Chapter 5 Vulnerability Analysis
Chapter 5 Vulnerability Analysis
Creating Baseline
Creating Baseline is a pre-assessment phase of the vulnerability assessment life-cycle in
which pentester or network administrator who is performing assessment identifies the
nature of the corporate network, the applications, and services. He creates an inventory
of all resources and assets which helps to manage, prioritize the assessment. furthermore,
he also maps the infrastructure, learns about the security controls, policies, and standards
followed by the organization. In the end, baseline helps to plan the process effectively,
schedule the tasks, and manage them with respect to priority.
Vulnerability Assessment
Vulnerability Assessment phase is focused on assessment of the target. The assessment
process includes examination and inspection of security measures such as physical
security as well as security policies and controls. In this phase, the target is evaluated for
misconfigurations, default configurations, faults, and other vulnerabilities either by
IPSpecialist.net 217 14-May-2018
Certified Ethical Hacking
Risk Assessment
Risk Assessment includes scoping these identified vulnerabilities and their impact on the
corporate network or on an organization.
Remediation
Remediation phase includes remedial actions for these detected vulnerabilities. High
priority vulnerabilities are addressed first because they can cause a huge impact.
Verification
Verification phase ensures that all vulnerabilities in an environment are eliminated.
Monitor
Monitoring phase includes monitoring the network traffic and system behaviors for any
further intrusion.
These tools not only inspect running software and application to find risk and
vulnerabilities by Security experts but also by the attackers to find out loopholes in an
organization's operating environment.
Vulnerability Scanning Tool
1. GFI LanGuard
GFI LanGuard is a network security and and patch management software that performs
virtual security consultancy. This product offers: -
Patch Management for Windows®, Mac OS® and Linux®
Path Management for third-party applications
Vulnerability scanning for computers and mobile devices
Smart network and software auditing
Web reporting console
Tracking latest vulnerabilities and missing updates
2. Nessus
Nessus Professional Vulnerability Scanner is a most comprehensive vulnerability scanner
software powered by Tenable Network Security. This Scanning Product focuses on
vulnerabilities and configuration assessment. Using this tool, you can customize and
schedule scans and extract reports.
3. Qualys FreeScan
Qualys FreeScan tool offers Online Vulnerability scanning. It provides a quick snapshot of
security and compliances posture of Network and Web along with recommendations.
Qualys FreeScan tool is effective for: -
Network Vulnerability scan for Server and App
Patch
OWA SP Web Application Audit
SCAP Compliance Audit
Configuration:
7. Enter Username and Password of your Nessus Account (You have to Register an
account to download the tool from website).
24. Click on Vulnerabilities Tab to observe vulnerabilities detected. You can also check
other tabs, Remediation, Notes and History to get more details about history, issues
and remediation actions.
25. Go to Export tab to export the report and select the required format.