Time
10 hours 55 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:00
Hey, everyone, welcome back to the course. So in the last video, we talked about the Vulnerability Management Life Cycle and this video. We're to talk about some different tools around vulnerabilities, so we'll talk about some tools. I want to mention that it's not an endorsement of these tools. And then we're going to talk about the basic types of vulnerability assessment tools,
00:19
and we'll also talk through
00:21
CVS, SCV E and N V. D. So actually learned what those will stand for in this particular video.
00:28
So let's talk through a different types of vulnerability assessment tools. So we have host based. This one's pretty self explanatory that's gonna run on your particular host computer or host system. And this one basically helps us identify
00:42
one operating system. Are you using? And what kinds of vulnerabilities are for that operating system?
00:49
Ah, scope is gonna be basically
00:52
also testing for ah, vulnerabilities in the operating systems as well as general applications.
00:58
The depth type of assessment tool
01:00
is gonna look for unknown, previously unknown vulnerability. So these air things like your fuzzing tools
01:06
where you're in funding, is really kind of an art, and it's more and more advanced topic. But basically, um, it's that death is that type of tool where we're looking at the actual code and trying to see if we can find vulnerabilities.
01:19
So it's more V. Generally speaking, it's more of a static type of process We're looking at the actual code versus is trying to run the code and see what happens.
01:29
We got application layer. This one's normally where we're focused more on the Web servers or like the databases. So that's what we're talking about. The application layer tools
01:38
active vs passive scanning, again active scanners, air actually
01:42
checking vory systems, etcetera that are consuming resource is on the network, so they're doing the vulnerable vulnerability scanning against those
01:51
and then passes. Scanners don't really have a an impact like actor scanners do, like on your network, right? So it's not gonna eat up. A lot of resource is,
02:00
um,
02:00
but you could still find some general information about what's going on in the system.
02:07
So let's talk about CVS SCV e N v. D. You might have heard some of this terminology
02:13
in like the media, especially round if they're like, Hey, you need to release Microsoft to release a patch for see ve Ah, you know, 5000 and 8.6 or one it right.
02:23
What we're basically talking about here is the CVS s is a common vulnerability scoring system.
02:30
So that's basically the CVS s basically of this gives us an unopened framework, right? It allows us to to see some characteristics or communicate care characteristics and the actual impact of different vulnerabilities that are out there or that we're finding out there. They've got a rating. Systems basically goes from zero, which is like
02:51
no severity whatsoever. For obvious reasons. It zero
02:53
and then it goes up to 10 for the critical. So basically, goods from none, nothing's going on first versus 10 and being the most critical.
03:04
And this is really good because it also explains, like, what are some of the underlying characteristics that caused that score to be the score? Right. So it's a really good resource for you to learn about vulnerabilities and learn about
03:19
how it's rated on severity what kind of impact a certain vulnerability can have. So it's a really good resource to go to so again, common vulnerabilities scoring system or C v ss, and then see Visa, common vulnerabilities and exposures again. These are the things that you're going to see when you
03:37
hear about like a patch for Microsoft Windows or you go update software. Ah, like on your iPhone or something it might see
03:45
updating four CV Whatever, right. I'm usually you see that when you're updating like Windows software, but that's what we're talking about there. It's common vulnerabilities and exposures,
03:53
and essentially, it's a
03:55
for lack of better words. A dictionary, right? It's a dictionary of,
04:00
um, certain identifiers around, like common vulnerabilities that we see or exposures. And it really it's more
04:09
more around, like the public lee known types of things, right? That's why you see CV, whatever. And then Microsoft releases a patch for it. So it's known stuff. So the C V database isn't going toe have, like zero day attacks. So attacks that people are just finding that haven't been
04:25
publicly known in some capacity. It's not gonna have those usually. So it's just gonna be things that are publicly known and then envy D is just the National Vulnerability database.
04:35
This includes. This got a lot of resources, so I think the others database of security checklist that you can reference there's listings of, like various software flaws or vulnerabilities. There's information about Miss Configurations,
04:50
different product names that are affected. Maybe there's a router or something that's that's vulnerable. And then what kind of like impact right where that what's the actual impact that that type of vulnerability has been having across the board? So I want to stress that envy D is a U. S government kind of sponsored thing,
05:09
her agency. So just keep that in mind, depending on where you are in the world, listen to this
05:14
humane or may not be able to get access to that to just gonna be mindful of that.
05:20
So let's talk through some some common tools that are in use again. This is not an endorsement
05:27
on this is definitely not an exhaustive list. There's a lot of different tools out. There s own esus professional version. There's a free version, but the professional version is one. I know a lot of organizations using, along with quality as well. Many of the organization's I'm familiar with are using multiple,
05:45
uh,
05:46
applications to run vulnerability scans because you can't just trust one right, you need multiple resource is to use. Nick Dough
05:54
is for the Web, so websites basically you see those vulnerabilities on Web servers. Web applications
06:00
open. Voss is another popular one is free s. So it's a really popular one for people that are trying to learn a little bit more about vulnerability. Scanning. In fact, in our labs, you're gonna be using open Voss. You also bees in another one called core impact
06:14
to practice some hands on skills.
06:18
So just another quick quiz question for you.
06:21
CV provides a list of product names, software flaws and impact metrics. Is that true or false?
06:29
All right, we know that's false. Right again, the, uh, the Envy D the National Vulnerability Database. That's the one that provides that list of product names that were affected. Various software flaws and vulnerabilities, impact metrics and a ton of other resource is that will be very beneficial to you as you're learning.
06:46
So in this video, we just covered vulnerability assessment tools Again, we talked about some of the types of tools that we talked about. Some of the common one said you might see out there in the industry. We also talked through CVS SCV e and N V D
07:00
in the next module. As I mentioned before, module to is gonna be hands on. So and the next couple of videos you're gonna notice that I'll walk you through the 1st 2 labs and then I'll sort of set you free for lack of better words, and you'll be able to go through the lapse on your own. I will have an overview video where I just kind of talk about like,
07:19
hey, this lapse, gonna You're gonna be doing these things,
07:21
But I won't walk you through a step by step.
07:25
If you haven't downloaded, the resource is yet. Be sure to go to the resource tab on this course and download those because you will find step by step lab guys for all of those labs in there.

Up Next

Fundamentals of Vulnerability Management

Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor