SlideShare a Scribd company logo
Cyber Security
UNIT - 1
Systems Vulnerability
Scanning Overview
Outline....
• Systems Vulnerability Scanning Overview of vulnerability scanning
• Open Port I Service Identification
• Banner I Version Check
• Traffic Probe
• Vulnerability Probe
• Vulnerability Examples
• OpenVAS
• Metasplolt
Outline....
• Networks Vulnerability Scanning
• Datapipe
• Fplpe
• WlnRelay
• Network Reconnaissance
• Nmap
• THC-Amapand System tools
• Network Sniffers and Injection tools
• T
cpdump and Windump
• Wlreshark
• En ercap
• Hp
l
ng Kismet
SystemsVulnerability
• In cyber security,a vulnerability is a weakness which can be exploited by
a cyber attack to gain unauthor ized access to or perform
unauthorized actions on a computer system.
• Vulnerabilities can allow attackers to run code, access a system's
memory,install malware,and steal,destroy or modify sensitive data.
• To exploit a vulnera bility an attacker must be able to connect to the
computer system. Vulnerabilities can be exploited by a variety of
methods including SQL injection, buffer overflows, cross-site scripting
(XSS) and open source exploit kits that look for known vulnerabilities and
security weaknesses in web applications.
Vulnera bility Definition
• National Institute of Standards and Technology (NIST}: Weakness in
an information system, system security procedures,inter nal controls, or
implementation that could be exploited or triggered by a threat source.
• ISO 27005: A weakness of an asset or group of assets that can be
exploited by one or more cyber threats where an asset is anything that
has va lue to the organiza tion, its business operations and their
continuity, including information resources that support the
organization's mission.
Vulnerability Definition
• IETF RFC 4949: A flaw or weakness in a system's design,
implementat ion, or operation and management that could be
exploited to violate the system's security policy.
•ENISA: The existence of a weakness, design, or implementation
error that can lead to an unexpected,undesirable event compromising
the security of the computer system, network, application, or
protocol involved.
•The Open Group: The probability that threat capability exceeds the
ability to resist the threat.
•Factor Analysis of Information Risk: The probability that an asset will
be unable to resist the actions of a threat agent.
Systems Vulnerability
••
-
·
-
-
·
·
-
I
.
bplolQf N ) ' . W . 1.A
nKiMm1Ydwnl)o
. . . . . . . _ " " _ . , " ' " . . . , 1
1. C WVflf
Cl
¢ U l 5 " "
S
O
<
l
l
l
'
·"- -...-
Common Computer Security Vulnerabilities
Weo1
t passwords
Cross-siteKrlpl na .and forgery Vuln t ri lbll• V
OScommand injKtlon
Downlo of c:odtf Wtthoul lnltRrir checks
Causes and Harms of Computer Security Vulnerabilities
• Computer system vulnerab ilities exist because programmers fail to
fully understand the inner programs. While designing and
programming,programmers don't really take into account all aspects of
computer systems and this, in turn, causes computer system
vulnerability.
• Some programmers program in an unsafe and incorrect way, which
worsen computer system vulnerability.
• The harm of computer system vulnerability can be presented in
several aspects,for example,the disclosure of confidential data, and
widespread of Internet virus and hacker intrusion, which can ca use
great harm to enterprises and individua l users by bringing about
major economic loss.
Causes and Harms of Computer Security Vulnerabilities
• Computer security vulnerability can harm five kinds of system
securities that include: Reliability, confidentiality, entirety, usability, and
undeniableness.
• Reliability: This refers to reducing incorrect false alarm in the
operation of a computer system and enhancing the efficiency of a
computer system.
• Confidentiality: This refers to protecting users' information
from disclosure and getting by unauthorized third party.
• Entirety: This system security requires that information or programs
should not be forged, tampered, deleted or inserted deliberately in the
process of stor ing,operation and communication. In other words,
information or programs cannot be lost or destroyed.
Causes and Harms of Computer Security Vulnerabilities
• Usabil ty: This ensures that users can enjoy the services offered by
computers and information networks.
• Undeniableness: This security refers to guaranteeing information
actors to be responsible for their behavior.
Should knownvulnerabilitiesbe publiclydisclosed?
• Immediate full disclosure: Some cybersecurity experts argue for
immediate disclosure including specific information about how to
exploit the vulnerability. Supporters of immediate disclosure believe it
leads to secure software and faster patching
improving software
security, application security, computer security, operating system
security and information security.
• Limited to no disclosure: While others are against vulnerability
disclosure because they believe the vulnerability will be exploited.
Supporters of limited disclosure believe limiting information to select
groups reduces the risk of exploitation.
What isthe difference betweenVulnerability and Risk?
• Cyber security risks are common ly classified as
vulnerabilities. However, vulnerability and risk are not the same
thing, which can lead to confusion.
• If the impact and probability of a vulnerability being exploit is low,
then there is low risk.
• Inversely, if the impact and probability of a vulnerability being exp loit is
high, then there is a high risk.
What isVulnerability Management?
• Vulnerability management is a cyclical practice of identifying,
classifying, remediating and mitigating security vulnerabilities. The
essential elements of vulnerability management include vulnerability
detection,vulnerability assessment and remediation.
• Methods of vulnerability detection include:
• Vulnerabilty scanning
• Penetration testing
• Google hacking
What isVulnerability Management?
• Once a vulnerability is found, it goes through the vulnerability
assessment process:
• Identify vulnerabilities: Analyzing network scans, pen test results,
firewa ll logs, and vulnerability scan results to find anomalies that
suggest a cyber attack could take advantage of a vulnerability.
• Verify vulnerabilities: Decide whether the identified vulnerability
could be exploited and classify the severity of the exploit to
understand the level of risk
• Mitigate vulnerabilities: Decide on countermeasures and how to
measure their effectiveness in the event that a patch is not available.
• Remediate vulnerabilities: Update affected software
or hardware where possible.
What isVulnerability Scanning?
• A vulnerab ility scanner is software designed to assess computers,
networks or applications for known vulnerabilities.
• Authenticated Scans: Allows the vulnerability scanner to directly
access networked assets using remote administrative protocols
like secure shell (SSH) or remote desktop protocol (RDP) and
authenticate using provided system credentials.
• This gives access to low-level data such as specific services
and configuration details, providing detailed and accurate
information about operating systems, installed software,configuration
issues and missing security patches.
What isVulnerability Scanning?
• Unauthenticated Scans: Result is false positives and unreliable
information about operating systems and installed software.
• This method is generally used by cyber attackers and security ana lysts to
try and determine the security posture of externally facing assets and to
find possible data leaks.
Open Port
• In cybersecur ity, the term open port refers to a TCP or UDP port
number that is configured to accept packets.
• In contrast, a port which rejects connections or ignores all packets, is a
closed port.
• Ports are an integral part of the Internet's communication model. All
communication over the Internet is exchanged via ports.
• Every IP address contains two kinds of ports, UDP and TCP ports,and
there are up to 65,535 of each for any given IP address.
• Services that rely on the Internet (like web browsers, web pages,and file
transfer services) rely on specific ports to receive and transmit
information.
Open Port
• Once a service is running on a certain port, you can't run other
services on it. For example, starting Apache after you've already
started Nginx on port 80 will lead to a failed operation because the
port is already in use.
• Open ports become dangerous when legitimate services are exploited
through security vulnerabilities or malicious services are introduced to
a system via malware or social engineering,cybercriminals can use
these services in conjunction with open ports to ga in unauthorized
access to sensitive data.
• Services that rely on the Internet (like web browsers, web pages,and
file transfer services) rely on specific ports to receive and
transmit information.
Why do attackersscanfor open Ports?
• Attackers use open ports to find potential exploits.To run an exploit,
the attacker needs to find a vulnerability.
• To find a vulnerability, the attacker needs to fingerprint all services
that run on a machine, including what protocols it uses, which
programs implement them, and ideally the versions of those
programs.
• To do this, attackers commonly rely on finding a publicly accessible
port via port scanning.

More Related Content

Similar to 1 (20 files merged).ppt

Metasploit
MetasploitMetasploit
Metasploit
Parth Sahu
 
Ethical hacking
Ethical hacking Ethical hacking
Complete notes security
Complete notes securityComplete notes security
Complete notes security
Kitkat Emoo
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
Er Vivek Rana
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.ppt
miki304759
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
Abu Sadat Mohammed Yasin
 
Chapter 9 system penetration [compatibility mode]
Chapter 9 system penetration [compatibility mode]Chapter 9 system penetration [compatibility mode]
Chapter 9 system penetration [compatibility mode]
Setia Juli Irzal Ismail
 
Software Security (Vulnerabilities) And Physical Security
Software Security (Vulnerabilities) And Physical SecuritySoftware Security (Vulnerabilities) And Physical Security
Software Security (Vulnerabilities) And Physical Security
Nicholas Davis
 
Software security (vulnerabilities) and physical security
Software security (vulnerabilities) and physical securitySoftware security (vulnerabilities) and physical security
Software security (vulnerabilities) and physical security
Nicholas Davis
 
presentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptxpresentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptx
AadityaRauniyar1
 
Intruders in cns. Various intrusion detection and prevention technique.pptx
Intruders in cns. Various intrusion detection and prevention technique.pptxIntruders in cns. Various intrusion detection and prevention technique.pptx
Intruders in cns. Various intrusion detection and prevention technique.pptx
SriK49
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
Kabul Education University
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
Ankur Kumar
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
EduclentMegasoftel
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
Online
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system security
Gary Mendonca
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
rahulkumarcscsf21
 
Metasploit
MetasploitMetasploit
Metasploit
Lalith Sai
 

Similar to 1 (20 files merged).ppt (20)

Metasploit
MetasploitMetasploit
Metasploit
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Complete notes security
Complete notes securityComplete notes security
Complete notes security
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.ppt
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Chapter 9 system penetration [compatibility mode]
Chapter 9 system penetration [compatibility mode]Chapter 9 system penetration [compatibility mode]
Chapter 9 system penetration [compatibility mode]
 
Software Security (Vulnerabilities) And Physical Security
Software Security (Vulnerabilities) And Physical SecuritySoftware Security (Vulnerabilities) And Physical Security
Software Security (Vulnerabilities) And Physical Security
 
Software security (vulnerabilities) and physical security
Software security (vulnerabilities) and physical securitySoftware security (vulnerabilities) and physical security
Software security (vulnerabilities) and physical security
 
presentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptxpresentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptx
 
Intruders in cns. Various intrusion detection and prevention technique.pptx
Intruders in cns. Various intrusion detection and prevention technique.pptxIntruders in cns. Various intrusion detection and prevention technique.pptx
Intruders in cns. Various intrusion detection and prevention technique.pptx
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Network Security
Network SecurityNetwork Security
Network Security
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system security
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
 
Metasploit
MetasploitMetasploit
Metasploit
 

Recently uploaded

ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 

Recently uploaded (20)

ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 

1 (20 files merged).ppt

  • 1. Cyber Security UNIT - 1 Systems Vulnerability Scanning Overview
  • 2. Outline.... • Systems Vulnerability Scanning Overview of vulnerability scanning • Open Port I Service Identification • Banner I Version Check • Traffic Probe • Vulnerability Probe • Vulnerability Examples • OpenVAS • Metasplolt
  • 3. Outline.... • Networks Vulnerability Scanning • Datapipe • Fplpe • WlnRelay • Network Reconnaissance • Nmap • THC-Amapand System tools • Network Sniffers and Injection tools • T cpdump and Windump • Wlreshark • En ercap • Hp l ng Kismet
  • 4. SystemsVulnerability • In cyber security,a vulnerability is a weakness which can be exploited by a cyber attack to gain unauthor ized access to or perform unauthorized actions on a computer system. • Vulnerabilities can allow attackers to run code, access a system's memory,install malware,and steal,destroy or modify sensitive data. • To exploit a vulnera bility an attacker must be able to connect to the computer system. Vulnerabilities can be exploited by a variety of methods including SQL injection, buffer overflows, cross-site scripting (XSS) and open source exploit kits that look for known vulnerabilities and security weaknesses in web applications.
  • 5. Vulnera bility Definition • National Institute of Standards and Technology (NIST}: Weakness in an information system, system security procedures,inter nal controls, or implementation that could be exploited or triggered by a threat source. • ISO 27005: A weakness of an asset or group of assets that can be exploited by one or more cyber threats where an asset is anything that has va lue to the organiza tion, its business operations and their continuity, including information resources that support the organization's mission.
  • 6. Vulnerability Definition • IETF RFC 4949: A flaw or weakness in a system's design, implementat ion, or operation and management that could be exploited to violate the system's security policy. •ENISA: The existence of a weakness, design, or implementation error that can lead to an unexpected,undesirable event compromising the security of the computer system, network, application, or protocol involved. •The Open Group: The probability that threat capability exceeds the ability to resist the threat. •Factor Analysis of Information Risk: The probability that an asset will be unable to resist the actions of a threat agent.
  • 7. Systems Vulnerability •• - · - - · · - I . bplolQf N ) ' . W . 1.A nKiMm1Ydwnl)o . . . . . . . _ " " _ . , " ' " . . . , 1 1. C WVflf Cl ¢ U l 5 " " S O < l l l ' ·"- -...-
  • 8. Common Computer Security Vulnerabilities Weo1 t passwords Cross-siteKrlpl na .and forgery Vuln t ri lbll• V OScommand injKtlon Downlo of c:odtf Wtthoul lnltRrir checks
  • 9. Causes and Harms of Computer Security Vulnerabilities • Computer system vulnerab ilities exist because programmers fail to fully understand the inner programs. While designing and programming,programmers don't really take into account all aspects of computer systems and this, in turn, causes computer system vulnerability. • Some programmers program in an unsafe and incorrect way, which worsen computer system vulnerability. • The harm of computer system vulnerability can be presented in several aspects,for example,the disclosure of confidential data, and widespread of Internet virus and hacker intrusion, which can ca use great harm to enterprises and individua l users by bringing about major economic loss.
  • 10. Causes and Harms of Computer Security Vulnerabilities • Computer security vulnerability can harm five kinds of system securities that include: Reliability, confidentiality, entirety, usability, and undeniableness. • Reliability: This refers to reducing incorrect false alarm in the operation of a computer system and enhancing the efficiency of a computer system. • Confidentiality: This refers to protecting users' information from disclosure and getting by unauthorized third party. • Entirety: This system security requires that information or programs should not be forged, tampered, deleted or inserted deliberately in the process of stor ing,operation and communication. In other words, information or programs cannot be lost or destroyed.
  • 11. Causes and Harms of Computer Security Vulnerabilities • Usabil ty: This ensures that users can enjoy the services offered by computers and information networks. • Undeniableness: This security refers to guaranteeing information actors to be responsible for their behavior.
  • 12. Should knownvulnerabilitiesbe publiclydisclosed? • Immediate full disclosure: Some cybersecurity experts argue for immediate disclosure including specific information about how to exploit the vulnerability. Supporters of immediate disclosure believe it leads to secure software and faster patching improving software security, application security, computer security, operating system security and information security. • Limited to no disclosure: While others are against vulnerability disclosure because they believe the vulnerability will be exploited. Supporters of limited disclosure believe limiting information to select groups reduces the risk of exploitation.
  • 13. What isthe difference betweenVulnerability and Risk? • Cyber security risks are common ly classified as vulnerabilities. However, vulnerability and risk are not the same thing, which can lead to confusion. • If the impact and probability of a vulnerability being exploit is low, then there is low risk. • Inversely, if the impact and probability of a vulnerability being exp loit is high, then there is a high risk.
  • 14. What isVulnerability Management? • Vulnerability management is a cyclical practice of identifying, classifying, remediating and mitigating security vulnerabilities. The essential elements of vulnerability management include vulnerability detection,vulnerability assessment and remediation. • Methods of vulnerability detection include: • Vulnerabilty scanning • Penetration testing • Google hacking
  • 15. What isVulnerability Management? • Once a vulnerability is found, it goes through the vulnerability assessment process: • Identify vulnerabilities: Analyzing network scans, pen test results, firewa ll logs, and vulnerability scan results to find anomalies that suggest a cyber attack could take advantage of a vulnerability. • Verify vulnerabilities: Decide whether the identified vulnerability could be exploited and classify the severity of the exploit to understand the level of risk • Mitigate vulnerabilities: Decide on countermeasures and how to measure their effectiveness in the event that a patch is not available. • Remediate vulnerabilities: Update affected software or hardware where possible.
  • 16. What isVulnerability Scanning? • A vulnerab ility scanner is software designed to assess computers, networks or applications for known vulnerabilities. • Authenticated Scans: Allows the vulnerability scanner to directly access networked assets using remote administrative protocols like secure shell (SSH) or remote desktop protocol (RDP) and authenticate using provided system credentials. • This gives access to low-level data such as specific services and configuration details, providing detailed and accurate information about operating systems, installed software,configuration issues and missing security patches.
  • 17. What isVulnerability Scanning? • Unauthenticated Scans: Result is false positives and unreliable information about operating systems and installed software. • This method is generally used by cyber attackers and security ana lysts to try and determine the security posture of externally facing assets and to find possible data leaks.
  • 18. Open Port • In cybersecur ity, the term open port refers to a TCP or UDP port number that is configured to accept packets. • In contrast, a port which rejects connections or ignores all packets, is a closed port. • Ports are an integral part of the Internet's communication model. All communication over the Internet is exchanged via ports. • Every IP address contains two kinds of ports, UDP and TCP ports,and there are up to 65,535 of each for any given IP address. • Services that rely on the Internet (like web browsers, web pages,and file transfer services) rely on specific ports to receive and transmit information.
  • 19. Open Port • Once a service is running on a certain port, you can't run other services on it. For example, starting Apache after you've already started Nginx on port 80 will lead to a failed operation because the port is already in use. • Open ports become dangerous when legitimate services are exploited through security vulnerabilities or malicious services are introduced to a system via malware or social engineering,cybercriminals can use these services in conjunction with open ports to ga in unauthorized access to sensitive data. • Services that rely on the Internet (like web browsers, web pages,and file transfer services) rely on specific ports to receive and transmit information.
  • 20. Why do attackersscanfor open Ports? • Attackers use open ports to find potential exploits.To run an exploit, the attacker needs to find a vulnerability. • To find a vulnerability, the attacker needs to fingerprint all services that run on a machine, including what protocols it uses, which programs implement them, and ideally the versions of those programs. • To do this, attackers commonly rely on finding a publicly accessible port via port scanning.