Network Scanning Cookbook - Sairam Jetty - E-Book

Network Scanning Cookbook E-Book

Sairam Jetty

0,0
40,81 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

Discover network vulnerabilities and threats to design effective network security strategies




Key Features



  • Plunge into scanning techniques using the most popular tools


  • Effective vulnerability assessment techniques to safeguard network infrastructure


  • Explore the Nmap Scripting Engine (NSE) and the features used for port and vulnerability scanning





Book Description



Network scanning is a discipline of network security that identifies active hosts on networks and determining whether there are any vulnerabilities that could be exploited. Nessus and Nmap are among the top tools that enable you to scan your network for vulnerabilities and open ports, which can be used as back doors into a network.






Network Scanning Cookbook contains recipes for configuring these tools in your infrastructure that get you started with scanning ports, services, and devices in your network. As you progress through the chapters, you will learn how to carry out various key scanning tasks, such as firewall detection, OS detection, and access management, and will look at problems related to vulnerability scanning and exploitation in the network. The book also contains recipes for assessing remote services and the security risks that they bring to a network infrastructure.






By the end of the book, you will be familiar with industry-grade tools for network scanning, and techniques for vulnerability scanning and network protection.




What you will learn



  • Install and configure Nmap and Nessus in your network infrastructure


  • Perform host discovery to identify network devices


  • Explore best practices for vulnerability scanning and risk assessment


  • Understand network enumeration with Nessus and Nmap


  • Carry out configuration audit using Nessus for various platforms


  • Write custom Nessus and Nmap scripts on your own



Who this book is for



If you're a network engineer or information security professional wanting to protect your networks and perform advanced scanning and remediation for your network infrastructure, this book is for you.

Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:

EPUB

Seitenzahl: 182

Veröffentlichungsjahr: 2018

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Network Scanning Cookbook

 

 

 

 

 

Practical network security using Nmap and Nessus 7

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Sairam Jetty

 

 

 

 

 

 

 

 

 

 

 

 

BIRMINGHAM - MUMBAI

Network Scanning Cookbook

Copyright © 2018 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

Commissioning Editor: Pavan RamchandaniAcquisition Editor: Akshay JethaniContent Development Editor: Nithin George VargheseTechnical Editor: Komal KarneCopy Editor: Safis EditingProject Coordinator: Drashti PanchalProofreader: Safis EditingIndexer: Priyanka DhadkeGraphics: Tom ScariaProduction Coordinator: Aparna Bhagat

First published: September 2018

Production reference: 1290918

Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK.

ISBN 978-1-78934-648-0

www.packtpub.com

  
mapt.io

Mapt is an online digital library that gives you full access to over 5,000 books and videos, as well as industry leading tools to help you plan your personal development and advance your career. For more information, please visit our website.

Why subscribe?

Spend less time learning and more time coding with practical eBooks and Videos from over 4,000 industry professionals

Improve your learning with Skill Plans built especially for you

Get a free eBook or video every month

Mapt is fully searchable

Copy and paste, print, and bookmark content

Packt.com

Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.packt.com and as a print book customer, you are entitled to a discount on the eBook copy. Get in touch with us at [email protected] for more details.

At www.packt.com, you can also read a collection of free technical articles, sign up for a range of free newsletters, and receive exclusive discounts and offers on Packt books and eBooks. 

Foreword

Nessus and Nmap are among the most useful tools that a pentester relies on. However, it is difficult to find detailed information on how to use these tools and their rich set of features. This book covers all such aspects, ranging right from installation to configuration and execution. This book will help you gain mastery over some of the lesser known but very handy features of these tools, including how to use Nmap in a network with high latency and how to perform time-throttled scanning.

The book includes several real-life scenarios encountered by the author as part of his numerous ethical hacking assignments, making the content relevant and insightful for first-time users looking to gain confidence as well as those who are perhaps more seasoned.

If you are looking to master compliance scanning using Nessus and want to tweak things to meet your custom requirements, look no further—this book will help you understand this feature in detail and make the best of it. Another feature that would be of interest to security enthusiasts and that is covered in this book, is Nmap custom scripting, which is indispensable for when you want to create scripts where official scripts are not available.

Several such features are covered in the experience that the author shares with you, and they will not only help you understand the need for such advanced tools and capabilities, but will also equip you with what you need to master them.

Sairam is a veteran in the network and application security testing domain. With more than 5 years' experience in executing security projects for enterprise customers across the globe, he has really pushed the limits when it comes to use of the domain's tools. I am sure that you will gain a number of insights into the use of these tools and the real-world scenarios where each of these features can be applied.

 

Jose Varghese EVP & HEAD – MDR SERVICES, Co-Founder – Paladion Networks Pvt Ltd.

Contributors

About the author

Sairam Jetty has more than 5 years of hands-on experience in many verticals of penetration testing, compliance, digital forensics, and malware research, and is currently working with Paladion Networks, Abu Dhabi, as a senior analyst and team lead. He has been assisting and associated with various financial, telecom, and industrial institutions with regard to testing and securing their applications and environments. Sairam has industry-standard certifications, such as OSCP, Digital Forensic Analyst, Digital Forensic Investigator, and Mobile Security Expert. He also specializes in source code review and mobile application security. He has acquired a great deal of knowledge of SCADA/ICS and nuclear security from his corporate experience and self-learning.

 

I would like to thank my family for being my strength. Thanks to Prashant Verma and Dinesh Barai for their technical support. Thanks to the team at Packt for the support they have extended, and special thanks to Nithin George Varghese and Akshay Jethani for putting up with me.

About the reviewer

Prashant Verma (CISSP, QSA) leads the Incidence Response, Digital Forensics, and Red Team operations at Paladion Networks. He loves to evangelize about detection and response engineering. He has a strong background in vulnerability management and security auditing. He is co-author of Mobile Device Exploitation Cookbook and Security Testing Handbook for Banking Applications. He has presented at security conferences such as RSA, OWASP, NIBM, ISACA, and ClubHack. He has also authored security articles and given guest lectures and security training on a number of occasions.

 

 

 

Packt is searching for authors like you

If you're interested in becoming an author for Packt, please visit authors.packtpub.com and apply today. We have worked with thousands of developers and tech professionals, just like you, to help them share their insight with the global tech community. You can make a general application, apply for a specific hot topic that we are recruiting an author for, or submit your own idea.

Table of Contents

Title Page

Copyright and Credits

Network Scanning Cookbook

Packt Upsell

Why subscribe?

Packt.com

Foreword

Contributors

About the author

About the reviewer

Packt is searching for authors like you

Preface

Who this book is for

What this book covers

To get the most out of this book

Download the color images

Conventions used

Sections

Getting ready

How to do it…

How it works…

There's more…

See also

Get in touch

Reviews

Introduction to Network Vulnerability Scanning

Basic networks and their components

Network Vulnerability Scanning

Flow of procedures

Discovery

Port scanning

Vulnerability scanning

Uses

Complexity

Scope of the scan

Network architecture

Network access

Response

Summary

Understanding Network Scanning Tools

Introducing Nessus and Nmap

Useful features of Nessus

Policies

Plugin Rules

Customized Reports

Scanners

Various features of Nmap

Host discovery

Scan techniques

Port specification and scan order

Service or version detection

Script scan

OS detection

Timing and performance

Evasion and spoofing

Output

Target specification

Installing and activating Nessus

Getting ready

How to do it …

How it works…

There's more…

Downloading and installing Nmap

Getting ready

How to do it…

How it works…

There's more…

Updating Nessus

Getting ready

How to do it…

There's more…

Updating Nmap

Getting ready

How to do it…

Removing Nessus

Getting ready

How to do it…

There's more…

Removing Nmap

How to do it…

There's more…

Port Scanning

Introduction

How to specify a target

Getting ready

How do it…

How it works...

How to perform host discovery

How do it…

How it works…

How to identify open ports

How do it…

How it works…

How to manage specification and scan order

How do it…

How it works…

How to perform a script and version scan

How do it…

How it works …

How to detect operating system

How do it…

How it works…

How to detect and bypass network protection systems

How do it…

How it works…

How to use Zenmap

How do it…

How it works…

Vulnerability Scanning

Introduction

How to manage Nessus policies

Getting ready

How to do it…

How it works...

How to manage Nessus settings

Getting ready

How to do it…

How it works...

How to manage Nessus user accounts

Getting ready

How to do it…

How it works...

How to choose a Nessus scan template and policy

Getting ready

How to do it…

How it works...

How to perform a vulnerability scan using Nessus

Getting ready

How to do it…

How it works...

How to manage Nessus scans

Getting ready

How to do it…

How it works...

Configuration Audits

Introducing compliance scans

Selecting a compliance scan policy

Plugins

Synopsis

Description

Solution

Plugin information

Risk information

Vulnerability information

Reference information

Compliance standards

Getting ready

How do it…

How it works...

Introducing configuration audits

Database audit

Network device audit

Operating system audit

Application audit

Performing an operating system audit

Getting ready

How do it…

How it works...

Performing a database audit

Getting ready

How do it…

How it works...

Performing a web application scan

Getting ready

How do it…

How it works...

Report Analysis and Confirmation

Introduction

Understanding Nmap outputs

Getting ready

How do it…

How it works...

Understanding Nessus outputs

Nessus

HTML

CSV

Nessus DB

Getting ready

How do it…

How it works...

How to confirm Nessus vulnerabilities using Nmap and other tools

Getting ready

How do it…

How it works...

Understanding the Customization and Optimization of Nessus and Nmap

Introduction

Understanding Nmap Script Engine and its customization

Syntax

Environment variables

Script template

Getting ready

How do it…

How it works...

Understanding the Nessus Audit policy and its customization

Getting ready

How do it…

How it works...

Network Scanning for IoT, SCADA/ICS

Introduction to SCADA/ICS

Using Nmap to scan SCADA/ICS

Getting ready

How do it…

How it works...

There's more...

Using Nessus to scan SCADA/ICS systems

Getting ready

How do it..

How it works...

There's more...

Other Books You May Enjoy

Leave a review - let other readers know what you think

Preface

Network Scanning Cookbook is intended for the intermediate and advanced audience in the field of information security. This book enables a user to understand the key aspects of network security scanning using Nmap and Nessus. It begins with an introduction to network scanning techniques and quickly moves onto the specifics of using Nmap and Nessus to perform network scans for configuration audits of devices. This book also explores a number of tools that will make your network scanning techniques highly customizable, further catering to the needs of any complex network audits that you might have to carry out. The book ends by looking at how these tools can be used to perform simple audits on critical systems such as SCADA/ICS.

Who this book is for

This book acts as a great resource for network administrators trying to identify their network security posture, beginners in information security who are looking to leap into their information security careers, and executives such as information security consultants and information security auditors.

What this book covers

Chapter 1, Introduction to Network Vulnerability Scanning, introduces basic network components and their architecture. It also explains the methods and methodologies of network vulnerability scanning and the complexities involved in it, and looks at mitigation planning for identified vulnerabilities.

Chapter 2, Understanding Network Scanning Tools, consists of recipes that will give you a basic understanding of the Nessus and Nmap tools, including the technical requirements to install these tools and the details of their workings. The chapter then dives into the installation and removal instructions for Nessus and Nmap. 

Chapter 3, Port Scanning, consists of recipes on techniques for performing port scanning. It begins with instructions and details regarding host discovery, moving to open ports, scripts, and version scanning. It also gives insights into evading network protection systems while performing port scans.

Chapter 4, Vulnerability Scanning, consists of recipes on managing the features of Nessus, such as policies, settings, and user accounts. You will also get get to grips with the steps for performing a network vulnerability scan using Nessus before then managing the scan results.

Chapter 5, Configuration Audit, consists of recipes for performing configuration audits and gap analyses on multiple platforms using Nessus. It takes you through a step-by-step process for creating, selecting, and configuring policies to perform configuration audits on operating systems, databases, and web applications.

Chapter 6, Report Analysis and Confirmation, will teach you how to create effective reports by analyzing the results from Nmap and Nessus scans. The recipes in this chapter will give a detailed insight into the supported report types and the level of customization these tools allow. It also gives details on some techniques for confirming vulnerabilities reported by Nessus and Nmap using various tools. 

Chapter 7, Understanding the Customization and Optimization of Nessus and Nmap, teaches you about the creation of custom scripts and audit files for Nmap and Nessus. These recipes provide step-by-step procedures for replicating the method for the customization of audit files.

Chapter 8, Network Scanning for IoT, SCADA, and ICS, consists of recipes for understanding the network scanning procedure for SCADA and ICS systems. The recipes outline methods for using Nmap and Nessus to perform port scanning and network vulnerability scanning by ensuring the high availability of these critical systems.

To get the most out of this book

You should have a good working knowledge of computer networks and vulnerability scanning so you can understand the terminologies and methodologies used in this book.

In order to follow the recipes, you will need to be running Windows or Kali Linux, and will require Metasploitable 2 by Rapid7 with the latest versions of Nmap and Nessus. For some of the recipes, such as those to do with configuration audits, you will need to have a Nessus professional license.

Download the color images

We also provide a PDF file that has color images of the screenshots/diagrams used in this book. You can download it here: https://www.packtpub.com/sites/default/files/downloads/9781789346480_ColorImages.pdf.

Conventions used

There are a number of text conventions used throughout this book.

CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: "Install the downloaded .msi file by following the instructions."

Any command-line input or output is written as follows:

nmap -sS -sV -PN -T4 -oA testsmtp -p T:25 -v -r 192.168.1.*

Bold: Indicates a new term, an important word, or words that you see on screen. For example, words in menus or dialog boxes appear in the text like this. Here is an example: "Select Quick scan from the Profile drop-down list."

Warnings or important notes appear like this.
Tips and tricks appear like this.

Sections

In this book, you will find several headings that appear frequently (Getting ready, How to do it..., How it works..., There's more..., and See also).

To give clear instructions on how to complete a recipe, use these sections as follows:

Getting ready

This section tells you what to expect in the recipe and describes how to set up any software or any preliminary settings required for the recipe.

How to do it…

This section contains the steps required to follow the recipe.

How it works…

This section usually consists of a detailed explanation of what happened in the previous section.

There's more…

This section consists of additional information about the recipe in order to make you more knowledgeable about the recipe.

See also

This section provides helpful links to other useful information for the recipe.

Get in touch

Feedback from our readers is always welcome.

General feedback: If you have questions about any aspect of this book, mention the book title in the subject of your message and email us at [email protected].

Errata: Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you have found a mistake in this book, we would be grateful if you would report this to us. Please visit www.packt.com/submit-errata, selecting your book, clicking on the Errata Submission Form link, and entering the details.

Piracy: If you come across any illegal copies of our works in any form on the internet, we would be grateful if you would provide us with the location address or website name. Please contact us at [email protected] with a link to the material.

If you are interested in becoming an author: If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, please visit authors.packtpub.com.

Reviews

Please leave a review. Once you have read and used this book, why not leave a review on the site that you purchased it from? Potential readers can then see and use your unbiased opinion to make purchase decisions, we at Packt can understand what you think about our products, and our authors can see your feedback on their book. Thank you!

For more information about Packt, please visit packt.com.

Introduction to Network Vulnerability Scanning

In today's times, where hackers are prevalent and there are critical vulnerabilities discovered in various products every day, corporate networks are required to create procedures to identify, analyze, and mitigate vulnerabilities in real time. In this cookbook, we will be looking into various procedures and tools required to perform network security scanning and to understand and act on the results obtained.

This cookbook will equip any reader with a basic knowledge of computer networks with recipes to prepare, plan, and execute a Network Vulnerability Scan and determine the targets for a penetration test, or just to understand the security posture of the network. This will help budding penetration testers to conquer and learn to cook their methods to perform preliminary steps to identify vulnerabilities.

This chapter will introduce you to the basics of computer networks. It also dives into the procedures, uses, and various complexities to consider while performing a Network Vulnerability Scan. This chapter will equip you with basic knowledge of how to plan a Network Vulnerability Scan.

In this chapter, we will cover the following: 

Basic networks and their components

Network Vulnerability Scanning

Flow of procedures used in Network Vulnerability Scanning

Uses of performing a Network Vulnerability Scan

Complexity of performing network scans

How to devise a mitigation plan and respond

Basic networks and their components

A basic corporate network typically consists of endpoints such as desktops/laptops, servers, security devices such as Firewall, proxy, intrusion detection and prevention systems, and network devices such as hubs, switches, and routers. Most of the time, these are acquired from various vendors, thus they are susceptible to different attacks, and expose the network to a larger attack surface. These components can be attacked by a hacker using publicly available exploits or a zero-day vulnerability to gain access to the device/machine with a possibility of gaining access to a different device/machine in the network or whole network itself. Note the following diagram to illustrate this:

Network Vulnerability Scanning

A vulnerability is a weakness present in a system or device that is exposed to a possibility of being attacked. Network Vulnerability Scanning is a process of looking into identifying and detecting vulnerabilities in the network components such as clients, servers, network devices, and endpoints, using various automated or manual tools and techniques. It can be broadly classified into two types: internal network vulnerability scan and external network vulnerability scan.

The i