10. CEH v11: Vulnerability Assessment, Management & Classification
What are some of the activities that would be done during the pre-assessment phase?
- Gather configurations around the assets - Understand the business and its process
What are two tools that can be used to effectively prioritize or triage vulnerabilities that you may have identified from a vulnerability assessment?
- National Vulnerability Database (NVD) - Common Weakness Enumeration (CWE)
List the Vulnerability Assessment Life Cycle steps in the Post-Assessment Phase
- Risk Assessment - Remediation - Verification - Monitoring
List the steps of Vulnerability Assessment Life Cycle in order, starting with Creating
1. Create a Baseline 2. Vulnerability Assessment 3. Risk Assessment 4. Remediation 5. Verification 6. Monitoring
List the Vulnerability Assessment Life Cycle steps in the Pre-Assessment Phase
Creating a Baseline
What is the rating scale used by CVSS Version 3.0 to rate vulnerabilities against their CVSS score?
Low = 0.1-3.9 Medium = 4.0-6.9 High = 7.0-8.9 Critical = 9.0-10.0
What vulnerability type could show up on a vulnerability scan when an administrator adds a network application and opens a port in the firewall for temporary access and then does not remove the temporary access from the firewall after it was no longer needed?
Open Services
Application Flaws
Perform code reviews and use Secure Development Life Cycle (SDLC) to prevent
Misconfiguration
Set the wrong permissions and give users access to systems they shouldn't be able to access
OS Flaws
Shell Shock and SMB Ghost are examples of this vulnerability
Buffer Overflow
Use fuzzing software against applications to find these vulnerabilities
What vulnerability type would represent a situation where an admin installed a new network firewall device and leaves it factory configured?
Using defaults
List the Vulnerability Assessment Life Cycle steps in the Vulnerability Assessment Phase
Vulnerability Assessment