Explore it :Understand how it works and what others know about it
Fix it: secure operating systems, applications and networks.
Make it better: figure out a better way to secure the asset.
Tell others: tell others what we find. It’s called ethical
disclosure.
The hacking process is mainly used for
in order to categorize assets, risks, threats, vulnerabilities, and exploits affecting computer systems
asset
A major application, general support system, high impact program, physical plant, mission-critical system, personnel, equipment, or a logically related group of systems.
ss
Which phase of the hacking lifecycle tries to understand system or
application vulnerabilities?
*Break it
When ethical hackers see a problem, they keep it secret to protect
the owner from getting exploited.
False
You should always have explicit or written permission before you
test, attack or try to break anything that doesn't belong to you as a
part of the hacking process.
True
You should always have explicit or written permission before you
test, attack or try to break anything that doesn't belong to you as a
part of the hacking process.
True
reconnaissance
The first step of the hacking lifecycle is to understand the networks, devices, systems, and applications under review. This is known as
You've taken the first step in the hacking lifecycle by capturing
device, operating system and application information.
Relate these steps to your device used during the exercise
Performing Threat Intelligence Network Ownership
Each IP address and domain on the Internet has an owner. This is the organization or person who registered it. In this exercise, you'll practice viewing ownership of Internet domains and IP addresses. Viewing Domain Owners
Vulnerability definition according to Nist ?
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat.”
Process followed in the vulnerability management
Identification -identifying the vulnerability(Just knowing that something could be a problem)
Analyze -is the decision ,what to do about it.
Action -implementing the decision
In IT, vulnerabilities are inevitable. No matter how hard we try, there will always be weaknesses in software, operating systems and networks. Most vulnerabilities are minor or the path to use or exploit them to cause harm is long and difficult. We need to pay attention and know what vulnerabilities need to be fixed right away and which ones can maybe wait
Vulnerabilities in information technology
Networks
Code/software applications
Unpatched systems
patched systems
There’s a large community dedicated to finding vulnerabilities and letting others know. Sources include:
Vendors
Vulnerability lists & databasesNIST National Vulnerability Database (NVD)
MITRE Common Vulnerabilities and Exposures (CVE) list
Bug Bounties
Security assessments
Vulnerability Management - Analysis and Action
mmary
CVE is “a list of common identifiers for publicly known cybersecurity vulnerabilities.” It was started over 20 years ago to create a common language and naming convention for all vulnerabilities. In the early days, manufactures would have their own names and identification numbers, which became very confusing.
Description from the CVE website: “The process of creating a CVE Entry begins with the discovery of a potential security vulnerability. The information is then assigned a CVE ID by a CVE Numbering Authority (CNA), the CNA writes the Description and adds References, and then the completed CVE Entry is added to the CVE
List and posted on the CVE website by the CVE Team”
The NVD is the U.S. government repository of standards-based vulnerability management data. They perform analysis on CVEs that have been published to the CVE Dictionary.
aking Action is doing something about the vulnerability once you’ve analyzed its risks and the benefits of applying a fix.
Zero-Day (0-Day) Vulnerabilities are vulnerabilities that have no notification to the manufacturer or public.
Vulnerability Information Resources
There are two resources for discovering and analyzing vulnerabilities: the MITRE Common Vulnerabilities and Exposures (CVE) list and the NIST National Vulnerability Database (NVD).
They are commonly used in the cybersecurity world and you will see them very often. In this section, we will only cover them at a high-level.
MITRE Common Vulnerabilities and Enumeration
NIST
MITRE Common Vulnerabilities and Enumeration - https://cve.mitre.org
NIST National Vulnerability Database - https://nvd.nist.gov/general
In this phase of the vulnerability management process, we decide what
to do about a vulnerability.
Analysis is studying the vulnerability and deciding a course of action
Risk
: A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence
ddd
Penetration Testing: A test methodology in which assessors, typically working under specific constraints, attempt to circumvent or defeat the security features of an information system.Source
Threat:
Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service
Vulnerability:
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat
Which of the following is true about the CVE List (pick all that
apply):
IT
QUIZ QUESTION
Which of the following is true about the CVE List (pick all that
apply):
One identifier for one vulnerability or exposure
One standardized description for each vulnerability or exposure