Exam objectives SY0-501

Explain vulnerability scanning concepts

Mag 23, 2020 11:28

A vulnerability is a weakness which can be exploited by a threat actor to perform unauthorized actions within a computer system. A vulnerability assessment is the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Vulnerability scanning is a part of the vulnerability assessment. It uses tools, called vulnerability scanners, to look for vulnerabilities into the hosts of a network.

Passively test security controls

A vulnerability scanner passively tests security controls in the sense that it identifies weaknesses and misconfigurations in the target system but it does not launch attacks to see whether these weaknesses are actually exploitable.

Identify vulnerability

In order to identify vulnerabilities, vulnerability scanners use databases of publicly known vulnerabilities. For instance, the vulnerability scanner may identify a given version of a SQL Server on a server. It can then look for such version on the vulnerability database to discover whether that partcular version is affected by some known vulnerability. Example: the MITRE corporation maintains the CVE , which is a list of entries for publicly known cybersecurity vulnerabilities. The NIST instead maintains the National Vulnerability Database (NVD).

Identify lack of security controls

Vulnerability scanners are able to identify the lack of security controls, like the lack of antivirus software.

Identify common misconfigurations

Vulnerability scanners are able o identify common misconfigurations like open ports (ports should be open to allow incoming connections to legitimate and managed services, like an https server, but should be otherwse closed), weak passwords and default configurations (like the Admin/Admin credentials to access the router administration page).

Intrusive vs. non-intrusive

An intrusive scan is one that can damage the target system, for istance my making it unavailable. A non-intrusive scan is one that is harmless to the target system. Example: penestration testing is an intrusive test because the actual exploitation of vulnerabilities can compromise the working of the target system. Vulnerability scanning is non-intrusive because it does not attempt to exploit vulerabilities: in just generates network traffic and thus may cause alerts in IDS/IPS.

Credentialed vs. non-credentialed

A credentialed vulnerability scan is one run with account credential. This way, it may gather much more information on the target system, finding more vulnerabilities in lesser time. A non-credentialed vulnerability scan instead is run without account credentials. It tipically gains less information on the target systems and to balance this fact may be forced to generate much more traffic. Example: a scan using SNMP credentials may gather lots of informations regarding the target devices, digging much more deeper in finding vulnerabilities

False positive

A false positive in the context of vulnerability scanning is a result of the scanning that reports that a vulnerability is present in the target system while in reality such vulnerability does not exist.