Vulnerability Scans - SY0-601 CompTIA Security+ : 1.7

00:14:51
https://www.youtube.com/watch?v=j9BdMP8Buq8

Summary

TLDRO vídeo explora a importancia das exploracións de vulnerabilidades na seguridade informática, explicando como funcionan e a súa diferenza con probas de penetración. Detalla os tipos de escáneres de vulnerabilidades, como os escáneres de portas, e a importancia de realizar escáneres tanto desde a perspectiva externa como interna. O vídeo tamén menciona a necesidade de permisos para realizar escáneres e os riscos asociados, como a posibilidade de que un escáner poida causar fallos no sistema. Presenta exemplos de vulnerabilidades críticas e a importancia de investigar e priorizar as vulnerabilidades detectadas, así como a utilidade de bases de datos como a NVD para obter información sobre vulnerabilidades e a súa gravidade.

Takeaways

  • 🔍 As exploracións de vulnerabilidades son fundamentais para identificar riscos.
  • 🛡️ A diferenza entre escáneres de vulnerabilidades e probas de penetración é crucial.
  • 🌐 Realizar escáneres desde diferentes perspectivas é importante.
  • ⚠️ Os escáneres deben ser executados con permiso para evitar problemas.
  • 📊 Priorizar vulnerabilidades é esencial para a xestión de riscos.
  • 📅 Mantén os escáneres actualizados para detectar novas vulnerabilidades.
  • 📚 Usa recursos como a NVD para investigar vulnerabilidades.
  • 🔑 Os escáneres con credenciais ofrecen unha análise máis profunda.
  • 🚫 Falsos positivos e negativos deben ser xestionados adecuadamente.
  • 🛠️ Implementa medidas de seguridade para mitigar vulnerabilidades.

Timeline

  • 00:00:00 - 00:05:00

    Os escáneres de vulnerabilidades son ferramentas que permiten identificar posibles debilidades en sistemas operativos, dispositivos de rede ou aplicacións. A diferenza das probas de penetración, que buscan acceder aos sistemas, os escáneres analizan desde fóra para determinar se existe a posibilidade de acceso. Un tipo común de escáner de vulnerabilidades é o escáner de portas, que identifica que portas están abertas e se estas representan un risco, como o servizo Telnet que non é seguro. É importante realizar escáneres tanto desde a perspectiva externa como interna, para obter unha visión completa das vulnerabilidades potenciais.

  • 00:05:00 - 00:14:51

    Despois de realizar un escáner de vulnerabilidades, é fundamental analizar os resultados e priorizar as accións a tomar. Os escáneres identifican vulnerabilidades críticas, como debilidades en bibliotecas de OpenSSL ou sistemas operativos obsoletos que non reciben parches de seguridade. A información recollida permite tomar decisións sobre actualizacións ou cambios necesarios. É esencial consultar bases de datos de vulnerabilidades, como a NVD, para obter información adicional e comprender a gravidade das vulnerabilidades identificadas, así como para evitar falsos positivos e negativos que poidan comprometer a seguridade do sistema.

Mind Map

Video Q&A

  • Que son as exploracións de vulnerabilidades?

    Son escáneres que analizan sistemas para identificar posibles vulnerabilidades en sistemas operativos, dispositivos de rede ou aplicacións.

  • Cal é a diferenza entre un escáner de vulnerabilidades e unha proba de penetración?

    Os escáneres de vulnerabilidades identifican posibles vulnerabilidades sen intentar explotalas, mentres que as probas de penetración intentan acceder aos sistemas.

  • Que é un escáner de portas?

    É un tipo de escáner de vulnerabilidades que verifica que portas están abertas nun dispositivo específico.

  • Que riscos implica realizar un escáner de vulnerabilidades?

    Pode causar que un sistema ou aplicación se volva indisponible se o escáner detecta un erro no software.

  • Que son os falsos positivos e negativos en escáneres de vulnerabilidades?

    Os falsos positivos son vulnerabilidades que se informan pero non existen, mentres que os falsos negativos son vulnerabilidades que existen pero non son detectadas.

  • Como se priorizan as vulnerabilidades detectadas?

    As vulnerabilidades deben ser avaliadas e priorizadas en función da súa gravidade e do impacto potencial no sistema.

  • Que recursos están dispoñibles para investigar vulnerabilidades?

    A base de datos NVD e a base de datos CVE son recursos útiles para obter información sobre vulnerabilidades.

  • Que é un escáner de vulnerabilidades con credenciais?

    É un escáner que se executa cun usuario que ten permisos para acceder ao sistema, permitindo unha análise máis profunda.

  • Por que é importante manter actualizados os escáneres de vulnerabilidades?

    Para garantir que se detecten todas as vulnerabilidades posibles e minimizar os falsos positivos e negativos.

  • Que medidas de seguridade deben implementarse para mitigar vulnerabilidades?

    É importante ter antivirus, firewalls e realizar revisións de configuracións para asegurar que non existan vulnerabilidades.

View more video summaries

Get instant access to free YouTube video summaries powered by AI!
Subtitles
en
Auto Scroll:
  • 00:00:02
    if you're working in it security
  • 00:00:03
    you are undoubtedly going to be
  • 00:00:05
    performing some vulnerability scans
  • 00:00:08
    these scans are designed to look at
  • 00:00:09
    systems to see if potential
  • 00:00:11
    vulnerabilities might exist
  • 00:00:13
    in an operating system a network device
  • 00:00:15
    or an application
  • 00:00:16
    these are a little bit different than a
  • 00:00:18
    penetration test which is really trying
  • 00:00:20
    to gain
  • 00:00:21
    access into the inner workings of your
  • 00:00:23
    devices instead the vulnerability scan
  • 00:00:25
    is trying to determine from the outside
  • 00:00:27
    if there is the potential to gain access
  • 00:00:30
    to those systems
  • 00:00:31
    one common type of a vulnerability scan
  • 00:00:33
    is a port scan that's when we will look
  • 00:00:35
    at a device
  • 00:00:36
    and determine what ports happen to be
  • 00:00:38
    responding on that particular ip address
  • 00:00:41
    from here you may be able to gather
  • 00:00:43
    information about things that might be
  • 00:00:44
    less than secure for example on this
  • 00:00:46
    device port 23
  • 00:00:48
    running over tcp which would be the
  • 00:00:50
    telnet service
  • 00:00:51
    is an open port on this device and
  • 00:00:54
    without knowing anything else about this
  • 00:00:56
    system
  • 00:00:56
    we know that telnet inherently sends
  • 00:00:59
    information
  • 00:00:59
    that is not secure it is not encrypted
  • 00:01:02
    so this would be something to bring up
  • 00:01:04
    as a potential vulnerability on this
  • 00:01:06
    computer
  • 00:01:07
    it's common to run vulnerability scans
  • 00:01:09
    on all of the devices connected to the
  • 00:01:11
    network this would be servers
  • 00:01:12
    workstations laptops
  • 00:01:14
    and other devices that are connected to
  • 00:01:16
    the network as well
  • 00:01:17
    you want to be able to perform these
  • 00:01:19
    vulnerability scans from the perspective
  • 00:01:21
    of the attacker
  • 00:01:22
    so you want to perform these from the
  • 00:01:24
    outside on the internet
  • 00:01:26
    side coming inbound to your devices but
  • 00:01:28
    you might also want to run these scans
  • 00:01:30
    internally as if you were an insider who
  • 00:01:32
    had full access to these systems
  • 00:01:35
    we'll want to gather as much information
  • 00:01:37
    as possible and these vulnerability
  • 00:01:38
    scans collect
  • 00:01:39
    a lot of information there's plenty of
  • 00:01:42
    details that we'll need to examine in
  • 00:01:43
    the log to determine
  • 00:01:45
    what we want to do with this information
  • 00:01:47
    once the scans are complete
  • 00:01:49
    the vulnerability scanners you use are
  • 00:01:51
    very powerful pieces of software that
  • 00:01:53
    are designed
  • 00:01:54
    to look at many different aspects of how
  • 00:01:56
    your systems are running
  • 00:01:57
    in the hopes that it will find some
  • 00:01:58
    vulnerabilities on that device
  • 00:02:01
    we call these non-intrusive scans but of
  • 00:02:03
    course there's a little bit
  • 00:02:05
    of intrusiveness as it's scanning the
  • 00:02:07
    different port numbers
  • 00:02:08
    and perhaps trying to find out if a
  • 00:02:10
    potential vulnerability might exist
  • 00:02:12
    but these aren't penetration tests these
  • 00:02:14
    vulnerability scanners will not
  • 00:02:16
    try to attempt to take advantage of the
  • 00:02:18
    vulnerability
  • 00:02:19
    instead they'll simply decide if a
  • 00:02:21
    vulnerability might exist or not
  • 00:02:24
    after the scan is complete you can run
  • 00:02:25
    your own test to see if that
  • 00:02:27
    vulnerability really does exist
  • 00:02:29
    you can run a penetration test on its
  • 00:02:31
    own or you can find
  • 00:02:32
    a specific exploit that might attack
  • 00:02:35
    that vulnerability and see if that
  • 00:02:37
    vulnerability does exist
  • 00:02:39
    there are different approaches to
  • 00:02:40
    performing these scans one approach
  • 00:02:43
    is to scan as if you are someone who
  • 00:02:45
    does not have access to the network
  • 00:02:47
    this would be a non-credentialed scan
  • 00:02:49
    this user doesn't have the credentials
  • 00:02:51
    to be able to log on to a device and
  • 00:02:54
    gain additional rights and permissions
  • 00:02:56
    you might want to think of this as
  • 00:02:57
    someone who is out on the internet who
  • 00:02:59
    doesn't have any access to your network
  • 00:03:01
    and this would be a scan that's run from
  • 00:03:03
    their perspective
  • 00:03:04
    but of course there is the perspective
  • 00:03:06
    of someone who is on the
  • 00:03:07
    inside of your network and trying to
  • 00:03:09
    exploit a system
  • 00:03:11
    so you might want to run these types of
  • 00:03:13
    vulnerability scans
  • 00:03:14
    as a user who has rights and permissions
  • 00:03:16
    to log in this is a credentialed scan
  • 00:03:19
    and it's a way to tell how much of a
  • 00:03:21
    vulnerability might exist
  • 00:03:23
    if you were someone who had a little bit
  • 00:03:25
    of access to these systems
  • 00:03:28
    let's look at the results of a
  • 00:03:29
    vulnerability scan that i ran on my
  • 00:03:32
    network
  • 00:03:32
    i ran this with the nessus essentials
  • 00:03:35
    product
  • 00:03:36
    that was able to look at an individual
  • 00:03:38
    ip address at 10.1.10.13
  • 00:03:41
    it's important to remind you at this
  • 00:03:43
    point that you should never run a scan
  • 00:03:45
    on your network
  • 00:03:46
    where you do not have specific
  • 00:03:47
    permission to do so
  • 00:03:49
    you should also make sure that if you're
  • 00:03:51
    running a scan on the network
  • 00:03:52
    that you understand exactly what that
  • 00:03:54
    scan is going to do
  • 00:03:55
    there is some conversations that takes
  • 00:03:58
    place between the scanner and that
  • 00:04:00
    remote device
  • 00:04:01
    and there have been cases where a
  • 00:04:02
    vulnerability scanner
  • 00:04:04
    has found a bug and a piece of software
  • 00:04:06
    that caused that particular system
  • 00:04:08
    or application to suddenly become
  • 00:04:10
    unavailable
  • 00:04:11
    so you could potentially crash a system
  • 00:04:14
    or make the system unavailable
  • 00:04:16
    simply by performing one of these
  • 00:04:18
    vulnerability scans
  • 00:04:19
    make sure that everybody knows what's
  • 00:04:21
    happening and that you're ready if
  • 00:04:23
    anything should happen to those systems
  • 00:04:25
    on this device 10.1.10.13 i ran
  • 00:04:29
    a vulnerability scan it only took two
  • 00:04:31
    minutes to scan this particular device
  • 00:04:33
    let's click on this host and see what
  • 00:04:35
    the results of this report might be
  • 00:04:37
    let's start with these two critical
  • 00:04:39
    vulnerabilities at the top the first is
  • 00:04:41
    a debian open ssh
  • 00:04:42
    open ssl package random number generator
  • 00:04:46
    weakness
  • 00:04:47
    this means that someone could gain a
  • 00:04:49
    shell remotely into that system
  • 00:04:51
    i can see why they would have qualified
  • 00:04:53
    this as a critical
  • 00:04:54
    vulnerability when we click on that we
  • 00:04:57
    can see more information about this
  • 00:04:58
    specific vulnerability
  • 00:05:00
    the remote ssh host key has been
  • 00:05:02
    generated on a debian or umbutu system
  • 00:05:05
    which contains a bug in the random
  • 00:05:07
    number generator of its open ssl library
  • 00:05:10
    this says that the attacker can easily
  • 00:05:12
    obtain the private part of the remote
  • 00:05:14
    key
  • 00:05:15
    that means that they'll be able to
  • 00:05:16
    decipher the remote sessions or set up
  • 00:05:19
    man-in-the-middle attacks
  • 00:05:20
    because this vulnerability exists on
  • 00:05:22
    this system it also gives you places to
  • 00:05:24
    go to read more about it
  • 00:05:26
    and things that you can do to resolve
  • 00:05:28
    this particular problem
  • 00:05:29
    let's go back in these vulnerabilities
  • 00:05:31
    and look at the other critical
  • 00:05:32
    vulnerability
  • 00:05:33
    which is a unix operating system
  • 00:05:35
    unsupported version detection
  • 00:05:37
    i ran the scan against a very old
  • 00:05:39
    version of linux and in fact the
  • 00:05:41
    vulnerability tells us
  • 00:05:43
    that this is a very old unix system
  • 00:05:46
    that is no longer supported there will
  • 00:05:48
    be no security patches for the product
  • 00:05:51
    so this will have additional
  • 00:05:53
    vulnerabilities as time goes on
  • 00:05:54
    the output from the vulnerability scan
  • 00:05:57
    is listed here and we can see
  • 00:05:58
    that it is ubuntu 8.04 that support
  • 00:06:02
    ended
  • 00:06:02
    many years ago and that was one where we
  • 00:06:05
    now can make decisions about
  • 00:06:07
    upgrading that system or putting a
  • 00:06:08
    system in place that would have security
  • 00:06:11
    patches
  • 00:06:11
    ongoing let's go back to the listing of
  • 00:06:14
    vulnerabilities and you can see there
  • 00:06:16
    are other vulnerabilities in here such
  • 00:06:18
    as mixed vulnerabilities medium low
  • 00:06:20
    and a lot of informational
  • 00:06:22
    vulnerabilities are listed here
  • 00:06:24
    you now have to make a decision over
  • 00:06:26
    which of these vulnerabilities are
  • 00:06:28
    important
  • 00:06:29
    which of them you should cover first
  • 00:06:31
    which should be second on the list
  • 00:06:33
    and there may be vulnerabilities in this
  • 00:06:34
    list that don't affect you or do not
  • 00:06:37
    have a concern in your environment
  • 00:06:38
    you're going to have to go through each
  • 00:06:40
    one of these and make those decisions
  • 00:06:43
    and that vulnerability scanner went out
  • 00:06:45
    to that device
  • 00:06:46
    and looked for every possible
  • 00:06:48
    vulnerability that it might have
  • 00:06:50
    or at least every possible vulnerability
  • 00:06:52
    that the vulnerability scanner
  • 00:06:54
    knows about there's a database within
  • 00:06:56
    the vulnerability scanner
  • 00:06:57
    that's to constantly be updated so that
  • 00:07:00
    it knows what to look for
  • 00:07:02
    and where to look for these types of
  • 00:07:03
    vulnerabilities you will certainly find
  • 00:07:05
    vulnerabilities associated with
  • 00:07:07
    particular applications like desktop
  • 00:07:09
    apps or mobile apps
  • 00:07:10
    in fact here's a desktop app
  • 00:07:12
    vulnerability cve 2020
  • 00:07:14
    1889 which has a security feature bypass
  • 00:07:18
    issue in whatsapp desktop and you'll
  • 00:07:20
    need to update the application
  • 00:07:22
    to be able to resolve that security
  • 00:07:24
    vulnerability there are also
  • 00:07:25
    vulnerabilities that you may find
  • 00:07:27
    associated with web-based
  • 00:07:28
    applications this is software that's
  • 00:07:30
    running on a web server
  • 00:07:32
    here's an example of one in a php file
  • 00:07:35
    for an organization ucms that has a
  • 00:07:38
    product
  • 00:07:39
    1.4.8 and this results in an information
  • 00:07:42
    leak
  • 00:07:42
    via an error message and provides
  • 00:07:45
    information that it should not be
  • 00:07:46
    providing
  • 00:07:47
    and of course there could be scans
  • 00:07:49
    against network devices on your network
  • 00:07:51
    where you get information about
  • 00:07:52
    misconfigured firewalls
  • 00:07:54
    devices that have ports that are open
  • 00:07:56
    that perhaps should not be open and
  • 00:07:58
    other vulnerabilities as well
  • 00:07:59
    this is a vulnerability cve 2020-25079
  • 00:08:04
    an issue was discovered on d-link
  • 00:08:07
    dcs-2530-l
  • 00:08:09
    before version 1.06.0
  • 00:08:12
    hotfix and etc this allows authenticated
  • 00:08:16
    command
  • 00:08:16
    injection so this would be a
  • 00:08:18
    vulnerability that is on the router
  • 00:08:20
    itself that would need to be resolved
  • 00:08:22
    with a firmware upgrade
  • 00:08:24
    if you're performing these vulnerability
  • 00:08:26
    scans you'll be doing a lot of research
  • 00:08:28
    prior to the scan
  • 00:08:30
    and a lot of research after the scan is
  • 00:08:32
    complete there are many resources online
  • 00:08:34
    that can give you the information you
  • 00:08:36
    need to be able to make decisions when
  • 00:08:37
    these vulnerabilities are found
  • 00:08:39
    one very common place to go is the
  • 00:08:41
    consolidated cve database
  • 00:08:43
    at the national vulnerability database
  • 00:08:46
    you can find that at
  • 00:08:48
    nvd.nist.gov this is
  • 00:08:50
    a summary of all of the cves that you
  • 00:08:52
    can also find
  • 00:08:54
    at the common vulnerabilities and
  • 00:08:56
    exposures database those are the cves
  • 00:08:59
    and you'll find that at cve.mitre.org
  • 00:09:02
    you might also want to go directly to
  • 00:09:04
    the manufacturers themselves and one
  • 00:09:05
    great place to get information about
  • 00:09:07
    microsoft windows is directly from
  • 00:09:09
    microsoft
  • 00:09:10
    you'll find those microsoft security
  • 00:09:11
    bulletins at www.microsoft.com
  • 00:09:15
    technet security slash current.aspx
  • 00:09:20
    there will be some vulnerabilities
  • 00:09:22
    identified by the scanner
  • 00:09:23
    that cannot be tied back to a specific
  • 00:09:26
    known cve
  • 00:09:27
    so you might also need to do some
  • 00:09:29
    additional research to really determine
  • 00:09:31
    the scope of this particular
  • 00:09:32
    vulnerability
  • 00:09:34
    i mentioned earlier one of the best
  • 00:09:36
    places you can go to get a summary
  • 00:09:38
    of these cves is the national
  • 00:09:40
    vulnerability database
  • 00:09:41
    at nvd.nist.gov this is a list that is
  • 00:09:44
    synchronized with the cve list from
  • 00:09:46
    mitre
  • 00:09:47
    and has some nice search capabilities on
  • 00:09:49
    it as well but another feature that is
  • 00:09:52
    inside the national vulnerability
  • 00:09:53
    database
  • 00:09:54
    is the common vulnerability scoring
  • 00:09:56
    system this provides
  • 00:09:58
    a number associated with the
  • 00:09:59
    vulnerability that can give you a
  • 00:10:01
    perspective
  • 00:10:02
    of just how severe this vulnerability
  • 00:10:04
    might be
  • 00:10:05
    each vulnerability gets a score between
  • 00:10:07
    0 and 10
  • 00:10:08
    and this allows you to at least have
  • 00:10:10
    some measure that you can use
  • 00:10:12
    to determine which vulnerabilities may
  • 00:10:14
    be more severe than others
  • 00:10:16
    there's currently two different scoring
  • 00:10:18
    methods that are used a scoring version
  • 00:10:20
    2.0
  • 00:10:21
    and another one that is currently
  • 00:10:22
    version 3.1 these use different criteria
  • 00:10:25
    to create the score
  • 00:10:27
    so you need to make sure that you pick
  • 00:10:28
    the version that you would like to
  • 00:10:30
    follow
  • 00:10:30
    and then compare that against all of the
  • 00:10:32
    vulnerabilities that you found
  • 00:10:34
    the national vulnerability database is a
  • 00:10:36
    critical summary of these
  • 00:10:37
    vulnerabilities and if you're putting
  • 00:10:39
    together
  • 00:10:39
    a record-keeping program or trying to
  • 00:10:41
    automate the processes that you have
  • 00:10:43
    around vulnerabilities
  • 00:10:44
    you will absolutely want to involve this
  • 00:10:47
    national vulnerability database
  • 00:10:49
    as you saw in the vulnerability scan
  • 00:10:51
    that i had created there were a number
  • 00:10:53
    of different vulnerabilities that were
  • 00:10:55
    identified
  • 00:10:56
    and from different categories as well
  • 00:10:58
    one of these categories is a lack of
  • 00:11:00
    security control
  • 00:11:01
    these devices should be running
  • 00:11:03
    anti-virus anti-malware in its own
  • 00:11:05
    personal firewall
  • 00:11:07
    to allow or restrict access to that
  • 00:11:09
    system so vulnerability scan might be
  • 00:11:11
    able to determine
  • 00:11:13
    that certain security procedures are not
  • 00:11:15
    in place on that device
  • 00:11:17
    there might also be misconfigurations on
  • 00:11:19
    the vulnerability scan i ran it found
  • 00:11:21
    that there was
  • 00:11:22
    an nfs misconfiguration that allowed
  • 00:11:24
    anybody to see the nfs shares that were
  • 00:11:27
    on that device
  • 00:11:28
    vulnerability scans might also inform
  • 00:11:30
    you that the guest login access is
  • 00:11:32
    enabled on that system
  • 00:11:33
    so that you can then go to that device
  • 00:11:35
    and disable that type of access
  • 00:11:37
    and of course there are operating system
  • 00:11:40
    and application vulnerabilities that are
  • 00:11:42
    found
  • 00:11:42
    every day so this vulnerability scam
  • 00:11:45
    will give us the heads up to let us know
  • 00:11:47
    if a particular piece of software needs
  • 00:11:49
    to be updated
  • 00:11:50
    one of these challenges with
  • 00:11:52
    vulnerability scans is you will
  • 00:11:53
    occasionally find a vulnerability that
  • 00:11:56
    is reported
  • 00:11:56
    you'll go and investigate that
  • 00:11:58
    vulnerability and what you'll find is
  • 00:12:00
    that
  • 00:12:00
    the vulnerability scan didn't get it
  • 00:12:02
    right that in fact that vulnerability
  • 00:12:04
    doesn't
  • 00:12:05
    exist on that particular device we call
  • 00:12:07
    these false positives because our
  • 00:12:09
    vulnerability scan has positively
  • 00:12:11
    identified this vulnerability
  • 00:12:13
    but after doing research we find that
  • 00:12:16
    positive indication
  • 00:12:17
    was actually false and the false
  • 00:12:19
    positive now
  • 00:12:20
    can be dismissed and we can continue
  • 00:12:22
    with our research
  • 00:12:24
    false positives of course are different
  • 00:12:26
    than a low severity
  • 00:12:28
    vulnerability sometimes people will
  • 00:12:30
    dismiss the low severity vulnerabilities
  • 00:12:32
    as being something
  • 00:12:33
    they don't have to worry about on this
  • 00:12:35
    particular system
  • 00:12:36
    that's different than a false positive
  • 00:12:38
    at least a low severity vulnerability is
  • 00:12:41
    a real vulnerability that exists albeit
  • 00:12:44
    at a very low priority level a false
  • 00:12:47
    positive is one that doesn't exist at
  • 00:12:49
    all
  • 00:12:49
    so we need to be sure to categorize
  • 00:12:51
    those properly we're trying to evaluate
  • 00:12:54
    how to take the next steps with this
  • 00:12:55
    system to make it more secure
  • 00:12:57
    perhaps worse than a false positive
  • 00:13:00
    would be a false negative
  • 00:13:02
    this is when a vulnerability exists on a
  • 00:13:05
    system but our scanner was not able to
  • 00:13:08
    identify it and did not tell us anything
  • 00:13:10
    about that vulnerability existing on
  • 00:13:12
    that particular device
  • 00:13:14
    to be able to resolve problems around
  • 00:13:16
    false positives and false negatives
  • 00:13:18
    you want to be sure that you have the
  • 00:13:20
    latest version of the signatures running
  • 00:13:22
    for that vulnerability scanner
  • 00:13:24
    this will allow it to filter out
  • 00:13:26
    anything that it knows
  • 00:13:27
    is not valid and find all of the
  • 00:13:29
    vulnerabilities on the system
  • 00:13:31
    that might have been missed if you were
  • 00:13:33
    using an older database
  • 00:13:35
    if you do run a scan and you get a false
  • 00:13:37
    positive or a false negative
  • 00:13:39
    you want to work with the vulnerability
  • 00:13:41
    scanner manufacturer
  • 00:13:42
    and see if they can create an updated
  • 00:13:44
    database that resolves these issues
  • 00:13:48
    of course there are a number of
  • 00:13:49
    vulnerabilities you can look for without
  • 00:13:50
    using some type of formal vulnerability
  • 00:13:53
    scanner
  • 00:13:53
    for instance you could do a
  • 00:13:54
    configuration review of an operating
  • 00:13:57
    system
  • 00:13:57
    to see if there may be any obvious
  • 00:13:59
    security issues for example
  • 00:14:01
    you may want to validate what the
  • 00:14:03
    security settings are in a device it's
  • 00:14:05
    easy to log into the device
  • 00:14:07
    and see what the firewall settings might
  • 00:14:09
    be set to or see if anti-virus has been
  • 00:14:11
    updated recently
  • 00:14:12
    you can look at workstations and see
  • 00:14:14
    what the account configurations are
  • 00:14:16
    and make sure that nobody's turned on
  • 00:14:18
    any particular security shares
  • 00:14:20
    that might put the entire device at risk
  • 00:14:22
    on servers themselves we are concerned
  • 00:14:24
    with the access control to those servers
  • 00:14:27
    and the permissions of users who are
  • 00:14:29
    connecting to that server
  • 00:14:30
    and we want to look at our security
  • 00:14:32
    devices themselves and make sure that we
  • 00:14:34
    haven't misconfigured a firewall rule to
  • 00:14:36
    allow
  • 00:14:37
    access when really we wanted to deny
  • 00:14:42
    access
  • 00:14:50
    you
Tags
  • seguridade informática
  • vulnerabilidades
  • escáner de vulnerabilidades
  • probas de penetración
  • escáner de portas
  • falsos positivos
  • falsos negativos
  • NVD
  • CVE
  • configuración de seguridade