{"id":74,"date":"2025-05-05T16:44:35","date_gmt":"2025-05-05T16:44:35","guid":{"rendered":"https:\/\/cyberstec.com\/?p=74"},"modified":"2025-05-05T16:45:03","modified_gmt":"2025-05-05T16:45:03","slug":"vulnerability-assessment","status":"publish","type":"post","link":"https:\/\/cyberstec.com\/index.php\/2025\/05\/05\/vulnerability-assessment\/","title":{"rendered":"Vulnerability Assessment"},"content":{"rendered":"\n<p>FOOTPRINTING: <\/p>\n\n\n\n<p>Online search. Employee directories, locations,&#8230; for social engineering or tech attack<\/p>\n\n\n\n<p>Source Code<\/p>\n\n\n\n<p>Business\/Gov websites with info on management team and financial holding<\/p>\n\n\n\n<p>WHOIS tool (assigned IP addresses and domain name registration access -> scanning address range (fingerprinting) with port scanners (NMAP). Port numbers greater then 1023 (in the overall 65,535 ports) are called ephemeral ports (under 1024 reserved ports)<\/p>\n\n\n\n<p> -&gt; Open ports?<\/p>\n\n\n\n<p>FIREWALL TOOLS: NMAP idle scan, firewall scanning for firewall rules<\/p>\n\n\n\n<p>ACTIVE VULNERABILITY SCANNERS: OpenVas. Initiates traffic on the network to determine security holes<\/p>\n\n\n\n<p>EXPLOITATION SOFTWARE: Metasploit<\/p>\n\n\n\n<p>NETWORK PACKET SNIFFER: Snort or Wireshark. EAVESDROP ON NETWORK TRAFFIC<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Vulnerability Remediation<\/h1>\n\n\n\n<p>defense mitigation, transference, acceptance, and termination<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Configuration and Change Management<\/h1>\n\n\n\n<p>CCM is an approach to implementing system change that uses policies, procedures, techniques, and tools to manage and evaluate proposed changes. Track changes through completion and maintain systems inventory and supporting documentation.<\/p>\n\n\n\n<p>CCM software scan and inventory&#8230; run periodically to scan for changes<\/p>\n\n\n\n<p>In step one of the CCM program, the organization specifies which changes to it systems should be configuration-controlled. In other words, which changes need to undergo formal review and which changes can be made on the individual managers or systems administrators<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">step 1<\/h2>\n\n\n\n<p>test changes on test environment before applying it to production environment<\/p>\n\n\n\n<p>Scan test environment for vulnerabilities cchanges and other anomalies<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">step2<\/h2>\n\n\n\n<p>Reviewers: is it needed? does it improve performance or security? <\/p>\n\n\n\n<p>The change is technically correct, necessary, and feasible within the system constraints. <\/p>\n\n\n\n<p>Whether the other systems will be affected by the change. <\/p>\n\n\n\n<p>Whether the cost of implementing the change were considered and are appropriate. <\/p>\n\n\n\n<p>Whether other security components would be affected by the change, when the change if improved should be performed. -> ACCEPTED, DENIED, DEFERRED<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">step3<\/h2>\n\n\n\n<p>Document changes<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">step4<\/h2>\n\n\n\n<p>Implement the change<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">step5<\/h2>\n\n\n\n<p>retain changes docs<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">step6<\/h2>\n\n\n\n<p>audit changes<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">step7<\/h2>\n\n\n\n<p>CCM oversight. the organization ensures the overall program is reviewed and managed by a CCM committee or board. This ensures the manager or committee that is approving changes is doing a good job. In general, CCM should not interfere with the use of the technology.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>FOOTPRINTING: Online search. Employee directories, locations,&#8230; for social engineering or tech attack Source Code Business\/Gov websites with info on management team and financial holding WHOIS tool (assigned IP addresses and&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-74","post","type-post","status-publish","format-standard","hentry","category-study-notes"],"_links":{"self":[{"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/posts\/74","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/comments?post=74"}],"version-history":[{"count":3,"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/posts\/74\/revisions"}],"predecessor-version":[{"id":90,"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/posts\/74\/revisions\/90"}],"wp:attachment":[{"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/media?parent=74"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/categories?post=74"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/tags?post=74"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}