首页 > Web开发 > 详细

Penetration Test - Survey the Target(7)

时间:2020-08-14 23:29:14      阅读:68      评论:0      收藏:0      [点我收藏+]

Target Considerations

Given a scenario, perform a vulnerability scan.

CONTRAINER
  • Lightweight instance of a VM
  • Runs on to of host OS
  • Docker, Puppet, Vagrant
Applications
  • Application scan
    • Dynamic Analysis
      • -target environment is running and responds to queries
    • Static Analysis
      • -scan input consists of post-execution data stores
SCANNING CONSIDERATIONS
  • Time to run scans - approved schedule(planning)
  • Protocols used - largely dependent on target selection
  • Network topology - network layout(diagram) of test targets
  • Bandwidth limitations - tolerance to impact (affects availability)
  • Query throttling - slow down test iterations to avoid exceeding bandwidth
    • nmap -T
  • Fragile systems/non-traditional assets
    • How to avoid impacting fragile mission critical systems?
ANALYZE SCAN RESULTS
  • Asset categorization
    • Identify and rank assets by a relative value
    • Vulnerable assets with little value could be a waste of time
  • Adjudication
    • Determine which results are valid
      • False positives
      • Filter out false positives
  • Prioritization of vulnerabilities
    • Highest impact vulnerabilities - ease of exploit vs payoff
  • Common themes
    • Vulnerabilities
    • Observations
    • Lack of best practices
QUICK REVIEW
  • Know how to determine if targets are physical machines or are virtualized(i.e. footprinting)
  • Be aware of client restrictions when running scans (i.e. bandwidth use, schedule, etc.)
  • Don‘t waste time on results that have little value - focus on the most meaningful results
  • Prioritize the highest impact vulnerabilities

Penetration Test - Survey the Target(7)

原文:https://www.cnblogs.com/keepmoving1113/p/13505548.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!