vulnerability analysis. chapter 8: identifying and analyzing threats, vulnerabilities, and exploits

48
Vulnerability Analysis

Upload: georgina-west

Post on 22-Dec-2015

227 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

Vulnerability Analysis

Page 2: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

Chapter 8: Identifying and Analyzing Threats,

Vulnerabilities, and Exploits

Page 3: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

Identifying and Analyzing Threats, Vulnerabilities, and Exploits

Page 4: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

Review an organization’s historical data to identify past incidents from threats.

Identifying and Analyzing Threats, Vulnerabilities, and Exploits

Page 5: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

5

Vulnerability Analysis

Nov 5, 2009 10:48 PM 

               

Vulnerability analysis, sometimes called vulnerability scanning, is the act of determining which security holes and vulnerabilities may be applicable to the target network.

In order to do this, we examine identified machines within the target network to identify all open ports and the operating systems and applications the hosts are running (including version number, patch level, and service pack).

In addition, we compare this information with several Internet vulnerability databases to ascertain what current vulnerabilities and exploits may be applicable to the target network.

Page 6: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

6

Host-Based Vulnerability Analysis Tools

Host-Based Vulnerability Analysis Tools

Also called Policy Checkers, These tools tell the Security Administrator whether the settings on the computer are consistent with your Security Policies.

These tools check:actual password policy usagesystems services availableunused accountsauditing logssimilar security-related functions.

Page 7: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

7

Host-Based Vulnerability Analysis Tools

This category of tools effectively locks down critical systems

They perform security checks such as password checking, policy verification,

file share status

They check configuration of services, such as HTTP, FTP, NFS, looking for

incorrect trust relationships

Page 8: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

8

Host-Based Vulnerability Analysis Tools

These programs can locate sniffers and backdoor programs on your systems

They can detect risky user behavior, such as:

Weak passwords

Remote control applications

Modems (which may not be authorized)

Sharing of hard drive/file sharing

Page 9: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

9

NMAP

Page 10: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

10

Nmap

Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing.

It was designed to rapidly scan large networks, although it works fine against single hosts.

Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.

Port Scanning is used to determine what ports (or similar protocol abstraction) of a host are listening for connections. These ports represent potential communication channels.

Mapping their existence facilitates the exchange of information with the host, and thus it is quite useful for anyone wishing to explore their networked environment, including hackers.

Page 11: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

11

Nmap

A typical Nmap scan is shown. The only Nmap arguments used in this example are -A, to enable OS and version detection, -T4 for faster execution, and then the two target hostnames.

Page 12: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

12

Nmap Features

Flexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles.

This includes many port scanning mechanisms (both TCP & UDP) OS detection version detection ping sweeps

Powerful: Nmap has been used to scan huge networks of literally hundreds of thousands of machines

Portable: Most operating systems are supported, including Linux, Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more.

Page 13: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

13

Port Scanning

• Learning remote OS versions can be an extremely valuable network reconnaissance tool, since many security holes are dependent on OS version.

• For instance, if you do a penetration test and find port 53 open. You could check to see if they are running a vulnerable version of bind.

• Nmap’s most fundamental feature is port scanning.

Point Nmap at a remote machine, and it might tell you that ports 25/tcp, 80/tcp, and 53/udp are open. Using its nmap-services database of more than 2,200 well-known services, Nmap would report that those ports probably correspond to a mail server (SMTP), web server (HTTP), and name server (DNS) respectively.

Page 14: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

14

US President George W. Bush visited the NSA headquarters at Fort Meade in January 2006. A wall-sized status screen in the background displays the latest versions of Nmap. Pictures were printed in the February 6, 2006 edition of Newsweek (article) and the Jan 27 Washington Post (article). And giant screen in the background displays the latest versions of open source tools, including Nmap, Snort, Ethereal, Kismet, and Metasploit.

http://www.insecure.org/nmap/images/wash-post-nsa.jpg

Nmap in the News

Page 15: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

15

Microsoft Baseline Security Analyzer

Page 16: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

16

Microsoft Baseline Security Analyzer

Microsoft Baseline Security Analyzer (MBSA) is a software tool released by Microsoft to determine security state by assessing missing security updates and less-secure security settings within Microsoft Windows, Windows components such as Internet Explorer, IIS web server, and products Microsoft SQL Server, and Microsoft Office macro settings.

Security updates are determined by the current version of MBSA using the Windows Update Agent present on Windows computers since Windows 2000 Service Pack 3.

The less-secure settings, often called Vulnerability Assessment (VA) checks, are assessed based on a hard-coded set of registry and file checks.

MBSA 2.3 is the latest version of Microsoft’s free security and vulnerability assessment scan tool for administrators, security auditors, and IT professionals.

Page 17: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

17

Microsoft Baseline Security Analyzer

In November 2013 MBSA 2.3 was released. This release adds support for Windows 8, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2.

How To: Use the Microsoft Baseline Security Analyzer

https://msdn.microsoft.com/en-us/library/ff647642.aspx

https://www.microsoft.com/en-us/download/details.aspx?id=7558

Page 18: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

18

GFI LANguard™

Page 19: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

19

GFI LANguard

GFI LANguard™ is the award-winning network and security scanner used by over 20,000 customers. GFI LANguard scans your network and ports to detect, assess and correct security vulnerabilities with minimal administrative effort.

As an administrator, you have to deal separately with problems related to vulnerability issues, patch management and network auditing, at times using multiple products. However, with GFI LANguard these three cornerstones of vulnerability management are addressed in one package. We give you a complete picture of your network set-up and help you to maintain a secure network state faster and more effectively

Page 20: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

GFI LANguard scans your network and ports to detect, assess and correct security vulnerabilities with minimal administrative effort.

As an administrator, you have to deal separately with problems related to vulnerability issues, patch management and network auditing, at times using multiple products.

With GFI LANguard these three cornerstones of vulnerability management are addressed in one package.

GFI LANguard gives you a complete picture of your network set-up and help you to maintain a secure network state faster and more effectively.

GFI LANguard

http://www.gfi.com/

Page 21: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

Vulnerability Management

GFI LANguard performs network scans using vulnerability check databases based on OVAL and SANS Top 20, providing over 15,000 vulnerability assessments when your network, including any virtual environment, is scanned.

GFI LANguard allows you to analyze the state of your network security and take action before it is compromised.

The latest version detects machines that are vulnerable to infection by the Conficker worm as well as identifying machines that have been infected.

GFI LANguard

Page 22: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

Patch Management

When a network scan is complete, GFI LANguard’s Patch Management gives you what you need to effectively deploy and manage patches on all machines across different Microsoft operating systems and products in 38 languages.

Not only can you automatically download missing Microsoft security updates, but you can also automatically deploy the missing Microsoft patches or service-packs throughout your network at the end of scheduled scans.

GFI LANguard

Page 23: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

Network AuditingGFI LANguard’s Network Auditing tells you all you need to know about your network by retrieving hardware information on memory, processors, display adapters, storage devices, motherboard details, printers, and ports in use.

Using baseline comparisons you can check whether any hardware was added or removed since the last scan.

GFI LANguard will identify and report unauthorized software installations and provide alerts or even automatically uninstall unauthorized applications.

GFI LANguard

Page 24: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits
Page 25: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits
Page 26: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits
Page 27: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits
Page 28: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits
Page 29: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits
Page 30: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits
Page 31: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

31

OpenVAS

Page 32: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

32

OpenVAS

OpenVAS is a vulnerability scanner that was forked from the last free version of Nessus after Nessus went proprietary in 2005. It continues to grow, with more than 23,000 tests as of November 2011. OpenVAS plugins are written in the same NASL language used by Nessus. http://sectools.org/tag/new/

OpenVAS (Open Vulnerability Assessment System[1], initially GNessUs) is a framework of several services and tools offering a vulnerability scanning and vulnerability management solution.

The actual security scanner is accompanied with a daily updated feed of Network Vulnerability Tests (NVTs), over 20,000 in total (as of January 2011).

All OpenVAS products are Free Software. Most components are licensed under the GPL.

The latest version is 4.0.0, released March 2011

Page 33: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

33

OpenVAS

Page 34: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

34

Nessus®

Page 35: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

35

NessusThe Nessus® vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. (Vendor quote)

Nessus scanners can be distributed throughout an entire enterprise, inside DMZs and across physically separate networks.

Nessus is supported by a world renowned research team and has the largest vulnerability knowledge base, making it suitable for even the most complex environments.

Page 36: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

36

NessusNessus is one of the most popular and capable vulnerability scanners, particularly for UNIX systems. It was initially free and open source, but they closed the source code in 2005 and removed the free "Registered Feed" version in 2008. It now costs $1,200 per year, which still beats many of its competitors. A free “Home Feed” is also available, though it is limited and only licensed for home network use.

Nessus is constantly updated, with more than 46,000 plugins. Key features include remote and local (authenticated) security checks, a client/server architecture with a web-based interface, and an embedded scripting language for writing your own plugins or understanding the existing ones. The open-source version of Nessus was forked by a group of users who still develop it under the OpenVAS name.

http://sectools.org/tag/vuln-scanners/

Page 37: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

37

NessusNessus Licensing

Commercial organizations that use the Nessus vulnerability scanner must purchase a ProfessionalFeed subscription to scan their network, obtain support, updates to their database of vulnerability checks and compliance auditing.

Each ProfessionalFeed costs $1,200 per year per Nessus scanner and can be purchased from Tenable's ProfessionalFeed Partners or directly from Tenable's E-commerce site.

Nessus Home Page: http://www.nessus.org/

Page 38: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

38

NessusTenable offers a hardened, web-based appliance for easy deployment and operation of Nessus.

The appliance is available to all Professional Feed subscribers as a VMware virtual image and also available on a variety of hardware appliances.

Run the demo below.

http://cgi.tenablesecurity.com/demos/NessusIntroduction/NessusIntroduction.html

Page 39: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

39

SecTools.Org: Top 125 Network Security Tools

For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form. This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the Nmap Security Scanner, Ncat network connector, and Nping packet manipulator).

We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. Click any tool name for more details on that particular application, including the chance to read (and write) reviews. Many site elements are explained by tool tips if you hover your mouse over them. Enjoy!

http://sectools.org/vuln-scanners.html

http://sectools.org/ Show link to class

Security Vulnerability Tool Survey

Page 40: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

40

Web Application Vulnerability Scanners

Page 41: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

41

Web Application Vulnerability Scanners

Web Application Vulnerability Scanners are tools designed to automatically scan web applications for potential vulnerabilities.

These tools differ from general vulnerability assessment tools in that they do not perform a broad range of checks on a myriad of software and hardware.

Instead, they perform other checks, such as potential field manipulation and cookie poisoning, which allows a more focused assessment of web applications by exposing vulnerabilities of which standard VA tools are unaware.

Page 42: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

42

Web Application Vulnerability Scanners

Commercial tools Acunetix WVS by Acunetix AppScan DE by IBM/Watchfire, Inc. Hailstorm by Cenzic N-Stealth by N-Stalker NTOSpider by NTObjectives WebInspect by HP/SPI-Dynamics WebKing by Parasoft elanize's Security Scanner by Elanize KG MileScan Web Security Auditor by MileSCAN Tech

Free/OpenSource Tools Grabber by Romain Gaucher Grendel-Scan by David Byrne and Eric Duprey Nikto by Sullo Pantera by Simon Roses Femerling (OWASP Project) Paros by Chinotec Spike Proxy by Immunity (Now as OWASP Pantera) WebScarab by Rogan Dawes of Aspect Security (OWASP Project) Wapiti by Nicolas Surribas W3AF by Andres Riancho

Page 43: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

43

Acunetix

Page 44: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

44

Acunetix Web Vulnerability Scanner : Commercial Web Vulnerability Scanner

Acunetix WVS automatically checks your web applications for vulnerabilities such as SQL Injection, cross site scripting, and weak password strength on authentication pages. Acunetix WVS boasts a comfortable GUI and an ability to create professional website security audit reports.

insecure.org evaluation: http://sectools.org/web-scanners.html

Home page: http://www.acunetix.com/

Acunetix

Page 45: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

45

Automatically detects SQL injection, cross site scripting and other web vulnerabilities

SQL injection is a hacking technique which modifies SQL commands in order to gain access to data in the database. Cross site scripting attacks allow a hacker to execute a malicious script on your visitor´s browser. Acunetix Web Vulnerability Scanner can check if your web application is vulnerable to both of these attacks. More information about SQL injection and cross site scripting at our web site security centre.

Other detected web vulnerabilities

CRLF injection attacks

Code execution attacks

Directory traversal attacks

File inclusion attacks

Authentication attacks

Acunetix

Page 46: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

46

Acunetix

Page 47: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

47

AcunetixIn depth checking for SQL Injection, Cross Site Scripting (XSS) and Other Vulnerabilities

Acunetix checks for all web vulnerabilities including SQL injection, Cross site scripting and others.

SQL injection is a hacking technique which modifies SQL commands in order to gain access to data in the database.

Cross site scripting attacks allow a hacker to execute a malicious script on your visitor’s browser.

Detection of these vulnerabilities requires a sophisticated detection engine. Paramount to web vulnerability scanning is not the number of attacks that a scanner can detect, but the complexity and thoroughness with the scanner launches SQL injection, Cross Site scripting and other attacks. Acunetix has a state of the art vulnerability detection engine which quickly finds vulnerabilities with a low number of false positives.

Page 48: Vulnerability Analysis. Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits

48

Detects Google hacking vulnerabilities

Google hacking is the term used for a hacker trying to find exploitable targets and sensitive data by entering queries in search engines.

The Google Hacking Database (GHDB) contains queries that identify sensitive data such as portal logon pages, logs with network security information, and so on.

Acunetix

Acunetix launches all the Google hacking database queries onto the crawled content of your web site, to find any sensitive data or exploitable targets before a “search engine hacker” does. The Google hacking feature is a unique, industry first feature.