Introduction to Laboratory Assignment 3 Vulnerability scanning with OpenVAS



Similar documents
Penetration Testing with Kali Linux

Penetration Testing Workshop

1 Scope of Assessment

CIT 480: Securing Computer Systems. Vulnerability Scanning and Exploitation Frameworks

Computer Security (EDA263 / DIT 641)

eeye Digital Security Product Training

8 Steps for Network Security Protection

8 Steps For Network Security Protection

Vulnerability Assessment. A. Open Vulnerability Assessment (OpenVAS)

Vulnerability Assessment Lab

Vulnerability Scanning & Management

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

4. Getting started: Performing an audit

NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Introduction to Network Discovery and Identity

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

Cyber Security RFP Template

EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER

Vulnerability Scan. January 6, 2015

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Information Security Organizations trends are becoming increasingly reliant upon information technology in

Minimizing Risk Through Vulnerability Management. Presentation for Rochester Security Summit 2015 Security Governance Track October 7, 2015

Cisco Security Optimization Service

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

Tenable for CyberArk

Cisco Advanced Services for Network Security

Vulnerability Assessment Report Format Data Model

Managing Qualys Scanners

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address :

BackTrack 5 tutorial Part I: Information gathering and VA tools

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Vulnerability Assessment and Penetration Testing

How to scan/exploit a ssl based webserver. by xxradar. mailto:xxradar@radarhack.com. Version 1.

About Effective Penetration Testing Methodology

Patch and Vulnerability Management Program

Trend Micro Worry- Free Business Security st time setup Tips & Tricks

Performing a Web Application Security Assessment

CIT 380: Securing Computer Systems

Vulnerability analysis

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

Joomla Security Report

SAST, DAST and Vulnerability Assessments, = 4

OCCS Procedure. Vulnerability Scanning and Management Procedure Reference Number: Last updated: September 6, 2011

Introduction Open Source Security Tools for Information Technology Professionals

PENTEST. Pentest Services. VoIP & Web.

Information Security Attack Tree Modeling for Enhancing Student Learning

June 2014 WMLUG Meeting Kali Linux

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT

IBM. Vulnerability scanning and best practices

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Course Title: Penetration Testing: Network & Perimeter Testing

IBM Security QRadar Risk Manager

Cyber Essentials. Test Specification

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

The Nexpose Expert System

ESISS Security Scanner

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Vulnerability Management

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Vulnerability management with OpenVAS

Penetration Testing Report Client: Business Solutions June 15 th 2015

Continuous Penetration Testing

How To Use Qqsguard At The University Of Minneapolis

NETWORK PENETRATION TESTING

CDM Hardware Asset Management (HWAM) Capability

Automating Security Testing. Mark Fallon Senior Release Manager Oracle

Software Vulnerability Assessment

Divide and Conquer Real World Distributed Port Scanning

Secret Server Qualys Integration Guide

Open Source Security Tools for Information Technology Professionals

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

CTS2134 Introduction to Networking. Module Network Security

GETTING STARTED WITH THE ISCAN ONLINE DATA BREACH PREVENTION LIFECYCLE

IBM Managed Security Services Vulnerability Scanning:

Obtaining Enterprise Cybersituational

AHS Vulnerability Scanning Standard

Nessus Agents. October 2015

AN OVERVIEW OF VULNERABILITY SCANNERS

Certification Report

Automated Vulnerability Scan Results

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

ManageEngine Desktop Central Training

IBM Security QRadar Risk Manager

Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study

Qualys Scanning for PCI Devices University of Minnesota


Information Security Office

Transcription:

Introduction to Laboratory Assignment 3 Vulnerability scanning with OpenVAS Computer Security Course EDA263 / DIT641 Chalmers University of Technology February 12 th, 2015

Vulnerability assessment?

Overview 1 What is Vulnerability assessment? 2 Lab 3 - Vulnerability scanning with OpenVAS 3 Formal Report tips

Vulnerability assessment (identification) Vulnerability A weakness in an asset or a group of assets that can be exploited by one or more threats. The goal of vulnerability assessment is to obtain a (prioritized) list of vulnerabilities with brief description of how and why they might occur.

Vulnerability assessment (identification) Vulnerability A weakness in an asset or a group of assets that can be exploited by one or more threats. The goal of vulnerability assessment is to obtain a (prioritized) list of vulnerabilities with brief description of how and why they might occur. What is vulnerability scanning? Vulnerability scanning is an automated process whose goal is to identify security vulnerabilities of computer systems in a network.

Vulnerability assessment (identification) Vulnerability A weakness in an asset or a group of assets that can be exploited by one or more threats. The goal of vulnerability assessment is to obtain a (prioritized) list of vulnerabilities with brief description of how and why they might occur. What is vulnerability scanning? Vulnerability scanning is an automated process whose goal is to identify security vulnerabilities of computer systems in a network. How is it performed? Automated tools - Vulnerability scanners - software used to assess computer systems for weaknesses using a database of known vulnerabilities.

Vulnerability assessment Performed in a number of steps 1 Know your tools and the system you are testing 2 Port scanning 3 Service fingerprinting 4 Vulnerability scanning 5 Assessment and recommendations 6 Assessment follow-up

Vulnerability assessment Performed in a number of steps 1 Know your tools and the system you are testing get familiar with the vulnerability scanner used obtain information about the system (system configuration, network topology, etc.) 2 Port scanning 3 Service fingerprinting 4 Vulnerability scanning 5 Assessment and recommendations 6 Assessment follow-up

Vulnerability assessment Performed in a number of steps 1 Know your tools and the system you are testing 2 Port scanning obtain a list of open ports (open port listening service) find information about the open ports - what services are you expecting to find there? (http(80), SSH(22)) 3 Service fingerprinting 4 Vulnerability scanning 5 Assessment and recommendations 6 Assessment follow-up

Vulnerability assessment Performed in a number of steps 1 Know your tools and the system you are testing 2 Port scanning 3 Service fingerprinting find more about each service behind each open port (version) is it the expected one? (compare results with Step 2) 4 Vulnerability scanning 5 Assessment and recommendations 6 Assessment follow-up

Vulnerability assessment Performed in a number of steps 1 Know your tools and the system you are testing 2 Port scanning 3 Service fingerprinting 4 Vulnerability scanning scan the discovered services for potential vulnerabilities 5 Assessment and recommendations 6 Assessment follow-up

Vulnerability assessment Performed in a number of steps 1 Know your tools and the system you are testing 2 Port scanning 3 Service fingerprinting 4 Vulnerability scanning 5 Assessment and recommendations use the vulnerability scan report generated by your tool to make recommendations about improving the security status of the system/systems tested 6 Assessment follow-up

Vulnerability assessment Performed in a number of steps 1 Know your tools and the system you are testing 2 Port scanning 3 Service fingerprinting 4 Vulnerability scanning 5 Assessment and recommendations 6 Assessment follow-up propose a strategy for keeping the system secure propose a list of actions that should be done regularly to keep the system secure the report will help the system owner to reproduce your findings and take the appropriate actions

Vulnerability assessment Performed in a number of steps 1 Know your tools and the system you are testing 2 Port scanning 3 Service fingerprinting 4 Vulnerability scanning 5 Assessment and recommendations 6 Assessment follow-up

Lab 3 - Vulnerability scanning with OpenVAS During CW 4 6 theoden.ce.chalmers.se can be accessed from every computer in the Chalmers domain Remote access using SSH is possible for this assignment outside the lab session hours. (More Info in PingPong - pingpong.chalmers.se)

The target network

Tips regarding the formal report don t present only the results, but also the steps you took to obtain them this will help in reproducing your results

Tips regarding the formal report don t present only the results, but also the steps you took to obtain them this will help in reproducing your results if you find too many vulnerabilities focus on the most important ones and motivate your choice

Tips regarding the formal report don t present only the results, but also the steps you took to obtain them this will help in reproducing your results if you find too many vulnerabilities focus on the most important ones and motivate your choice follow the tips from the templates and LabPM

Tips regarding the formal report don t present only the results, but also the steps you took to obtain them this will help in reproducing your results if you find too many vulnerabilities focus on the most important ones and motivate your choice follow the tips from the templates and LabPM use the structure of the template to report your findings

Tips regarding the formal report don t present only the results, but also the steps you took to obtain them this will help in reproducing your results if you find too many vulnerabilities focus on the most important ones and motivate your choice follow the tips from the templates and LabPM use the structure of the template to report your findings don t forget to properly reference the sources used

Tips regarding the formal report don t present only the results, but also the steps you took to obtain them this will help in reproducing your results if you find too many vulnerabilities focus on the most important ones and motivate your choice follow the tips from the templates and LabPM use the structure of the template to report your findings don t forget to properly reference the sources used your report will help the network owners in improving the security of their system