My Account Log in

3 options

Network vulnerability assessment : identify security loopholes in your network's infrastructure / Sagar Rahalkar.

EBSCOhost Academic eBook Collection (North America) Available online

View online

Ebook Central College Complete Available online

View online

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Rahalkar, Sagar, author.
Language:
English
Subjects (All):
Computer networks--Security measures.
Computer networks.
Physical Description:
1 online resource (243 pages) : illustrations
Edition:
1st edition
Place of Publication:
Birmingham ; Mumbai : Packt, 2018.
System Details:
text file
Summary:
Build a network security threat model with this comprehensive learning guide Key Features Develop a network security threat model for your organization Gain hands-on experience in working with network scanning and analyzing tools Learn to secure your network infrastructure Book Description The tech world has been taken over by digitization to a very large extent, and so it's become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure. Network Vulnerability Assessment starts with network security assessment concepts, workflows, and architectures. Then, you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters, you will use these scanning results to analyze and design a threat model for network security. In the concluding chapters, you will dig deeper into concepts such as IP network analysis, Microsoft Services, and mail services. You will also get to grips with various security best practices, which will help you build your network security mechanism. By the end of this book, you will be in a position to build a security framework fit for an organization. What you will learn Develop a cost-effective end-to-end vulnerability management program Implement a vulnerability management program from a governance perspective Learn about various standards and frameworks for vulnerability assessments and penetration testing Understand penetration testing with practical learning on various supporting tools and techniques Gain insight into vulnerability scoring and reporting Explore the importance of patching and security hardening Develop metrics to measure the success of the vulnerability management program Who this book is for Network Vulnerability Assessment is for security analysts, threat analysts, and any security professionals responsible for developing a network threat model for an organization. This book is also for any individual who is or wants to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program.
Contents:
Cover
Title Page
Copyright and Credits
Packt Upsell
Contributors
Table of Contents
Preface
Chapter 1: Vulnerability Management Governance
Security basics
The CIA triad
Confidentiality
Integrity
Availability
Identification
Authentication
Authorization
Auditing
Accounting
Non-repudiation
Vulnerability
Threats
Exposure
Risk
Safeguards
Attack vectors
Understanding the need for security assessments
Types of security tests
Security testing
Vulnerability assessment versus penetration testing
Security assessment
Security audit
Business drivers for vulnerability management
Regulatory compliance
Satisfying customer demands
Response to some fraud/incident
Gaining a competitive edge
Safeguarding/protecting critical infrastructures
Calculating ROIs
Setting up the context
Bottom-up
Top-down
Policy versus procedure versus standard versus guideline
Vulnerability assessment policy template
Penetration testing standards
Penetration testing lifecycle
Industry standards
Open Web Application Security Project testing guide
Benefits of the framework
Penetration testing execution standard
Summary
Exercises
Chapter 2: Setting Up the Assessment Environment
Setting up a Kali virtual machine
Basics of Kali Linux
Environment configuration and setup
Web server
Secure Shell (SSH)
File Transfer Protocol (FTP)
Software management
List of tools to be used during assessment
Chapter 3: Security Assessment Prerequisites
Target scoping and planning
Gathering requirements
Preparing a detailed checklist of test requirements
Suitable time frame and testing hours
Identifying stakeholders
Deciding upon the type of vulnerability assessment.
Types of vulnerability assessment
Types of vulnerability assessment based on the location
External vulnerability assessment
Internal vulnerability assessment
Based on knowledge about environment/infrastructure
Black-box testing
White-box testing
Gray-box testing
Announced and unannounced testing
Automated testing
Authenticated and unauthenticated scans
Agentless and agent-based scans
Manual testing
Estimating the resources and deliverables
Preparing a test plan
Getting approval and signing NDAs
Confidentiality and nondisclosure agreements
Chapter 4: Information Gathering
What is information gathering?
Importance of information gathering
Passive information gathering
Reverse IP lookup
Site report
Site archive and way-back
Site metadata
Looking for vulnerable systems using Shodan
Advanced information gathering using Maltego
theHarvester
Active information gathering
Active information gathering with SPARTA
Recon-ng
Dmitry
Chapter 5: Enumeration and Vulnerability Assessment
What is enumeration?
Enumerating services
HTTP
FTP
SMTP
SMB
DNS
SSH
VNC
Using Nmap scripts
http-methods
smb-os-discovery
http-sitemap-generator
mysql-info
Vulnerability assessments using OpenVAS
Chapter 6: Gaining Network Access
Gaining remote access
Direct access
Target behind router
Cracking passwords
Identifying hashes
Cracking Windows passwords
Password profiling
Password cracking with Hydra
Creating backdoors using Backdoor Factory
Exploiting remote services using Metasploit
Exploiting vsftpd
Exploiting Tomcat
Hacking embedded devices using RouterSploit
Social engineering using SET
Chapter 7: Assessing Web Application Security.
Importance of web application security testing
Application profiling
Common web application security testing tools
Credentials over a secure channel
Authentication error messages
Password policy
Method for submitting credentials
OWASP mapping
Session management
Cookie checks
Cross-Site Request Forgery
Input validation
Security misconfiguration
Business logic flaws
Testing for business logic flaws
Auditing and logging
Cryptography
Testing tools
OWASP ZAP
Burp Suite
Chapter 8: Privilege Escalation
What is privilege escalation?
Horizontal versus vertical privilege escalation
Horizontal privilege escalation
Vertical privilege escalation
Privilege escalation on Windows
Privilege escalation on Linux
Chapter 9: Maintaining Access and Clearing Tracks
Maintaining access
Clearing tracks and trails
Anti-forensics
Chapter 10: Vulnerability Scoring
Requirements for vulnerability scoring
Vulnerability scoring using CVSS
Base metric group
Exploitability metrics
Attack vector
Attack complexity
Privileges required
User interaction
Scope
Impact metrics
Confidentiality impact
Integrity impact
Availability impact
Temporal metric group
Exploit code maturity
Remediation level
Report confidence
CVSS calculator
Chapter 11: Threat Modeling
What is threat modeling?
Benefits of threat modeling
Threat modeling terminology
How to model threats?
Threat modeling techniques
STRIDE
DREAD
Threat modeling tools
Microsoft Threat Modeling Tool
SeaSponge
Chapter 12: Patching and Security Hardening
Defining patching?.
Patch enumeration
Windows patch enumeration
Linux patch enumeration
Security hardening and secure configuration reviews
Using CIS benchmarks
Chapter 13: Vulnerability Reporting and Metric s
Importance of reporting
Type of reports
Executive reports
Detailed technical reports
Reporting tools
Dradis
KeepNote
Collaborative vulnerability management with Faraday v2.6
Metrics
Mean time to detect
Mean time to resolve
Scanner coverage
Scan frequency by asset group
Number of open critical/high vulnerabilities
Average risk by BU, asset group, and so on
Number of exceptions granted
Vulnerability reopen rate
Percentage of systems with no open high/critical vulnerability
Vulnerability ageing
Other Books You May Enjoy
Index.
Notes:
Includes index.
Description based on print version record.
ISBN:
9781788624725
1788624726
OCLC:
1055555635

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account