DOC PREVIEW
USC CSCI 530 - VulnAsses_fa06

This preview shows page 1-2-3 out of 8 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

CSCI 530LVulnerability AssessmentPenetration TestingNetwork-wide vulnerability assessmentSingle-system vulnerability assessmentNessusNessus ComponentsHow we are going to use NessusCSCI 530LVulnerability AssessmentVulnerability AssessmentProcess of identifying vulnerabilities that exist in a computer systemHas many similarities to risk assessmentFour main stepsCataloging assets and capabilities (resources) in a system Assigning quantifiable value and importance to the resources Identifying the vulnerabilities or potential threats to each resource Mitigating or eliminating the most serious vulnerabilities for the most valuable resourcesPenetration TestingMethod of evaluating the security of a system by simulating a hacker attackPenetration Test and Vulnerability Assessment are differentIn a vulnerability assessment, we identify the weaknesses, but do not exploit themTools for a penetration testMetasploitExploit TreeNetwork-wide vulnerability assessmentIdentify all the resources in the networkAssign a criticality ratingFor example, a rating between 1 and 10 with 10 having a high criticality (such as a Domain Controller), and a 1 having a low criticality (a rarely used workstation)Identify the threats to the resourcesStart with the most critical resources and work your way down to the least critical systemsStart eliminating threats to the systemsPatching, closing ports, removing services, uninstalling programs, etc.Start with the most critical systems and work your way downwardsSingle-system vulnerability assessmentTwo different approachesAttempt to figure out all the vulnerabilities yourselfVery difficult to do effectively unless you have complete knowledge of that particular operating systemUse a combination of common hacking tools and hacking techniquesIf you are a good hacker and know a lot about operating systems, this method will potentially bring out more vulnerabilities of the systemUse a vulnerability scannerEasier to use a tool to get a report of a particular systemSubject to false positivesMust be used by an expert in security, because otherwise the report generated is uselessNessusThe open-source vulnerability assessment toolMost security experts consider it more powerful than even commercial softwareUses plug-ins for vulnerability assessmentHas up to date vulnerability exploits to scanHas a scripting language called Nessus Attack Scripting Language (NASL), so if you find a vulnerability, you can write a script for Nessus to scan for that particular vulnerabilityCan scan secure protocols, like SSLCan scan multiple computers, generating one report for all systems on a networkMature – its been around since 1998Nessus ComponentsServerNessusdUsed to be linux only, but the company recently released Nessus version 3, which has a Windows server versionListens on ports for nessus clients to connect to itClientNessusWindows and Linux versionsConnects to the Server for certificates and plug-insScans are run BY THE SERVER, the client configures how the scans are to be runHow we are going to use NessusBacktrackLinux live CDBoots linux off of the CD and loads the tools into RAMSpecialized for vulnerability assessment and penetration testingNessus is already configured for us on BacktrackLoad up the CD, load the nessus daemon, and start scanning


View Full Document

USC CSCI 530 - VulnAsses_fa06

Download VulnAsses_fa06
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view VulnAsses_fa06 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view VulnAsses_fa06 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?