Network Visualization and Vulnerability Detection
Network Visualization and Vulnerability Detection
Introduction
​
The content of network visualization and vulnerability detection is a fundamental course evaluating different open-source tools and basics concepts of network visualization, vulnerability detection. Hands-on leveraging the tools with excellent outcomes of producing several white-papers or engineering notes that applicable at any level of the security positions in the industry.
Course Artifacts
​
The course content is very dense towards significant aspects of security, from setting up the environment to execute tools safely, against exploitable machines. Right on the first assignment, we can mention the ethics and professionalism aspect, the fact as a conduct a research and tools comparison, we were conducting in an isolated environment and following rules of engagement and ethical issues of the research, and not engaging with public endpoints.
The research behind is leveraged in my current projects and drive improvements in the offensive security business.
Threat and Vulnerability management scanners are crucial tools for the enterprise scope to help identify, assess, and remediate endpoint weaknesses.
Enterprises’ vulnerability management serves as an infrastructure for reducing organizational exposure, hardening endpoint surface area, and increasing organizational resilience.
The main benefit of threat and vulnerability management is that it helps to close the gap among security administrators, security operations, and IT administrators.
The tools evaluated and used are used professionally by thousands, if not millions of companies across the globe, to assess the security posture and to conduct a step-by-step of exploiting a vulnerable system using a system that emulates adversarial behavior such as the Metasploit framework.
We explored tools and techniques that attackers have at their disposal to exploit networks and systems. We explored these types of attacks in action. We gained a better understanding of the potential ramifications of these attack types.
Red Teaming or penetration testing in the more commodity version is not just about running a set of a few automated tools against your target. It is a phase-oriented process that involves multiple stages, and each step is equally important to measure success for an operation. The need for automation throughout the process for performing all repetitive tasks throughout all stages of penetration testing would need to use various tools. Then, in the end, we would need to combine results from many different tools together to produce a single meaningful report. It would have been effortless and time-saving if a unique tool could have helped us perform all the required tasks for penetration testing. This exact need is satisfied by a framework such as Metasploit.
​
​
Network Visualization and Vulnerability Detection - Final Project
​
​
Reflections
​
The tools leveraged help on embarking on continuous monitoring and visualization of cyber metrics. The ultimate goal will provide situational awareness to the analysts, engineers, and decision-makers.
The course will review probability and measure theory to gain a robust tool for evaluating systems, including cyber evaluation metrics.
The course will provide benchmark examples for capacity planning, including data representation of advanced topics on validation modeling. Various queuing theories for cyber engineering will be presented, and an introduction to multiple simulation techniques and distributions. The course presented several simulation software and case studies, including general-purpose simulation languages and programs available for the cyber practitioner.
The course will delve into the various ways to gain an understanding of the mathematics of malware detection and present a modern approach to view vulnerabilities of all types of networks.
Enterprise security architecture model in this white-paper uses a risk-driven, enterprise information security architectural approach for delivering cloud or on-premises infrastructure solutions that support business initiatives at any organization as it shown in the strategic security context. These are concepts that I am also applying for business partners and in my current role.
Three main security drivers influence these security architecture decisions:
• Drive towards the aspirational security state of the environment and defines what success looks like. Security goals can be thought of as providing the “why” the security program is being undertaken. Security goals can also help guide priorities during the implementation of security features and functionality.
• It provides domain and security guidance on the best approach to take and can be considered the “How” to best achieve the security goals of any organization.
• It provides the minimum standard to be achieved to be endorsed and given authority to operate by the various regulators with a stake in the program. Regulatory Compliance tends to straddle the “How” and the “Why,” depending on the requirements being articulated.
Resources
Book References
​
Lyon, G. (2010). Nmap network scanning. Sunnyvale, CA: Insecure.Com LLC.
​
Related Links
​
Top 10 Vulnerability Assessment Tools.
https://cwatch.comodo.com/blog/website-security/top-10-vulnerability-assessment-scanning-tools/
Nessus Professional
https://www.tenable.com/products/nessus/nessus-professional
CVSS Score in Tenable’s plug-ins
https://community.tenable.com/s/article/CVSS-Scores-in-Tenable-Plugins
Common Vulnerability Scoring System SIG
What is Zenmap?
https://geek-university.com/nmap/what-is-zenmap/
Zenmap GUI user Guide