• 136 | Chapter 4: Looking for Vulnerabilities
  • Remote Vulnerabilities | 135




    Download 22,59 Mb.
    Pdf ko'rish
    bet129/225
    Sana14.05.2024
    Hajmi22,59 Mb.
    #232856
    1   ...   125   126   127   128   129   130   131   132   ...   225
    Bog'liq
    learningkalilinux

    Remote Vulnerabilities | 135


    Figure 4-12. Report dashboard
    When you select the scan you want the report from, you will be presented with a list
    of all vulnerabilities that were found. When I use the word 
    report
    , it may sound like
    we are talking about an actual document, which you can certainly get, but really all
    we’re looking for is the list of findings and their details. We can get all of that just as
    easily from the web interface as we can from a document. I find it easier in most cases
    to be able to click back and forth from the list to the details as needed. Your own
    mileage will, of course, vary, depending on what’s most comfortable for you.
    Figure 4-13
     shows the list of vulnerabilities resulting from the scan of my network. I
    like to keep some vulnerable systems around for fun and demonstration purposes.
    Having everything up-to-date wouldn’t yield us much to look at.
    Figure 4-13. List of vulnerabilities
    136 | Chapter 4: Looking for Vulnerabilities


    You’ll see seven columns. Some of these are fairly self-explanatory. The Vulnerability
    and Severity columns should be easy to understand. The vulnerability is a short
    description of the finding. The severity is worth talking about, though. This assess‐
    ment is based on the impact that may result from the vulnerability being exploited.
    The issue with the severity provided by the vulnerability scanner is that it doesn’t take
    anything else into account. All it knows is the severity that goes with that vulnerabil‐
    ity, regardless of any other mitigations that are in place that could limit the exposure
    to the vulnerability. This is where having a broader idea of the environment can help.
    As an example, let’s say there is an issue with a web server, like a vulnerability in PHP,
    a programming language for web development. However, the website could be con‐
    figured with two-factor authentication and special access could be granted just for
    this scan. This means only authenticated users could get access to the site to exploit
    the vulnerability.
    Just because mitigations are in place for issues that may reduce their overall impact
    on the organization doesn’t mean those issues should be ignored. All it means is that
    the bar is higher for an attacker, not that it’s impossible for the exploit to happen.
    Experience and a good understanding of the environment will help you to key in on
    your findings. The objective shouldn’t be to frighten the bejeebers out of people but
    instead to provide them with a reasonable expectation of where they sit from the
    standpoint of exposure to attack. Working with the organization will ideally get them
    to improve their overall security posture.
    The next column to talk about is the QoD, or Quality of Detection, column. As noted
    earlier, the vulnerability scanner can’t be absolutely certain that the vulnerability
    exists. The QoD rating indicates how certain the scanner is that the vulnerability
    exists. The higher the score, the more certain the scanner is. If you have a high QoD
    and a high severity, this is probably a vulnerability that someone should be investigat‐
    ing. As an example, one of the findings is shown in 
    Figure 4-14
    . This has a QoD of
    99% and a severity of 10, which is as high as the scanner goes. OpenVAS considers
    this a serious issue that it believes is confirmed. This is shown by the output received
    from the system under test.
    Figure 4-14. Ruby finding in OpenVAS

    Download 22,59 Mb.
    1   ...   125   126   127   128   129   130   131   132   ...   225




    Download 22,59 Mb.
    Pdf ko'rish