3 options
Network vulnerability assessment : identify security loopholes in your network's infrastructure / Sagar Rahalkar.
- Format:
- Book
- Author/Creator:
- Rahalkar, Sagar, author.
- Language:
- English
- Subjects (All):
- Computer networks--Security measures.
- Computer networks.
- Physical Description:
- 1 online resource (243 pages) : illustrations
- Edition:
- 1st edition
- Place of Publication:
- Birmingham ; Mumbai : Packt, 2018.
- System Details:
- text file
- Summary:
- Build a network security threat model with this comprehensive learning guide Key Features Develop a network security threat model for your organization Gain hands-on experience in working with network scanning and analyzing tools Learn to secure your network infrastructure Book Description The tech world has been taken over by digitization to a very large extent, and so it's become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure. Network Vulnerability Assessment starts with network security assessment concepts, workflows, and architectures. Then, you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters, you will use these scanning results to analyze and design a threat model for network security. In the concluding chapters, you will dig deeper into concepts such as IP network analysis, Microsoft Services, and mail services. You will also get to grips with various security best practices, which will help you build your network security mechanism. By the end of this book, you will be in a position to build a security framework fit for an organization. What you will learn Develop a cost-effective end-to-end vulnerability management program Implement a vulnerability management program from a governance perspective Learn about various standards and frameworks for vulnerability assessments and penetration testing Understand penetration testing with practical learning on various supporting tools and techniques Gain insight into vulnerability scoring and reporting Explore the importance of patching and security hardening Develop metrics to measure the success of the vulnerability management program Who this book is for Network Vulnerability Assessment is for security analysts, threat analysts, and any security professionals responsible for developing a network threat model for an organization. This book is also for any individual who is or wants to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program.
- Contents:
- Cover
- Title Page
- Copyright and Credits
- Packt Upsell
- Contributors
- Table of Contents
- Preface
- Chapter 1: Vulnerability Management Governance
- Security basics
- The CIA triad
- Confidentiality
- Integrity
- Availability
- Identification
- Authentication
- Authorization
- Auditing
- Accounting
- Non-repudiation
- Vulnerability
- Threats
- Exposure
- Risk
- Safeguards
- Attack vectors
- Understanding the need for security assessments
- Types of security tests
- Security testing
- Vulnerability assessment versus penetration testing
- Security assessment
- Security audit
- Business drivers for vulnerability management
- Regulatory compliance
- Satisfying customer demands
- Response to some fraud/incident
- Gaining a competitive edge
- Safeguarding/protecting critical infrastructures
- Calculating ROIs
- Setting up the context
- Bottom-up
- Top-down
- Policy versus procedure versus standard versus guideline
- Vulnerability assessment policy template
- Penetration testing standards
- Penetration testing lifecycle
- Industry standards
- Open Web Application Security Project testing guide
- Benefits of the framework
- Penetration testing execution standard
- Summary
- Exercises
- Chapter 2: Setting Up the Assessment Environment
- Setting up a Kali virtual machine
- Basics of Kali Linux
- Environment configuration and setup
- Web server
- Secure Shell (SSH)
- File Transfer Protocol (FTP)
- Software management
- List of tools to be used during assessment
- Chapter 3: Security Assessment Prerequisites
- Target scoping and planning
- Gathering requirements
- Preparing a detailed checklist of test requirements
- Suitable time frame and testing hours
- Identifying stakeholders
- Deciding upon the type of vulnerability assessment.
- Types of vulnerability assessment
- Types of vulnerability assessment based on the location
- External vulnerability assessment
- Internal vulnerability assessment
- Based on knowledge about environment/infrastructure
- Black-box testing
- White-box testing
- Gray-box testing
- Announced and unannounced testing
- Automated testing
- Authenticated and unauthenticated scans
- Agentless and agent-based scans
- Manual testing
- Estimating the resources and deliverables
- Preparing a test plan
- Getting approval and signing NDAs
- Confidentiality and nondisclosure agreements
- Chapter 4: Information Gathering
- What is information gathering?
- Importance of information gathering
- Passive information gathering
- Reverse IP lookup
- Site report
- Site archive and way-back
- Site metadata
- Looking for vulnerable systems using Shodan
- Advanced information gathering using Maltego
- theHarvester
- Active information gathering
- Active information gathering with SPARTA
- Recon-ng
- Dmitry
- Chapter 5: Enumeration and Vulnerability Assessment
- What is enumeration?
- Enumerating services
- HTTP
- FTP
- SMTP
- SMB
- DNS
- SSH
- VNC
- Using Nmap scripts
- http-methods
- smb-os-discovery
- http-sitemap-generator
- mysql-info
- Vulnerability assessments using OpenVAS
- Chapter 6: Gaining Network Access
- Gaining remote access
- Direct access
- Target behind router
- Cracking passwords
- Identifying hashes
- Cracking Windows passwords
- Password profiling
- Password cracking with Hydra
- Creating backdoors using Backdoor Factory
- Exploiting remote services using Metasploit
- Exploiting vsftpd
- Exploiting Tomcat
- Hacking embedded devices using RouterSploit
- Social engineering using SET
- Chapter 7: Assessing Web Application Security.
- Importance of web application security testing
- Application profiling
- Common web application security testing tools
- Credentials over a secure channel
- Authentication error messages
- Password policy
- Method for submitting credentials
- OWASP mapping
- Session management
- Cookie checks
- Cross-Site Request Forgery
- Input validation
- Security misconfiguration
- Business logic flaws
- Testing for business logic flaws
- Auditing and logging
- Cryptography
- Testing tools
- OWASP ZAP
- Burp Suite
- Chapter 8: Privilege Escalation
- What is privilege escalation?
- Horizontal versus vertical privilege escalation
- Horizontal privilege escalation
- Vertical privilege escalation
- Privilege escalation on Windows
- Privilege escalation on Linux
- Chapter 9: Maintaining Access and Clearing Tracks
- Maintaining access
- Clearing tracks and trails
- Anti-forensics
- Chapter 10: Vulnerability Scoring
- Requirements for vulnerability scoring
- Vulnerability scoring using CVSS
- Base metric group
- Exploitability metrics
- Attack vector
- Attack complexity
- Privileges required
- User interaction
- Scope
- Impact metrics
- Confidentiality impact
- Integrity impact
- Availability impact
- Temporal metric group
- Exploit code maturity
- Remediation level
- Report confidence
- CVSS calculator
- Chapter 11: Threat Modeling
- What is threat modeling?
- Benefits of threat modeling
- Threat modeling terminology
- How to model threats?
- Threat modeling techniques
- STRIDE
- DREAD
- Threat modeling tools
- Microsoft Threat Modeling Tool
- SeaSponge
- Chapter 12: Patching and Security Hardening
- Defining patching?.
- Patch enumeration
- Windows patch enumeration
- Linux patch enumeration
- Security hardening and secure configuration reviews
- Using CIS benchmarks
- Chapter 13: Vulnerability Reporting and Metric s
- Importance of reporting
- Type of reports
- Executive reports
- Detailed technical reports
- Reporting tools
- Dradis
- KeepNote
- Collaborative vulnerability management with Faraday v2.6
- Metrics
- Mean time to detect
- Mean time to resolve
- Scanner coverage
- Scan frequency by asset group
- Number of open critical/high vulnerabilities
- Average risk by BU, asset group, and so on
- Number of exceptions granted
- Vulnerability reopen rate
- Percentage of systems with no open high/critical vulnerability
- Vulnerability ageing
- Other Books You May Enjoy
- Index.
- Notes:
- Includes index.
- Description based on print version record.
- ISBN:
- 9781788624725
- 1788624726
- OCLC:
- 1055555635
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.