40,81 €
Discover network vulnerabilities and threats to design effective network security strategies
Key Features
Book Description
Network scanning is a discipline of network security that identifies active hosts on networks and determining whether there are any vulnerabilities that could be exploited. Nessus and Nmap are among the top tools that enable you to scan your network for vulnerabilities and open ports, which can be used as back doors into a network.
Network Scanning Cookbook contains recipes for configuring these tools in your infrastructure that get you started with scanning ports, services, and devices in your network. As you progress through the chapters, you will learn how to carry out various key scanning tasks, such as firewall detection, OS detection, and access management, and will look at problems related to vulnerability scanning and exploitation in the network. The book also contains recipes for assessing remote services and the security risks that they bring to a network infrastructure.
By the end of the book, you will be familiar with industry-grade tools for network scanning, and techniques for vulnerability scanning and network protection.
What you will learn
Who this book is for
If you're a network engineer or information security professional wanting to protect your networks and perform advanced scanning and remediation for your network infrastructure, this book is for you.
Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:
Seitenzahl: 182
Veröffentlichungsjahr: 2018
Copyright © 2018 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.
Commissioning Editor: Pavan RamchandaniAcquisition Editor: Akshay JethaniContent Development Editor: Nithin George VargheseTechnical Editor: Komal KarneCopy Editor: Safis EditingProject Coordinator: Drashti PanchalProofreader: Safis EditingIndexer: Priyanka DhadkeGraphics: Tom ScariaProduction Coordinator: Aparna Bhagat
First published: September 2018
Production reference: 1290918
Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK.
ISBN 978-1-78934-648-0
www.packtpub.com
Mapt is an online digital library that gives you full access to over 5,000 books and videos, as well as industry leading tools to help you plan your personal development and advance your career. For more information, please visit our website.
Spend less time learning and more time coding with practical eBooks and Videos from over 4,000 industry professionals
Improve your learning with Skill Plans built especially for you
Get a free eBook or video every month
Mapt is fully searchable
Copy and paste, print, and bookmark content
Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.packt.com and as a print book customer, you are entitled to a discount on the eBook copy. Get in touch with us at [email protected] for more details.
At www.packt.com, you can also read a collection of free technical articles, sign up for a range of free newsletters, and receive exclusive discounts and offers on Packt books and eBooks.
Nessus and Nmap are among the most useful tools that a pentester relies on. However, it is difficult to find detailed information on how to use these tools and their rich set of features. This book covers all such aspects, ranging right from installation to configuration and execution. This book will help you gain mastery over some of the lesser known but very handy features of these tools, including how to use Nmap in a network with high latency and how to perform time-throttled scanning.
The book includes several real-life scenarios encountered by the author as part of his numerous ethical hacking assignments, making the content relevant and insightful for first-time users looking to gain confidence as well as those who are perhaps more seasoned.
If you are looking to master compliance scanning using Nessus and want to tweak things to meet your custom requirements, look no further—this book will help you understand this feature in detail and make the best of it. Another feature that would be of interest to security enthusiasts and that is covered in this book, is Nmap custom scripting, which is indispensable for when you want to create scripts where official scripts are not available.
Several such features are covered in the experience that the author shares with you, and they will not only help you understand the need for such advanced tools and capabilities, but will also equip you with what you need to master them.
Sairam is a veteran in the network and application security testing domain. With more than 5 years' experience in executing security projects for enterprise customers across the globe, he has really pushed the limits when it comes to use of the domain's tools. I am sure that you will gain a number of insights into the use of these tools and the real-world scenarios where each of these features can be applied.
Jose Varghese EVP & HEAD – MDR SERVICES, Co-Founder – Paladion Networks Pvt Ltd.
Sairam Jetty has more than 5 years of hands-on experience in many verticals of penetration testing, compliance, digital forensics, and malware research, and is currently working with Paladion Networks, Abu Dhabi, as a senior analyst and team lead. He has been assisting and associated with various financial, telecom, and industrial institutions with regard to testing and securing their applications and environments. Sairam has industry-standard certifications, such as OSCP, Digital Forensic Analyst, Digital Forensic Investigator, and Mobile Security Expert. He also specializes in source code review and mobile application security. He has acquired a great deal of knowledge of SCADA/ICS and nuclear security from his corporate experience and self-learning.
Prashant Verma (CISSP, QSA) leads the Incidence Response, Digital Forensics, and Red Team operations at Paladion Networks. He loves to evangelize about detection and response engineering. He has a strong background in vulnerability management and security auditing. He is co-author of Mobile Device Exploitation Cookbook and Security Testing Handbook for Banking Applications. He has presented at security conferences such as RSA, OWASP, NIBM, ISACA, and ClubHack. He has also authored security articles and given guest lectures and security training on a number of occasions.
If you're interested in becoming an author for Packt, please visit authors.packtpub.com and apply today. We have worked with thousands of developers and tech professionals, just like you, to help them share their insight with the global tech community. You can make a general application, apply for a specific hot topic that we are recruiting an author for, or submit your own idea.
Title Page
Copyright and Credits
Network Scanning Cookbook
Packt Upsell
Why subscribe?
Packt.com
Foreword
Contributors
About the author
About the reviewer
Packt is searching for authors like you
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the color images
Conventions used
Sections
Getting ready
How to do it…
How it works…
There's more…
See also
Get in touch
Reviews
Introduction to Network Vulnerability Scanning
Basic networks and their components
Network Vulnerability Scanning
Flow of procedures
Discovery
Port scanning
Vulnerability scanning
Uses
Complexity
Scope of the scan
Network architecture
Network access
Response
Summary
Understanding Network Scanning Tools
Introducing Nessus and Nmap
Useful features of Nessus
Policies
Plugin Rules
Customized Reports
Scanners
Various features of Nmap
Host discovery
Scan techniques
Port specification and scan order
Service or version detection
Script scan
OS detection
Timing and performance
Evasion and spoofing
Output
Target specification
Installing and activating Nessus
Getting ready
How to do it …
How it works…
There's more…
Downloading and installing Nmap
Getting ready
How to do it…
How it works…
There's more…
Updating Nessus
Getting ready
How to do it…
There's more…
Updating Nmap
Getting ready
How to do it…
Removing Nessus
Getting ready
How to do it…
There's more…
Removing Nmap
How to do it…
There's more…
Port Scanning
Introduction
How to specify a target
Getting ready
How do it…
How it works...
How to perform host discovery
How do it…
How it works…
How to identify open ports
How do it…
How it works…
How to manage specification and scan order
How do it…
How it works…
How to perform a script and version scan
How do it…
How it works …
How to detect operating system
How do it…
How it works…
How to detect and bypass network protection systems
How do it…
How it works…
How to use Zenmap
How do it…
How it works…
Vulnerability Scanning
Introduction
How to manage Nessus policies
Getting ready
How to do it…
How it works...
How to manage Nessus settings
Getting ready
How to do it…
How it works...
How to manage Nessus user accounts
Getting ready
How to do it…
How it works...
How to choose a Nessus scan template and policy
Getting ready
How to do it…
How it works...
How to perform a vulnerability scan using Nessus
Getting ready
How to do it…
How it works...
How to manage Nessus scans
Getting ready
How to do it…
How it works...
Configuration Audits
Introducing compliance scans
Selecting a compliance scan policy
Plugins
Synopsis
Description
Solution
Plugin information
Risk information
Vulnerability information
Reference information
Compliance standards
Getting ready
How do it…
How it works...
Introducing configuration audits
Database audit
Network device audit
Operating system audit
Application audit
Performing an operating system audit
Getting ready
How do it…
How it works...
Performing a database audit
Getting ready
How do it…
How it works...
Performing a web application scan
Getting ready
How do it…
How it works...
Report Analysis and Confirmation
Introduction
Understanding Nmap outputs
Getting ready
How do it…
How it works...
Understanding Nessus outputs
Nessus
HTML
CSV
Nessus DB
Getting ready
How do it…
How it works...
How to confirm Nessus vulnerabilities using Nmap and other tools
Getting ready
How do it…
How it works...
Understanding the Customization and Optimization of Nessus and Nmap
Introduction
Understanding Nmap Script Engine and its customization
Syntax
Environment variables
Script template
Getting ready
How do it…
How it works...
Understanding the Nessus Audit policy and its customization
Getting ready
How do it…
How it works...
Network Scanning for IoT, SCADA/ICS
Introduction to SCADA/ICS
Using Nmap to scan SCADA/ICS
Getting ready
How do it…
How it works...
There's more...
Using Nessus to scan SCADA/ICS systems
Getting ready
How do it..
How it works...
There's more...
Other Books You May Enjoy
Leave a review - let other readers know what you think
Network Scanning Cookbook is intended for the intermediate and advanced audience in the field of information security. This book enables a user to understand the key aspects of network security scanning using Nmap and Nessus. It begins with an introduction to network scanning techniques and quickly moves onto the specifics of using Nmap and Nessus to perform network scans for configuration audits of devices. This book also explores a number of tools that will make your network scanning techniques highly customizable, further catering to the needs of any complex network audits that you might have to carry out. The book ends by looking at how these tools can be used to perform simple audits on critical systems such as SCADA/ICS.
This book acts as a great resource for network administrators trying to identify their network security posture, beginners in information security who are looking to leap into their information security careers, and executives such as information security consultants and information security auditors.
Chapter 1, Introduction to Network Vulnerability Scanning, introduces basic network components and their architecture. It also explains the methods and methodologies of network vulnerability scanning and the complexities involved in it, and looks at mitigation planning for identified vulnerabilities.
Chapter 2, Understanding Network Scanning Tools, consists of recipes that will give you a basic understanding of the Nessus and Nmap tools, including the technical requirements to install these tools and the details of their workings. The chapter then dives into the installation and removal instructions for Nessus and Nmap.
Chapter 3, Port Scanning, consists of recipes on techniques for performing port scanning. It begins with instructions and details regarding host discovery, moving to open ports, scripts, and version scanning. It also gives insights into evading network protection systems while performing port scans.
Chapter 4, Vulnerability Scanning, consists of recipes on managing the features of Nessus, such as policies, settings, and user accounts. You will also get get to grips with the steps for performing a network vulnerability scan using Nessus before then managing the scan results.
Chapter 5, Configuration Audit, consists of recipes for performing configuration audits and gap analyses on multiple platforms using Nessus. It takes you through a step-by-step process for creating, selecting, and configuring policies to perform configuration audits on operating systems, databases, and web applications.
Chapter 6, Report Analysis and Confirmation, will teach you how to create effective reports by analyzing the results from Nmap and Nessus scans. The recipes in this chapter will give a detailed insight into the supported report types and the level of customization these tools allow. It also gives details on some techniques for confirming vulnerabilities reported by Nessus and Nmap using various tools.
Chapter 7, Understanding the Customization and Optimization of Nessus and Nmap, teaches you about the creation of custom scripts and audit files for Nmap and Nessus. These recipes provide step-by-step procedures for replicating the method for the customization of audit files.
Chapter 8, Network Scanning for IoT, SCADA, and ICS, consists of recipes for understanding the network scanning procedure for SCADA and ICS systems. The recipes outline methods for using Nmap and Nessus to perform port scanning and network vulnerability scanning by ensuring the high availability of these critical systems.
You should have a good working knowledge of computer networks and vulnerability scanning so you can understand the terminologies and methodologies used in this book.
In order to follow the recipes, you will need to be running Windows or Kali Linux, and will require Metasploitable 2 by Rapid7 with the latest versions of Nmap and Nessus. For some of the recipes, such as those to do with configuration audits, you will need to have a Nessus professional license.
We also provide a PDF file that has color images of the screenshots/diagrams used in this book. You can download it here: https://www.packtpub.com/sites/default/files/downloads/9781789346480_ColorImages.pdf.
There are a number of text conventions used throughout this book.
CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "Install the downloaded .msi file by following the instructions."
Any command-line input or output is written as follows:
nmap -sS -sV -PN -T4 -oA testsmtp -p T:25 -v -r 192.168.1.*
Bold: Indicates a new term, an important word, or words that you see on screen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Select Quick scan from the Profile drop-down list."
In this book, you will find several headings that appear frequently (Getting ready, How to do it..., How it works..., There's more..., and See also).
To give clear instructions on how to complete a recipe, use these sections as follows:
This section tells you what to expect in the recipe and describes how to set up any software or any preliminary settings required for the recipe.
This section contains the steps required to follow the recipe.
This section usually consists of a detailed explanation of what happened in the previous section.
This section consists of additional information about the recipe in order to make you more knowledgeable about the recipe.
This section provides helpful links to other useful information for the recipe.
Feedback from our readers is always welcome.
General feedback: If you have questions about any aspect of this book, mention the book title in the subject of your message and email us at [email protected].
Errata: Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you have found a mistake in this book, we would be grateful if you would report this to us. Please visit www.packt.com/submit-errata, selecting your book, clicking on the Errata Submission Form link, and entering the details.
Piracy: If you come across any illegal copies of our works in any form on the internet, we would be grateful if you would provide us with the location address or website name. Please contact us at [email protected] with a link to the material.
If you are interested in becoming an author: If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, please visit authors.packtpub.com.
Please leave a review. Once you have read and used this book, why not leave a review on the site that you purchased it from? Potential readers can then see and use your unbiased opinion to make purchase decisions, we at Packt can understand what you think about our products, and our authors can see your feedback on their book. Thank you!
For more information about Packt, please visit packt.com.
In today's times, where hackers are prevalent and there are critical vulnerabilities discovered in various products every day, corporate networks are required to create procedures to identify, analyze, and mitigate vulnerabilities in real time. In this cookbook, we will be looking into various procedures and tools required to perform network security scanning and to understand and act on the results obtained.
This cookbook will equip any reader with a basic knowledge of computer networks with recipes to prepare, plan, and execute a Network Vulnerability Scan and determine the targets for a penetration test, or just to understand the security posture of the network. This will help budding penetration testers to conquer and learn to cook their methods to perform preliminary steps to identify vulnerabilities.
This chapter will introduce you to the basics of computer networks. It also dives into the procedures, uses, and various complexities to consider while performing a Network Vulnerability Scan. This chapter will equip you with basic knowledge of how to plan a Network Vulnerability Scan.
In this chapter, we will cover the following:
Basic networks and their components
Network Vulnerability Scanning
Flow of procedures used in Network Vulnerability Scanning
Uses of performing a Network Vulnerability Scan
Complexity of performing network scans
How to devise a mitigation plan and respond
A basic corporate network typically consists of endpoints such as desktops/laptops, servers, security devices such as Firewall, proxy, intrusion detection and prevention systems, and network devices such as hubs, switches, and routers. Most of the time, these are acquired from various vendors, thus they are susceptible to different attacks, and expose the network to a larger attack surface. These components can be attacked by a hacker using publicly available exploits or a zero-day vulnerability to gain access to the device/machine with a possibility of gaining access to a different device/machine in the network or whole network itself. Note the following diagram to illustrate this:
A vulnerability is a weakness present in a system or device that is exposed to a possibility of being attacked. Network Vulnerability Scanning is a process of looking into identifying and detecting vulnerabilities in the network components such as clients, servers, network devices, and endpoints, using various automated or manual tools and techniques. It can be broadly classified into two types: internal network vulnerability scan and external network vulnerability scan.
The i
