Vulnerability Scanning with Credentials

Slides:



Advertisements
Similar presentations
WEB CONNECT FOR EASYNVR : WEB CONNECT INCREASES YOUR PROFITABILITY BY REDUCING INSTALLATION LABOR COSTS WHILE SIMULTANEOUSLY CREATING NEW REVENUE.
Advertisements

Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Securing your Jail broken IPhone. iPhone Worm An iPhone worm has started jumping between jailbroken devices, taking advantage of users who have replaced.
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Vulnerability Analysis Borrowed from the CLICS group.
Nasca Internet Networking and Security viruses.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
A Guide to major network components
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Website Hardening HUIT IT Security | Sep
Overview Print and Document Services Print Management console Printer properties Troubleshooting.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Demystifying Backdoor Shells and IRC Bots: The Risk … By : Jonathan.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
◦ What is an Operating System? What is an Operating System? ◦ Operating System Objectives Operating System Objectives ◦ Services Provided by the Operating.
1 Vulnerability Analysis and Patches Management Using Secure Mobile Agents Presented by: Muhammad Awais Shibli.
CIS 450 – Network Security Chapter 3 – Information Gathering.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
1 Higher Computing Topic 8: Supporting Software Updated
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Security at NCAR David Mitchell February 20th, 2007.
SCSC 555 Frank Li.  Introduction to Enumeration  Enumerate Microsoft OS  Enumerate *NIX OS  Enumerate NetWare OS (skip) 2.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Operating Systems Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
Topic 5: Basic Security.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Retina Network Security Scanner
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Computer Security By Duncan Hall.
Understand Malware LESSON Security Fundamentals.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
(2) Organize information processing centers environment, the various functions and details Information technology audit: An information technology audit,
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Association of World Election Bodies Contents ICT–based Election Management Voter Registration and Identification Voting and Counting Examples.
 Terms:  “Security”: is a system’s ability to provide services while maintaining the five IA pillars  “Attack”: an action that violates one of the.
Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –
An Introduction to Biometrics
Kevin Watson and Ammar Ammar IT Asset Visibility.
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
AUTOMOBILE CYBER SECURITY David McPeak. EVOLUTION IN DESIGN/TECHNOLOGY.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Securing Network Servers
Port Scanning James Tate II
WHAT IS A NETWORK TYPES OF NETWORK NETWORK HARDWARE
Lecture 1-Part 2: Operating-System Structures
Critical Security Controls
2. OPERATING SYSTEM 2.1 Operating System Function
Security Testing Methods
Common Methods Used to Commit Computer Crimes
CITA 352 Chapter 5 Port Scanning.
Chapter 2: System Structures
Control system network security issues and recommendations
THE OPERATION SYSTEM The need for an operating system
CIT 480: Securing Computer Systems
Firewalls.
Penetration Test Debrief
Everything You Need To Know About Penetration Testing.
Intro to Ethical Hacking
Chap 10 Malicious Software.
Metasploit Analysis Report Overview
Intrusion Detection system
Chap 10 Malicious Software.
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Cybersecurity and Cyberhygiene
Presentation transcript:

Vulnerability Scanning with Credentials

Scanning Efficiency Credentialed scans are more efficient. Traditional network only scans involve pinging and probing thousands of ports on each host. This is taxing to the network infrastructure as well as the target system. Several scanners will each attempt to simultaneously connect to hundreds of ports on dozens of targets. This many open connections is hard on the network equipment and scans have to be throttled as to not overwhelm the hardware. Each attempted connection has to wait for success or timeout. With credentials checks there is no time wasted on trial and error. With credentials available only a handful of connections are opened to login and gather data. OS and processes are 100% known so only applicable checks are performed resulting in less network and target system overhead.

Scanning Security Credential scans with a service account are more secure. In order to perform credentialed scans without a service account credentials must be created and gathered on each host individually. The scanning group does not have access to the targets so the job of keeping account info up to date and secure is left to the server owners. Centralized Password Management Ensures password rotation and complexity follow Standards Reduces risk of unencrypted password transmission Account Management - Account would not be shared by any other user or service

Scanning Accuracy Credentialed scans are deeper and more accurate. OS fingerprinting is 100% accurate This information is also useful in updating our system of records The scanner can view running processes, determine open ports, perform system compliance/audit analysis, and evaluate attached devices Ability to see vulnerabilities which do not present themselves externally until there is interaction from a user or another trigger False positives are dramatically reduced with perfect information Without credentials some things that appear to be vulnerabilities can only be verified with an attempt to exploit. This could harm system performance so in most cases it is left as a possible false positive.

Example Non-Credentialed Scan Output

Example Credentialed Scan Output (Same system)

Further Reading http://www.tenable.com/blog/protecting-scanning-credentials-from- malicious-insiders https://www.tenable.com/blog/the-value-of-credentialed-vulnerability- scanning