other systems on that network segment and what they're running. It's a fun tool to explore and help you understand the ideas of network scanning.
07:30
Another common set of security tools. Our vulnerability scanners.
07:35
In section 1.5, I explained that Vulnerability scanner is a software application that both scans a range of I P addresses and tests for known vulnerabilities.
07:46
A traditional vulnerability scanner relies on a database of known vulnerabilities
07:51
normally provided by the vendor.
07:54
These are automated tools, and they're directed at a targeted system that you want to evaluate for their vulnerabilities.
08:01
Unlike a system that test for open ports like a network, mapper
08:05
vulnerability scanners has also for availability of service is and how those service's may be vulnerable. I'll show you a few common vulnerability scanners. Next
08:16
they're comin Vulnerability scanner applications you should know about as a security professional. And in studying for the security plus exam,
08:24
the first is necessary.
08:28
Ness's one of the most popular popular Incapable vulnerability scanner, particularly for UNIX and Lennox System.
08:33
A free message home version is also available, though it is limited on on Li license for home network use.
08:41
Ness's constantly updated with more than 70,000 plug ins.
08:46
Key features include remote and local authenticated security. Jack's a Client Server architecture with Web based interface and embedded scripting language for writing your own pocket and understanding existing plug in. It's one that you will need to run on a Lennox operating system with a client server mode.
09:05
Other vulnerability scanners are open Voss on Lenox Systems.
09:09
The next pose. A community addition which scans Web applications, databases and virtual environments.
09:18
HQ Wallace, a commercial product, also provides some free scans the checks for hidden malware and SSL issues, among other network vulnerabilities.
09:28
I use quality SSL scan and free scan on Web sites where I may be doing business, you need to review in practice with each of these vulnerability scanners to really understand how they work
09:39
for Web application vulnerability testing, I recommend a WASP Zap Zed application product available from O ost dot or GE it discover security vulnerabilities in Web applications.
09:52
Oh, a sap helps you automatically find those security issues in your Web applications while you're developing and testing them.
10:01
It is also a great tool for experienced pen testers to use from manual security testing.
10:07
You see an example of a loss zap in use on your screen.
10:11
Oh, Oscar is an awesome website to look at. Learn more about Web applications security
10:18
Right now you see the 00 oh's Bizet Attack Proxy project, describing a wasp zap
10:26
experiment with tools like a wasp zap against your own website to learn how they work.
10:33
Another common tool for penetration testers and security researchers are exploitation frameworks.
10:39
These are platforms used for penetration, testing and risk assessments. Along with understanding vulnerabilities.
10:46
They're frameworks containing a set of exploits for known vulnerabilities,
10:50
including medicine, Lloyd canvas and Core Impact.
10:56
The browser exploitation framework, or beef, is a pen testing tool for exploiting Web vulnerabilities.
11:03
One note security plus is rather technology agnostic. You don't need to be experts on each of these frameworks. We do need to know their purpose, and that they exist.
11:16
Callie is a very useful tool that you can run on a virtual machine or off of a USB drive. It's a debian derived Lennox distribution designed for digital forensics and pen testing.
11:28
It's pre installed with numerous pen testing program, so you don't need to download additional programs. If you're running Cali,
11:37
Kelly Lennox can be run from Hard Drive CD or USB, and it is supported platform of the Mad Exploit Projects Medicine Late Framework
11:46
tool for developing in executing security exploits
11:50
The social engineering tool kit or set is another framework.
11:56
The social engineering framework is a searchable information resource for people wishing to learn more about the psychological, physical and historical aspect of social engineering. You see some typical social engineering attacks on your screen
12:11
set is specifically designed to perform advanced attack against the human element element.
12:18
The tax built into the tool kit are designed to be targeted and focused attacks against a person or organization used during a penetration test
12:28
medicine. Boyd is another common exploitation framework.
12:33
Attackers air always developing new exploits and attack methods.
12:37
Medicine ploy, penetration Testing software helps you use them as your own weapons against them.
12:45
utilizing an ever growing database of exploits. You can safely simulate real world attacks on your network to train your security team to spot and stop the real thing.
12:56
Basically, met Exploit comes pre bundled with exploitations against known vulnerabilities, so be very careful. When running it.
13:05
You can actually download a free VM called Met Exploitable to run medicine. Lloyd. Against
13:11
this way, you can practice within safe come confines of your own virtual system to learn more about medicine. Lloyd, go to med exploit dot com.
13:22
I showed the website on your screen.
13:24
You also need to be aware of what's on your network, especially your WiFi network. You can use tools like Aero Dump, Kismet, Nets, tumbler V, Ice Tumbler and Insider to be able to map all of the different devices connected to an SS I. D.
13:41
Wireless scanners are used to gather information about WiFi networks and detect access points,
13:46
Rogue or valid, they can also search out for cloaked S s I. D. S and be used to break weak encryption keys.
13:56
This is one of the must have tools to have on your device. That way you can ensure your WiFi network is safe and secure
14:05
an additional tool set toe. Having your tool kit are configuration compliance applications such as the Microsoft Baseline Security Analyzer, M. B S A.
14:15
It's a free download from Microsoft, and it's a software vulnerability scanner toe. Analyze targeted Microsoft systems to detect whether software security patches or baseline configuration settings are missing.
14:28
Other tools that's come from the Center for Internet Security can download their tools as well for configuration compliance
14:35
necessary one of those tools. Not only is it good for vulnerability scanning, you could also use it for configuration compliance.
14:43
Banner grabbing is a technique to identify operating systems applications, and service is on a system.
14:50
This information helps narrow the vulnerability. Signatures to scan for
14:56
an attacker can footprint an organization in much the same way.
15:00
The more you understand about the specific operating systems, applications and version information, the easier it is to identify vulnerable systems and conduct targeted attacks.
15:11
Net Cat is a common tool used for banner grabs.
15:16
You see an example of neck tat on your screen using the N. C. Command from a command line going to example, on Port 80 I can see the Web pages that might be used by a Web server.
15:28
Neck Hat is a free download for Windows and Lennox, and it could be used to read and write on TCP and UDP network connections.
15:39
I will now move on to password cracking, used to disclose passwords and assess password strength. I've run password cracking in organizations to gain an overall idea on how good the passwords were being used by our end users.
15:54
I've also used password cracking to break into individual systems when we've lost the passwords to the
16:03
online password cracking tools and be able to you to type in the hash and get a password return in plain text. So, for example, if you just have that hash of the password, try Googling it. You might be able to find the password through that simple method.
16:18
There are also applications you can download and run could perform password cracking or password discoveries. We also call it
16:26
Brutus Cain and Abel. John the Ripper. Tichy, Hydra are all examples.
16:33
John the Ripper is a fast password cracker for UNIX, Linux and Mac OS systems.
16:37
Its primary purpose is to detect week UNIX Mulanax passwords,
16:42
though it supports hats. It hash is for many other platforms as well.
16:47
You'll probably want to start with some word lists.
16:49
The word lists are already lists of words compared with their hashes.
16:56
A lot of these tools use rainbow tables.
16:59
Refer to the concepts of rainbow tables and other sections and videos with in security plus
17:04
password cracking. Great way to be able to show weaknesses in network security.
17:11
Say you want to catch some bad guys doing some stuff on your network. Could be internal employees or external hackers.
17:18
You could do that using ah honey pot or a honey neck.
17:22
These are individual systems or even networks exposed on purpose.
17:26
Sole purpose is to capture malicious activity. They may contain numerous vulnerabilities knowing that they will be exploited.
17:36
But then you can watch what's happening. Who's doing the exploiting, where they're coming from the techniques they're using. Alter better understand your network defenses.
17:45
It's used as part of investigative initiatives as well. You believe you've been breached. You may put a honey pot or honey net on your network. Get to be ableto watch those who may have breached you
17:57
and to study their attack strategies.
18:00
Keep in mind it should be separate from any business network because they are exploited systems.
18:07
Goto honey d dot org's to learn more about honey pots and honey nets steganography. It's a method for hiding information and other information.
18:19
It means hidden writing,
18:22
hiding messages in other media so that the unintended of recipients are not even aware of any message. For example, terrorists will use pictures on Facebook
18:34
and steganography to hide the messages within those pictures. Anyone looking at the pictures won't be able to tell the hidden message contained within it.
18:44
There are multiple approaches for steganography,
18:47
least significant bit insertion, masking and filtering algorithms and transformations. Use your study material toe. Understand these different approaches.
18:57
Common steganography tools include
19:00
open puff
19:03
camouflage steak, Hide and our stag.
19:07
It's fun to play with these tools and see how easy it is to hide your own messages within other types of media.
19:14
When you're taking systems off of the network, you want to make sure they are wiped. Their data is sanitized. Sanitization is the process of removing content from a device or media from hard drive, USB drive, etcetera.
19:29
Some of the tools you should be familiar with. Our D band.
19:32
BC wipe and cryptographic erase. You can often use native operating systems tools as well.
19:40
I talked more about system cleanup in other videos.
19:45
The last topic for this video. Our command line tools. This is using the UNIX or Windows Command prompt and running commands that pull information aboutthe security or health of your system.
19:57
You see different examples on your screen.
20:00
The man command is the number one command you need to know. For Lennox Systems,
20:07
it's the manual for UNIX or Lennox. So, for example, if you have a Lennox system type man man and it gives you the manual page for the manual command
20:17
rather slick, right,
20:18
let me show you how some of these others work
20:22
from a command prompt.
20:23
Ping is just checking to see if I can talk to some other device. So, for example, Ping of Dub Dub that google dot com
20:33
replies back, saying, I can ping Google.
20:37
What this also shows is the I. P address associated with Google
20:42
Nets. That shows the network status for my internal network
20:48
Trace ERT, also known as Trace route so I can run that won t r a C E r t shows the path
20:56
that'll go from my computer to Google.
21:00
You see, it's trying to now resolved through D. N s the path it's slowly working through it. So, for example, you can see my local I p address. Now it's beginning to reverse my I S P address
21:18
Trace route can identify where your network packets air going for network troubleshooting and security purposes.
21:27
N s look up or dig
21:30
is a tool to perform a d. N s query.
21:33
So again, I'll pick on Google and NATO mind they put this information out there on purpose.
21:40
It gives me my address and then the answer for the i p address associated with Google, you see both the I P version six address and the I P version for address
21:53
other tools conclude I p config or if config so this gives me
22:00
the information particularly. I add all this I p config gives me the information about my I p
22:07
network addresses on my local machines.
22:11
You see, it's scroll off.
22:12
So let's pipe it. Two more pipe command that key above the enter
22:18
piping to more means don't allow it to scroll off of the screen. So I p kid faked that all. You see the name of my laptop
22:26
and my I P addresses
22:32
and map neck at I've previously discussed.
22:36
Be familiar with the command prompt. You'll use it all the time as a security professional to troubleshoot your own home systems and the ones that your business
22:45
practice practice. Practice with the command prompt and will be your great friend as your performing security assessments.
22:52
Another command line tool to be aware of its the CIS Internal Sweet
22:57
from Microsoft.
23:00
It provides both gooey and command prompt tools to help administer window systems. For example, auto runs will tell me anything that's automatically starting on my Windows PC. I'll use that to get rid of junk where, when I'm re installing a machine
23:15
process, Explorer is like task manager on steroids. Give so much more information about what is running on the window system.
23:25
You see all the different tools available through the cyst. Internals sweet
23:29
on the image on your screen.
23:30
There's also a video from the software originator Marquis Zenovich on Mauer hunting that I highly recommend
23:40
Sis Internal Suite is available for free from Microsoft.
23:45
In this video I covered section 2.2 on security assessment tools.
23:49
You see the categories of the tools I talked about on your screen.
23:55
Let's practice with a few sample quiz questions.
23:57
Question one, also known as packet sniffers. Thes tools help you troubleshoot network issues by gathering packet level information across a network.
24:08
The answer is D. A protocol analyzer,
24:12
A common protocol analyzer or packet Sniffer is wire shark
24:18
question, too.
24:21
Alex is to conduct forensics of a phishing email.
24:25
She also knows the i p address of the originating email server.
24:29
What command would show Alex the complete path to that I P address? The answer is B Trace ERT, also known as Trace Route.
24:40
It will trace the path from the originating PC tow whatever you're trying to locate.
24:45
There are numerous labs. You can try to get hands on practice with all of these tools. The first is the Network Vulnerabilities lab. We get to practice network foot printing using and map and Zen map and then packet sniffing with wire shark.
25:04
Another lap to consider is the password cracking tool lab,
25:10
where you can get hands on experience determining the weaknesses of passwords running tools such as Cain and Abel P W dump LM hash and the ability to detect root kits. It's fun to do this password hacking, but make sure you do it in a safe environment like the's labs.
25:29
You can also practice hands on using the scanning and remediation vulnerabilities with open Vase. Lab.
25:37
Callie is an operating system pre built with security assessment tools.
25:42
Open vase Dancer Open Vulnerability Assessment system.
25:47
It's a free tool to use and can be quite comprehensive. And it's scanning techniques as well as assisting in finding vulnerabilities. It could be used in conjunction with other Cali tools. To help end test environments more efficiently,
26:00
this land lab will give you that experience in running Cali and open vase. Get as much hands on experience as you can to prepare for the security plus exam.
26:12
This concludes the video for section two dot too.
26:15
Given a scenario, use appropriate software tools to assess the security posture of an organization.
26:22
This is part of Domaine two on technologies and tools.
26:26
Refer to your study material for more information on all of these topics,

Up Next

CompTIA Security+

CompTIA Security Plus certification is a great place to start learning IT or cybersecurity. Take advantage of Cybrary's free Security+ training.

Instructed By

Instructor Profile Image
Ron Woerner
CEO, President, Chief Consultant at RWX Security Solutions LLC
Instructor