Time
7 hours 35 minutes
Difficulty
Intermediate
CEU/CPE
12

Video Transcription

00:01
Hey, guys, Welcome to another episode of the S S C P Exam prep. I'm your host, Peter Simple in This is going to be the fourth lesson in the third dummy
00:11
so far in the third domain. We've taken a look at the risk management process, which is simply how to figure out how much risk an organization is currently facing. We've looked at four different ways of handling risk, and we looked at ordering, which is an evaluation off a security framework of an organization.
00:31
Now,
00:32
in this lesson, we're gonna look at vulnerability, scanning and analysis, which is simply checking the system for any type of weaknesses. These weaknesses need to be found so they could be fixed.
00:43
Let's get started.
00:45
Vulnerability scanning is simply the process of checking a system for weaknesses. There's only one real goal with vulnerabilities scanning. You want to study your organization security framework.
00:59
You want to find problems.
01:00
You want to fix and improve on these problems, and you want to repeat the whole thing all over again.
01:07
Vulnerability scanning is the kind of thing where you can get very different results every single time we do it, so it's important to do it fairly off.
01:18
Bunch of different vantage is for vulnerability. Scanning. You can identify system vulnerabilities, right? You can't protect against the problem if you don't know there is a problem. So it's good to have these problems come to like before there is any type of hack, our
01:36
database breach or any type of exploitation.
01:40
Another advantage of last four. The prioritization of mitigation, right? If you have a bunch of vulnerabilities, you can figure out which ones are the most important. That most mission critical so you can fix them first, doesn't very good for comparing security positions
01:55
right, and you find these vulnerabilities. You can determine that you are fairly far or fairly close to the security baseline. You can fix these vulnerabilities, and you can. You go from there. You can repeat the process. You can figure out how far you were deviating from your security baseline
02:14
disadvantages, vulnerability. Scanning. You can't always focus efforts. It's very easy to get caught up in scanning everything
02:23
and anything over systems. You know, files, processes etcetera so it can get very expensive, and it could be very time consuming as well.
02:31
Another disadvantage. Vulnerability. Scanning you could crash the network. This kind of thing does happen. It does happen fairly often, even if it's just the simple scan or anything. If you could accidentally trip something or something could be caught, like some sort of type, some type of false positive,
02:52
and it could cause the system to crash.
02:54
They're really two types of vulnerability scanning
02:58
general and application specific general vulnerability. Scanning just kind of probes hosts on the operating systems. Just looking for known popular flaws, you know, takes a look at applications. Kind of figures that out.
03:13
Um, you know, what are the most typical or the most common attack types you know, for this application application specific
03:22
of owner building testing is using vulnerability tools that are specifically designed to look at certain types of software. So you want to use, you know, database really did vulnerability tools for database stuff you wanna look at, you know, email tools for any type of
03:40
e mail systems that you might have
03:43
vulnerability. Testing usually has the
03:46
following qualities where you wanna have your os fingerprint where you want to identify your Alas, you want to see what kind of vulnerabilities are associate ID with this last. So you can kind of no one to look for before you going in.
04:01
You want to, you know, use stimulus and response algorithms. This is kind of
04:08
it's kind of like a kind of poking a target to see will happen, right? So if you send a little dated to a target, you know, you want to see how it will respond, you know, you might get a response that's appropriate. You might get something that's completely not appropriate. It really depends.
04:25
You wanna have your proof would be long gone ability, right? You want to walk on your host with admin credentials? The seed.
04:30
Oh, what exactly what kinds of extra things can you get into if you are an admin? And whether or not there is an actual difference between admin credentials and normal user credentials? Sometimes
04:45
no people were add mons, and they have no idea but there and mints. And that's that's a very serious problem
04:50
if we want to identify possible vulnerabilities by cross referencing
04:56
if you If you know you know you have a certain thing, you know you have certain operating system and you know certain vulnerabilities are associated with this mobile operating system. But a lot of vulnerabilities are not associated with this operating system than the vulnerabilities that are not associate ID. Then you really don't have to
05:15
worry about them as much. You right you want to use?
05:17
You want to look at vulnerability testing from different angles.
05:23
You want to make sure lawyer vulnerability tools have the latest updates, right? Every time there's a new vulnerability that comes out that gets fixed, its signature or otherwise known as like the way it looks or the way he behaves, it's kind of loaded onto the vulnerability tool. You want to make sure those are
05:42
updated,
05:43
Um, as much as possible, simply because there's new signature is coming out all of the time.
05:48
You also want to have reported capability for all of your vulnerability tools. If you're if a scanner can't report,
05:57
doesn't do any good, right? Good vulnerability tools always provide a way to report on the results of any vulnerabilities that they might find
06:09
problems, vulnerability, testing. There's a lot of false positive. There's a lot of things that the scanner or the boulder building tool, but it was a huge problem, and reality it's It's not a problem at all. You know, this could be like an everyday occurrence.
06:25
It's also crash exposure. There's a higher risk for crash when you're vulnerability testing. So obviously
06:30
you want to be careful. You don't want to be that guy that's
06:32
trying to do good but ends up crashing the network.
06:36
Trust me, you don't want to be that guy
06:39
on the line. Another vulnerability testing problem is temporal information, right? Owner builders discovered constantly. Vulnerabilities are being fixed constantly, so just because the scan is good today doesn't mean the scan is good tomorrow. So you want to
06:56
skin and check on vulnerabilities on a somewhat consistent basis.
07:00
There's really a lot of cool scanner tools and vulnerability tools out there, which you can use. You could check out that Web site set tools dot or huge list. Everything's really cool. I highly recommend it.
07:13
So securing hosts right organizations serious about security, um, usually have ardent host configuration procedures to mandate any type of change and host employment where you want to make sure all of your systems are locked down
07:30
as much as possible.
07:31
If there is any unneeded or insecure service, you definitely want to disable one of those open ports that you're not using. Shut up. If there's any type of service that you shouldn't be using or if it's not secure, implement things like tell meant,
07:48
uh, disabled, right? Don't Don't let people have access to it.
07:54
You want to make sure you have least privilege and police on file system permissions, especially on shared network drives. You only wanna have access to the files that you actually need access to. And you wanna have plate file system permissions, even on your
08:13
own personal computer, right. If you are
08:16
creating shared folder between two different computers, you want to make sure you were only sharing it with one or two people that actually need it and not sharing it with the entire system.
08:28
All right, you wanna make sure you have your patching policy? We did talk about patch management earlier in the second domain.
08:35
You want to check applications for any type off weaknesses,
08:41
right? There's a lot of really cool Web sites out there that if you type in like an application that can come back and Rio, it will return a list of different vulnerabilities that have been historically associate ID with that application, and you always want to make sure your firewall and your routers
08:58
or doing the job that they're supposed to do and walking all of
09:03
the necessary bad trap.
09:05
Security. Monitoring, Testing Always, always. You want to test your monitoring systems to make sure they're working, and you always want to ensure they are working in your organization the way they're supposed to be working
09:18
anything out of the box is incredibly noise
09:22
out of the box intrusion detection systems or where you get the most full of positives, right? That's when every single thing is a problem, you know, because of that, because the detection system simply doesn't know your organization doesn't know how you operate. That's why it's important to
09:39
tweak it as you go so you can get more consistent and
09:41
accurate results.
09:43
A bunch of different ways of testing different ivy s systems.
09:48
You can always, you know, test within a single packet,
09:52
right? This is, you know, minimal functionality. Kind of want to make sure, like, is this thing even on write the check to see if the I d s even on you could test the packet Ah, better way to test it is to use multiple packets and have different different kind of the data streams
10:11
within those packets
10:13
simply to make sure the i d. S more or less Remember the packet. It's also kind of piece together. Any type of intrusion.
10:22
You want to test it with up to skate and dated, right? So this is any type of data that convert from asking me to hack the decimal or Unicode or you want to make sure that the I. D. S can convert and read all these formats. He doesn't want to make sure they can
10:41
look at fragmented data,
10:43
Any type of data that comes in real small mountain on a bunch of different packets. You want to make sure the I. D. S and kind of put those packets back together
10:52
Protocol embedded Attacks, Yes. Should be able to understand and decode commonly used applications that this is things like D N s h e d p f T p SQL things like that and also flooding detection.
11:09
If there's a whole bunch of packets coming in at once,
11:13
probably I d s better be able to pick up on that because of it. Can't you Guys are in a whole lot of trouble.
11:20
Wireless networking testing. You always want to make sure you test all of your wireless networks simply with wireless technology, especially these days. There are so many wireless technology devices that people don't even realize everything from cell phones to refrigerators
11:39
to thermostats, right? All these things live on
11:43
wireless networks, so those wireless technology for a whole lot of wireless access points and the more wireless access points if they are not properly secured, they cause a whole lot of problems, right?
11:58
Really important for a security tester. An S S. C. P. Practitioner to test for the effectiveness of wireless security, especially looking for unauthorized access points. If you have things getting onto your network without any type of authentication or encryption than
12:16
you know, you're setting yourself up. You're setting something up for disaster because at that point it's only a matter of time
12:22
tool. Something that happens
12:24
you if we want to keep it on your wireless network, there's some great tools out there. No, not to give anyone sound plugs, but that's the board's good kiss. Met Ness's always a really good tool to use and air crack,
12:37
war dialing and war driving. More dialing is kind of adity at this point, but it's still good for an SS CP practitioner to be familiar with it or dialing kind of, um,
12:52
goes through a whole bunch of different phone numbers looking for unauthorized modems to that are connected to computers, which are connected to networks so it searches. The telephone number is looking for any type of mood. Um, that would have been forgotten about,
13:05
um, and once it finds one in can, more or less Hackett now motives been falling out of the
13:13
I. T. I T. Usage area. Don't use much anymore, And that's why war dialing isn't
13:20
the whole. It isn't as prevalent as it used to be.
13:24
Very similar to war dialing this war driving, which is more or less the wireless version off war dialing. It's looking for access points on wireless networks while driving around. So it's looking
13:37
for any type of unsecured open like hot spot or some sort of Antena work, and attach itself to a wireless network so you can get into that wireless network
13:48
Into these lecture. We discussed vulnerability, scanning and analysis
13:54
with time.
13:56
What is one of the downsides of vulnerability? Testing is a too much money.
14:01
Be too many false positives.
14:05
See,
14:05
there are too many things to scan for it to be effective,
14:09
or D
14:11
allows for the prioritization of mitigation.
14:16
If you said see, then you are correct. Usually are too many things to scan to be effective. If you try to vulnerability, scan everything. That is why it is important to have a very specific scope on things you want to look for and test. Otherwise we'll just be simply wasting your effort.
14:35
Thanks for watching guys. I hope you weren't a lot in this video, and I'll see you next time.

Up Next

Systems Security Certified Professional (SSCP)

Obtaining your SSCP certification signifies that you possess the ability to tackle the operational demands and responsibilities of security practitioners, including authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, cryptography, malicious code countermeasures, and more.

Instructed By

Instructor Profile Image
Pete Cipolone
Cyber Security Analyst and Programmer
Instructor