Top Banner
Information Security Education for Vietnamese Officers 2015.08.14. Michał Rzepka Network & OS security
22

05-Defense Vulnerability Scanning Practice

Dec 13, 2015

Download

Documents

05-Defense Vulnerability Scanning Practice
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 05-Defense Vulnerability Scanning Practice

Information Security Education for Vietnamese Officers

2015.08.14. Michał Rzepka

Network & OS security

Page 2: 05-Defense Vulnerability Scanning Practice

2 2

Hacking Lab challenges

3 Page Before we start… Ⅰ

6 Page Defensive measures Ⅱ

15 Page Ⅲ

19 Page Exercise session Ⅳ

21 Page Summary Ⅴ

Page 3: 05-Defense Vulnerability Scanning Practice

3 3

Hacking Lab challenges

Before we start… Ⅰ

Defensive measures Ⅱ

Exercise session Ⅳ

Summary Ⅴ

Page 4: 05-Defense Vulnerability Scanning Practice

4 4

Page 5: 05-Defense Vulnerability Scanning Practice

5 5

Page 6: 05-Defense Vulnerability Scanning Practice

6 6

Hacking Lab challenges

Before we start… Ⅰ

Defensive measures Ⅱ

Exercise session Ⅳ

Summary Ⅴ

Page 7: 05-Defense Vulnerability Scanning Practice

7 7

Real attack 1.  Reconnaissance / Information Gathering 2.  Enumeration 3.  Exploitation 4.  Maintaining access (persistance) / cleaning up

Security assessment / legal pentesting 1.  Reconnaissance / Information Gathering 2.  Enumeration 3.  Vulnerability assessment / Exploitation 4.  Documentation (report)

Page 8: 05-Defense Vulnerability Scanning Practice

8 8

• Persistence (maintaining access) / clean-up are beyond of the scope of this course

• But, briefly, it is all about going under radar

Page 9: 05-Defense Vulnerability Scanning Practice

9 9

• The last phase of a pentest / security assessment is documentation

• What is expected from the report? • Report should be comprehensive

– Why the test was conducted? What was the goal? – Exact timeline? Exact components included in the scope? – Test limitations (list all the problems – e.g. no access provided,

missing credentials, feature not implemented, XYZ system went down etc.)

• Who is the report’s audience? – Management or tech, or both?

Page 10: 05-Defense Vulnerability Scanning Practice

10 10

• Findings should be descriptive enough – What is the problem? – How it can be exploited/abused?

• What is the real risk? – Keep the environment-specific things in mind

• What’s the “business impact”? • Findings should be possible to be reproduced • Recommendations should be reasonable • Keep in mind that you are writing the report to help someone fix the issues!

Page 11: 05-Defense Vulnerability Scanning Practice

11 11

Page 12: 05-Defense Vulnerability Scanning Practice

12 12

Page 13: 05-Defense Vulnerability Scanning Practice

13 13

https://www.nsa.gov/ia/_files/support/defenseindepth.pdf

Page 14: 05-Defense Vulnerability Scanning Practice

14 14

https://www.cloudcracker.com/blog/2012/07/29/cracking-ms-chap-v2/

Page 15: 05-Defense Vulnerability Scanning Practice

15 15

Page 16: 05-Defense Vulnerability Scanning Practice

16 16

Hacking Lab challenges

Before we start… Ⅰ

Defensive measures Ⅱ

Exercise session Ⅳ

Summary Ⅴ

Page 17: 05-Defense Vulnerability Scanning Practice

17 17

hacker/compass and

Page 18: 05-Defense Vulnerability Scanning Practice

18 18

Hacking Lab challenges

Before we start… Ⅰ

Defensive measures Ⅱ

Exercise session Ⅳ

Summary Ⅴ

Page 19: 05-Defense Vulnerability Scanning Practice

19 19

Page 20: 05-Defense Vulnerability Scanning Practice

20 20

Hacking Lab challenges

Before we start… Ⅰ

Defensive measures Ⅱ

Exercise session Ⅳ

Summary Ⅴ

Page 21: 05-Defense Vulnerability Scanning Practice

21 21

Page 22: 05-Defense Vulnerability Scanning Practice

22 22