Notes - MCS
Analysis and Exploration of Vulnerabilities
Notes - MCS
Analysis and Exploration of Vulnerabilities
  • Analysis and Exploration of Vulnerabilities
  • Vulnerabilities
    • Vulnerabilities
      • CIA Triad
      • Vulnerability Sources
    • Vulnerability Tracking
    • Vulnerability Disclosure
  • Vulnerability Assessment of Networked Systems
    • Vulnerability Research
    • Vulnerability Assessment
    • Penetration Test
      • Scope
    • Types of Assessments
    • Vulnerability Management Life Cycle
  • Enumeration and Information Leakage
    • Network access
    • Information leakage
    • Errors
    • Web Sources and Support Files
    • Cookies
    • Ports
    • Banners
    • OS Fingerprinting
  • Injection
    • CWE-74
    • How it works
    • Common Pitfalls
    • CWE-89 SQL Injection
    • Using SQL
    • Things to consider
    • The NULL plate
    • SQLi types
    • SQL Injection - Avoiding
    • CWE-78 OS Command Injection
    • Command Override
    • Argument Exploitation
    • GTFOBins and LOLBAS
    • Environmental Variables
    • Parameter Expansion
    • Code Injection - CWE-94
    • Avoiding OS Injection
  • Broken Authentication
    • OWASP A2
    • HTTP Basics
    • HTTP Communication
    • Authentication
    • Authentication Flow State
    • Referer Header
    • SESSION ID
    • Cookies (RFC 6265)
    • JWT - JSON Web Tokens
  • XSS Cross Site Scripting
    • Prevalence and Detectability
    • Reflected XSS
    • Stored XSS
    • DOM XSS
    • Cross Site Request Forgery
    • Avoiding XSS
    • Same Origin Policy
  • Concurrency
    • Concurrency
    • CWE-361 - 7PK - Time and State
    • Basic Time Related CWEs
      • CWE-362 – Race Condition
    • Serializability
    • Database ACID characteristic
    • State Related CWEs
    • Basic Side Effects Related CWEs (Covert Channel)
    • Covert Timing Channel
    • Meltdown Type
  • Buffers
    • Buffer Overflow
    • Popularity decline
    • Potentially Vulnerable Software
    • Dominant prevalence
    • Vulnerabilities in languages (mostly C/C++)
    • Why? Memory Structure 101
    • CWE-120 Classic Overflow
      • Practical Examples
    • Stack Based Vulnerabilities
    • Stack Smashing
    • Countermeasures
    • ROP
Powered by GitBook
On this page
  1. Vulnerability Assessment of Networked Systems

Penetration Test

Penetration tests focus on infrastructures and systems with an idea of outside and inside.

  • Outside: out of the domain (other domain or the internet).

  • Inside: in the domain.

Tests the capability of entering a domain and its impact.

  • How an attacker entered (which flaws or bugs were used).

  • How/if an attacker moved laterally.

  • What other systems it may have reached?

  • What data/systems were impacted?

  • Was data exfiltrated?

Why

An essential process in current organizations, products, and systems.

  • Two distinct views: Internal and External.

The current organizational landscape is complex.

  • Heterogeneous computing environment.

    • Servers, desktops, laptops, BYOD…

  • Multiple applications.

    • From multiple vendors.

    • Developed over time, using different tools, languages, and stacks.

  • Rely on communication networks.

    • Not all are confined (e.g. Wi-Fi).

  • Rely on external services and actors.

Important to understand what are the risks, what to address, and what processes should be in place.

Standard defensive measures are not enough.

  • They help create/operate the software with greater security.

  • They are also limited to the mindset of the developers/ops.

Defensive technologies are limited in capabilities.

  • Firewall: Filter packets, and connections.

    • mostly used as perimeter control devices (but do not supervise internal networks).

    • inspect packets in clear, or publicly available data (ports, IP Addresses, protocols), but struggles with TLS.

  • WAF: Filter HTTP requests.

    • matches profiles of known attacks (deny list), or allowed requests (allow list), but may be circumvented.

  • IDS: Network/Host Intrusion Detection Systems monitor network or OS changes.

    • Matches profiles of known attacks, but may be circumvented.

    • May detect and block an attack AFTER it was done.

Last updated 1 year ago