Hackers and virus attacks are increasing due to the expansion of the Internet and a growing number of easy-to-use hacker tools. About 95% of web attack events are caused by the failure to fix known security vulnerabilities in computer network systems. The most fundamental cause is the vulnerabilities of penetrated computer network systems (known as security vulnerabilities). Therefore, evaluating vulnerabilities is of great importance.
To combat network security risks, there must be accessible solutions for customers to improve their information security architecture based on security assessments. The aim is to help customers strengthen security but still maintain a high level of performance.
Criteria:
- SSE-CMM: Systems Security Engineering Capability Maturity Model
- ISO 17799 (BS7799): Information security code of practice
- ISO 7498-2: Information processing systems – Open systems interconnection – Basic Reference Model – Part 2: Security architecture
- ISO 13335: Information technology (IT) – security technology – IT security management guide
- ISO 27001: Standard for information security management
- IATF: Information assurance technical framework
Security assessment methods:
- Security scan: To fully understand network security vulnerabilities of the target system, use the scanning analysis and assessment tool.
- Manual audit: Manually inspect target systems, including the host system, service system, database, network device, and security device.
- Penetration test: Simulate hacker attack and vulnerability discovery techniques to test the target system and find the most vulnerable components.
- Questionnaire: Check the services, assets, threats, and vulnerabilities by collecting information from network system administrators, security administrators, and technical directors.
- Interview survey: Confirm the questionnaire results, obtain management enforcement details, and be open to users' opinions and comments.
Nmap command parameter rule:
- nmap [Scan Type(s)] [Options] {target specification}
- -sT TCP connect() scan
- -sn/sP Ping scan
- -sU UDP scan
- -sR RPC scan
- -P0 no attempt to ping hosts before scan
- -O obtains the fingerprint using TCP/IP to determine the OS type of the host
- -v detailed mode. This option is strongly recommended.
- -h This is a quick help option.
- -o Specify a parameter for the file saving the scanning result.
- -D Scan with deceit patterns and write down all deceptive addresses you have specified in the connection record of the remote host.
- -n No DNS resolution, which speeds up the scan.
The following commands can be used to collect information:
- nmap –sn [IP section]: performs fast ping scan on a network segment.
- nmap –sT IP: performs TCP scan on an IP address.
- nmap –sU IP: performs UDP scan on an IP address.
- nmap –sV IP: performs RPC scan on an IP address.
- nmap –A IP: performs scan to determine the operating system of the host.
Sparta is an easy-to-use GUI tool. It integrates port scanning and brute-force cracking functions.
Configure Burp Suite and set the browser proxy before using Burp Suite. Additionally, ensure that the domains and URLs to be scanned are present on the site map of Burp Target so that full or partial scan can be performed.
During security assessment and scan, carry out a penetration test authorized by customers on key IP addresses. Simulate the attack and vulnerability discovery technologies that may be used by hackers to perform an in-depth test on the security of target systems and find out the most vulnerable areas. Try to carry out a thorough and accurate test on these key IP addresses. If a major or critical vulnerability is found, fix it in a timely manner.
Carry out penetration test as required by customers.
Capture packets to analyze all packet information. As for image and log files, you may need to configure monitoring devices or log servers and use dedicated software to obtain data reports and determine threats or vulnerabilities.
Mirrored port: a monitored port. All the packets that pass through a mirrored port are copied to an observing port, which is connected to a monitoring device.
Observing port: connected to a monitoring device and used to send packets from the mirrored port to the monitoring device.