4.3 Vulnerability scanning Flashcards

(5 cards)

1
Q

Vulnerability scanning

A
  • Usually minimally invasive– Unlike a penetration test
  • Port scan– Poke around and see what’s open
  • Identify systems– And security devices
  • Test from the outside and inside– Don’t dismiss insider threats
  • Gather as much information as possible– We’ll separate wheat from chaff later
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Static code analyzers

A
  • Static Application Security Testing (SAST)– Help to identify security flaws
  • Many security vulnerabilities found easily– Buffer overflows, database injections, etc.
  • Not everything can be identified through analysis– Authentication security, insecure cryptography, etc.– Don’t rely on automation for everything
  • Still have to verify each finding. False positives are an issue.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Dynamic analysis (fuzzing)

A
  • Send random input to an application– Fault-injecting, robustness testing, syntax testing,
    negative testing
  • Looking for something out of the ordinary– Application crash, server error, exception
  • 1988 class project at the University of Wisconsin– “Operating System Utility Program Reliability”– Professor Barton Miller– The Fuzz Generator
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fuzzing engines and frameworks

A
  • Many different fuzzing options– Platform specific, language specific, etc.
  • Very time and processor resource heavy– Many, many different iterations to try– Many fuzzing engines use high-probability tests
  • Carnegie Mellon Computer– Emergency Response Team (CERT)– CERT Basic Fuzzing Framework (BFF)– https://professormesser.link/b
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Package monitoring

A
  • Some applications are distributed in a package– Especially open source– Supply chain integrity
  • Confirm the package is legitimate– Trusted source– No added malware– No embedded vulnerabilities
  • Confirm a safe package before deployment– Verify the contents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly