Module 30 Network Vulnerability Assessment
Module 30 Network Vulnerability Assessment
Network Security
Administrator
Module XXX:
Network Vulnerability
Assessment
Module Objective
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Network Vulnerability
Assessment Methodology
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Vulnerability Assessment
• Includes weak passwords and exposed network service that allows routers to
the link to the malicious programs
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Goals of a Vulnerability Assessment
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Features of a Good Vulnerability
Assessment
Comprehensive:
Experience
Multi-Test Environment
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Network Vulnerability Assessment
Timeline
Produce the detailed report about the points of weakness found in the
network with respect to the data and resource vulnerabilities
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Vulnerability Classes
Hard vulnerabilities
Soft vulnerabilities
Design Flaws:
Incorrect Implementation:
• Information technology.
• Network management.
• Auditing.
NVA team should enroll other departments and
business units like physical security and human
resources as support members.
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Network Vulnerability Assessment
Methodology
• Acquire and review the business objectives and strategies and statements
• Identify interview representatives, internal customers, collects documents, and evaluates
the security performance
• Analyze success factors, sensitive data, security risks, and design effective action
• Evaluate security policies, risks, effectiveness of safeguard, and presenting a draft report
• Generate a final report supported with queries to be responded by the NVA team
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Network Vulnerability Assessment
Methodology: Phase I -Acquisition
Describes a list of required documents and
prepares a checklist that requires the team to:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Phase II: Identification
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Phase III: Analyzing
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Phase IV: Evaluation
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Phase V: Generating Reports
Host-base tools
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Selecting Vulnerability Assessment
Tools
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Vulnerability Assessment Tool: SAINT
Steps involved:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Scanning Tools: Nessus
Features of Nessus:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: BindView
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Retina
Features:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Sandcat Scanner
Features:
• Provides more than 56,000 security checks for all leading web server
platforms
• Performs destructive and non-destructive scans
• Tests IDS
• Identifies and analyzes server’s configurations
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: VForce
Features:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: ScanIT Online
Features:
• Detects and prioritizes critical vulnerabilities and ensures
proper safeguards
• Permits administrator to design and generate vulnerability
assessment reports
• Alerts against vulnerabilities arising in computer networks
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Summary
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited