MOD 5 - Vulnerability Analysis Flashcards

1
Q
  • Vuln scanners
A

Generate reports of vulnerabilities, problems, compliance issues, etc. Won’t fix the problems but does give you important info about each vuln.
Example vulns: weak passwords, missing updates or patches, unencrypted protocols, weak config settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CVSS

A

Common Vulnerability Scoring System. Critical is 9.0-10.0. High is 7.0-8.9. Medium is 4.0-6.9. Low is 0.1-3.9. None is 0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vulnerability Management Life Cycle

A

1) Identify Assets and Create a Baseline 2) Vulnerability Scan 3) Risk Assessment 4) Remediation 5) Verification 6) Monitor. Repeat steps 2-6 continuously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Vulnerability Assessments

A

Active, Passive, Internal, External, Host-based, Network-based, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless network assessment

A

Tries to attack wireless authentication mechanisms to gain unauthorized access, identifies rogue access points in the company perimeter, tries to crack wireless encryption keys, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Approaches to Vuln Assessments

A

Product-Based vs Service-Based, Tree-Based (needs initial info to begin) vs Inference-Based (start by building an inventory of protocols on the machine, then figure out the protocol’s ports, then select vulnerabilities in that protocol and perform only the relevant tests)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Common vuln scanners:
A

Nessus, OpenVAS, Qualys, SAINT, Retina, Nikto etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Nikto
A

Webserver vuln scanner that can find problems such as outdated file versions, vulnerable CGI’s (web scripts), etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Positive, Negative, True, False

A

True Positive: Correctly identifies a vuln (positive match to the vuln database)
True Negative: Correctly determines no vuln exists (negative=no match to vuln database)
False Positive: Mistakenly reports a vulnerability that doesn’t really exist
False Negative: Mistakenly fails to identify a vuln that does exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly