Network vulnerability assessment identify security loopholes in your network's infrastructure
Build a network security threat model with this comprehensive learning guide Key Features Develop a network security threat model for your organization Gain hands-on experience in working with network scanning and analyzing tools Learn to secure your network infrastructure Book Description The tech...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Birmingham ; Mumbai :
Packt
2018.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630676406719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright and Credits
- Packt Upsell
- Contributors
- Table of Contents
- Preface
- Chapter 1: Vulnerability Management Governance
- Security basics
- The CIA triad
- Confidentiality
- Integrity
- Availability
- Identification
- Authentication
- Authorization
- Auditing
- Accounting
- Non-repudiation
- Vulnerability
- Threats
- Exposure
- Risk
- Safeguards
- Attack vectors
- Understanding the need for security assessments
- Types of security tests
- Security testing
- Vulnerability assessment versus penetration testing
- Security assessment
- Security audit
- Business drivers for vulnerability management
- Regulatory compliance
- Satisfying customer demands
- Response to some fraud/incident
- Gaining a competitive edge
- Safeguarding/protecting critical infrastructures
- Calculating ROIs
- Setting up the context
- Bottom-up
- Top-down
- Policy versus procedure versus standard versus guideline
- Vulnerability assessment policy template
- Penetration testing standards
- Penetration testing lifecycle
- Industry standards
- Open Web Application Security Project testing guide
- Benefits of the framework
- Penetration testing execution standard
- Benefits of the framework
- Summary
- Exercises
- Chapter 2: Setting Up the Assessment Environment
- Setting up a Kali virtual machine
- Basics of Kali Linux
- Environment configuration and setup
- Web server
- Secure Shell (SSH)
- File Transfer Protocol (FTP)
- Software management
- List of tools to be used during assessment
- Summary
- Chapter 3: Security Assessment Prerequisites
- Target scoping and planning
- Gathering requirements
- Preparing a detailed checklist of test requirements
- Suitable time frame and testing hours
- Identifying stakeholders
- Deciding upon the type of vulnerability assessment.
- Types of vulnerability assessment
- Types of vulnerability assessment based on the location
- External vulnerability assessment
- Internal vulnerability assessment
- Based on knowledge about environment/infrastructure
- Black-box testing
- White-box testing
- Gray-box testing
- Announced and unannounced testing
- Automated testing
- Authenticated and unauthenticated scans
- Agentless and agent-based scans
- Manual testing
- Estimating the resources and deliverables
- Preparing a test plan
- Getting approval and signing NDAs
- Confidentiality and nondisclosure agreements
- Summary
- Chapter 4: Information Gathering
- What is information gathering?
- Importance of information gathering
- Passive information gathering
- Reverse IP lookup
- Site report
- Site archive and way-back
- Site metadata
- Looking for vulnerable systems using Shodan
- Advanced information gathering using Maltego
- theHarvester
- Active information gathering
- Active information gathering with SPARTA
- Recon-ng
- Dmitry
- Summary
- Chapter 5: Enumeration and Vulnerability Assessment
- What is enumeration?
- Enumerating services
- HTTP
- FTP
- SMTP
- SMB
- DNS
- SSH
- VNC
- Using Nmap scripts
- http-methods
- smb-os-discovery
- http-sitemap-generator
- mysql-info
- Vulnerability assessments using OpenVAS
- Summary
- Chapter 6: Gaining Network Access
- Gaining remote access
- Direct access
- Target behind router
- Cracking passwords
- Identifying hashes
- Cracking Windows passwords
- Password profiling
- Password cracking with Hydra
- Creating backdoors using Backdoor Factory
- Exploiting remote services using Metasploit
- Exploiting vsftpd
- Exploiting Tomcat
- Hacking embedded devices using RouterSploit
- Social engineering using SET
- Summary
- Chapter 7: Assessing Web Application Security.
- Importance of web application security testing
- Application profiling
- Common web application security testing tools
- Authentication
- Credentials over a secure channel
- Authentication error messages
- Password policy
- Method for submitting credentials
- OWASP mapping
- Authorization
- OWASP mapping
- Session management
- Cookie checks
- Cross-Site Request Forgery
- OWASP mapping
- Input validation
- OWASP mapping
- Security misconfiguration
- OWASP mapping
- Business logic flaws
- Testing for business logic flaws
- Auditing and logging
- OWASP mapping
- Cryptography
- OWASP mapping
- Testing tools
- OWASP ZAP
- Burp Suite
- Summary
- Chapter 8: Privilege Escalation
- What is privilege escalation?
- Horizontal versus vertical privilege escalation
- Horizontal privilege escalation
- Vertical privilege escalation
- Privilege escalation on Windows
- Privilege escalation on Linux
- Summary
- Chapter 9: Maintaining Access and Clearing Tracks
- Maintaining access
- Clearing tracks and trails
- Anti-forensics
- Summary
- Chapter 10: Vulnerability Scoring
- Requirements for vulnerability scoring
- Vulnerability scoring using CVSS
- Base metric group
- Exploitability metrics
- Attack vector
- Attack complexity
- Privileges required
- User interaction
- Scope
- Impact metrics
- Confidentiality impact
- Integrity impact
- Availability impact
- Temporal metric group
- Exploit code maturity
- Remediation level
- Report confidence
- CVSS calculator
- Summary
- Chapter 11: Threat Modeling
- What is threat modeling?
- Benefits of threat modeling
- Threat modeling terminology
- How to model threats?
- Threat modeling techniques
- STRIDE
- DREAD
- Threat modeling tools
- Microsoft Threat Modeling Tool
- SeaSponge
- Summary
- Chapter 12: Patching and Security Hardening
- Defining patching?.
- Patch enumeration
- Windows patch enumeration
- Linux patch enumeration
- Security hardening and secure configuration reviews
- Using CIS benchmarks
- Summary
- Chapter 13: Vulnerability Reporting and Metric s
- Importance of reporting
- Type of reports
- Executive reports
- Detailed technical reports
- Reporting tools
- Dradis
- KeepNote
- Collaborative vulnerability management with Faraday v2.6
- Metrics
- Mean time to detect
- Mean time to resolve
- Scanner coverage
- Scan frequency by asset group
- Number of open critical/high vulnerabilities
- Average risk by BU, asset group, and so on
- Number of exceptions granted
- Vulnerability reopen rate
- Percentage of systems with no open high/critical vulnerability
- Vulnerability ageing
- Summary
- Other Books You May Enjoy
- Index.