JEFF HOWELL
  • Home
  • About
  • Cyber Security Fundementals
    • Threats and Vulnerabilities
    • Reference Monitor
    • Links to Additional Resources
  • Cryptography
    • Block Ciphers
    • Hash Functions
    • Message Authentication Codes (MAC's)
    • Kerberos Key Management (Single sign-on)
    • Public Key Infrastructure (PKI)
    • Links to Additional Resources
  • Secure Architecture
    • Architecture Strategy
    • Contextual Security Architecture
    • Conceptual Security Architecture
    • Logical Security Architecture
    • Physical Security Architecture
    • Component Security Architecture
    • Operations
    • Supporting Materials
  • Reference Link Library
    • Industry Websites
    • Government Resources
    • Cyber Security News
    • Certification and Training
    • Books
    • Cyber Security Tools
  • Risk Management
    • Supporting Materials
  • Operational Policy
    • Laws and Regualations
    • Data Classification
    • Policy Implementation and Enforcement
    • Supporting Materials
  • Management and Cyber Security
    • Contingency Planning
    • ROI of Cyber Security
    • Staffing Models
    • Links to Additional Resources
  • Secure Software Design and Development
    • Heartbleed Details
    • Mobile Device Vulnerabilities
    • Links to Additional Resources
  • Network Visualization and Vulnerability Detection
    • Visualizing the Network
    • Protecting the Perimeter
    • Vulnerability Detection
    • Sniffing Wireless Networks
    • Links to Additional Resources
  • Cyber Threat Intelligence
    • Links to Additional Resources
  • Incident Response and Computer Network Forensics
    • Links to Additional Resources

Sniffing Wireless Networks

Picture
Wireless sniffing is the practice of eavesdropping on communications within a wireless network by using special software or hardware tools. Sniffing is more intrusive than wireless stumbling, which is looking for the presence of wireless networks. The motives behind wireless sniffing can range from troubleshooting to a malicious attack against a network or individual.  Both wired and wireless networks can be monitored or sniffed. Wireless networks generally are easier to sniff because they use radio signals as a method of communication. An attacker could, for example, sit in a car outside a home or business and sniff a wireless network.

Computer networks divide information into pieces called frames. Inside these frames are data packets. Wireless sniffing might target frames, packets or both.  Targeting frames can reveal the presence of a wireless base station that is set up to remain hidden, and it even can be used to crack older wireless encryption standards. Packet sniffing, which can also be called Internet provider (IP) sniffing, can be used to monitor e-mail or other data being sent over a wireless network by others. It also can help a network administrator watch for and diagnose network problems.

Executive Summary
The objective of this section is to implement the necessary hardware and software to sniff wireless networks in the local area.  The scope will include a low-cost wireless adapter that is connected through a USB port on a PC/laptop interfacing with open source wireless sniffing software called Kismet to be used in a restricted virtual environment. This paper will discuss the steps used to implement the components of the overall wireless sniffing solution, samples of screenshots from the software, analysis of log data and finally a summary of my findings of the wireless activity in my neighborhood and a reflection on the assignment.

Figure 1 – Basic Vulnerability Scanner Architecture
Picture
Criteria to be used in evaluating the selection of a vulnerability scanning tool to operate within my lab environment. 
Some of the core features that are required for the Vulnerability assessment tool are: (table stakes)
  • Maintain an updated database for latest vulnerabilities.
  • Ability to detect vulnerabilities with less false positives.
  • Ability to scan multiple targets simultaneously.
  • Ability to provide a detailed report with vulnerable request and response pair.
  • Provides recommendations to fix the vulnerabilities.
  • Ability to scan for both external and internal vulnerabilities.
 
Criteria that will be used for the selection include:
 
  • Ease-of-use – The tool must provide a graphical user interface and specifically in the reporting module.
  • Cost – For purposes of this assignment, the tool must be available for download for use in a limited environment, like my lab for example.
  • Ease of Installation – Given the limited time to conduct the analysis, this must be easily installed by someone with limited Linux skills. This will be assessed by length of time based on known hassle and frustration factor.
  • Ease-of-updating – vulnerability scanners need to be current with the latest vulnerability dbase.
  • Community – Ability to get fast answers to common problems and questions will be very important for meeting the deadline of this assignment.
Comparison of Vulnerability Scanning Tools
I decided to use take the RFP approach to selecting a tool.  This was done to ensure that I remained objective in my evaluation versus getting lured into the tool with the coolest looking graphics and UI. I built my RFP with the five criteria described above and used a weighted average scoring method. 

​Below is a summary of the evaluation across the vendors:

Product

Background

Overall Score

Nessus

Nessus is a proprietary vulnerability scanner developed by Tenable Network Security. It is free of charge for personal use in a non-enterprise environment. According to surveys done in 2009 by sectools.org, Nessus is the world's most popular vulnerability scanner, taking first place in the 2000, 2003, and 2006 security tools survey. Tenable Network Security estimated in 2005 that it was used by over 75,000 organizations worldwide.

4.65

OpenVAS

OpenVAS (Open Vulnerability Assessment System, originally known as GNessUs) is a software framework of several services and tools offering vulnerability scanning and vulnerability management. All OpenVAS products are free software, and most components are licensed under the GNU General Public License (GPL). Plugins for OpenVAS are written in the Nessus Attack Scripting Language, NASL.

3.40

Nexpose

Nexpose is a vulnerability scanner which aims to support the entire vulnerability management lifecycle, including discovery, detection, verification, risk classification, impact analysis, reporting and mitigation. It integrates with Rapid7's Metasploit for vulnerability exploitation.

3.80

 

I watched several YouTube videos and read a number of blogs and comparisons that were posted on the internet to provide a basis for my scoring. Through this process, I decided to select Nessus.  It is the most recognized and has the largest install-base of any of the choices I selected.  Moreover, it appeared to have the fewest blemishes reported on the internet in terms of installation.  Further, there was a large community and following who were quite active on the various sites like StackOverFlow, GitHub and YouTube.  This carried a lot weight given the tight time-frame of the assignments and the independent study environment of an on-line program. However, in a real-world production environment, I would likely shift the weighting from ease-of-installation criteria towards accuracy (Ease-of-updating); knowing that more competent installation resources would exist in-house to ensure to ensure a successful installation.
Picture
Steps to Download Nessus (selected) Software onto my Virtualized Test Environment

Steps

Commands

Results

Go to Tenable.com and obtain activation code

https://www.tenable.com/downloads/nessus

 

Fill-out mandatory form, check email for activation code

Enter first, last and email

Activating Your Nessus Home Subscription

Your activation code for Nessus Home is:
336C-4D83-1CA5-F1AF-4AC1


Locate current Debian version

root@kali: uname -a

Linux kali 4.17.0-kali1-amd64 #1 SMP Debian 4.17.8-1kali1 (2018-07-24) x86_64 GNU/Linux

 

Download the correct version

 

 

 

 

Once the download is complete, check the “Downloads” folder.  You should see this:

 

Open the command window and look for the downloaded file

root@kali: cd Downloads

root@kali:~/Downloads# la -lah

drwxr-xr-x  2 root root 4.0K Aug  4 14:39 .

drwxr-xr-x 17 root root 4.0K Aug  4 14:04 ..

-rw-r--r--  1 root root  62M Aug  4 14:39 Nessus-7.1.3-debian6_amd64.deb

Install Nessus

root@kali:~/Downloads# dpkg -i Nessus-7.1.3-debian6_amd64.deb Nessus-7.1.3-debian6_amd64.deb

 

Selecting previously unselected package nessus.

(Reading database ... 347632 files and directories currently installed.)

Preparing to unpack Nessus-7.1.3-debian6_amd64.deb ...

Unpacking nessus (7.1.3) ...

Preparing to unpack Nessus-7.1.3-debian6_amd64.deb ...

Shutting down Nessus : .

Unpacking nessus (7.1.3) over (7.1.3) ...

More than one copy of package nessus has been unpacked

 in this run !  Only configuring it once.

Setting up nessus (7.1.3) ...

Unpacking Nessus Core Components...

 

 - You can start Nessus by typing /etc/init.d/nessusd start

 - Then go to https://kali:8834/ to configure your scanner

 

Processing triggers for systemd (239-7) ...

 

Launch Nessus

root@kali /etc/init.d/nessusd start

 

root@kali:~/Downloads# /etc/…

Starting Nessus :

root@kali:~/Downloads#

Open a browser and sign-in to access Nessus

https://kali:8834/

 

View the home page of Nessus

 

 

 

Setup Nessus to Perform a Scan of the IP Address Range of my Lab Environment
Once the software completed the installation process, I created a test scenario, ran the scan and analyzed the output found in the reports.
Step 1 – Set-up the test scenario
Picture
Step 2 – Define the parameters for the scan then save
Picture
Step 3 – Run the scan and evaluate the results
Picture
The scan revealed vulnerabilities across all 3 nodes of varying quantities and severities. The Metasploitable node (192.168.130.3) had the most reported vulnerabilities with the highest severity levels (as expected).  One nice feature with the reporting capabilities within Nessus is the reports are interactive. I simply click on the bar and the details are presented.  See figure 2 below.
Figure 2 – Detailed vulnerabilities identified during the scan
Picture
This shows the detailed vulnerabilities that were identified during the scan for the Metasploit node.  Clicking on any line item reveals additional detail.  See figure 3 below:
Figure 3 – Detailed Vulnerability (Blind Shell Backdoor Connection)
Picture
​The reporting framework allows the analyst to traverse their way starting from the highest level to the detailed vulnerability.  In this example, the scanner was able to test for an open port that could be exploited and it offers a suggestion to remediate the problem.  It appears port 1524 may have been compromised and the scanner issued an “id” command to expose the vulnerability.

I conducted some research and found the vulnerability that Nessus identified. Ingreslock is a service that is used to legitimately lock parts of the Ingres dbase. However, there are known trojans that also use port 1524 as a backdoor into a system. Some system admins allow this port to be open thinking it is needed. The recommended remediation by Nessus is to simply close the port.  I did some further research to figure out how I could do this. My intention was to close the port and then re-run the Nessus scan.  My hypothesis was that the vulnerability would disappear.  After several attempts and many searches, I found some Linux commands that should have worked.  Unfortunately, I was unsuccessful.  My next attempt will be to close the port on the firewall to the node.  This will require additional research and of course time. 
References
HackerTarget. (2018, March 07). Nessus, OpenVAS and Nexpose VS Metasploitable. Retrieved
August 5, 2018, from https://hackertarget.com/nessus-openvas-nexpose-vs-metasploitable/

OWASP. (2018, August 9). Category:Vulnerability Scanning Tools. Retrieved August 10, 2018, from https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools 

Tittle, E. (2016, February). Comparing the top vulnerability management tools. Retrieved August
6, 2018, from https://searchsecurity.techtarget.com/feature/Comparing-the-top-vulnerability-management-tools
 
RWB Network Security. (n.d.). Penetration Testing Tutorials for the Beginner. Retrieved August
6, 2018, from http://www.rwbnetsec.com/ingreslock/
 
Singh, S. (2016, July 10). Vulnerability Scanners. Retrieved August 5, 2018, from
https://resources.infosecinstitute.com/vulnerability-scanners-2/#gref
Jeff Howell  -  San Carlos, CA  -  Privacy Statement - email Jeff
  • Home
  • About
  • Cyber Security Fundementals
    • Threats and Vulnerabilities
    • Reference Monitor
    • Links to Additional Resources
  • Cryptography
    • Block Ciphers
    • Hash Functions
    • Message Authentication Codes (MAC's)
    • Kerberos Key Management (Single sign-on)
    • Public Key Infrastructure (PKI)
    • Links to Additional Resources
  • Secure Architecture
    • Architecture Strategy
    • Contextual Security Architecture
    • Conceptual Security Architecture
    • Logical Security Architecture
    • Physical Security Architecture
    • Component Security Architecture
    • Operations
    • Supporting Materials
  • Reference Link Library
    • Industry Websites
    • Government Resources
    • Cyber Security News
    • Certification and Training
    • Books
    • Cyber Security Tools
  • Risk Management
    • Supporting Materials
  • Operational Policy
    • Laws and Regualations
    • Data Classification
    • Policy Implementation and Enforcement
    • Supporting Materials
  • Management and Cyber Security
    • Contingency Planning
    • ROI of Cyber Security
    • Staffing Models
    • Links to Additional Resources
  • Secure Software Design and Development
    • Heartbleed Details
    • Mobile Device Vulnerabilities
    • Links to Additional Resources
  • Network Visualization and Vulnerability Detection
    • Visualizing the Network
    • Protecting the Perimeter
    • Vulnerability Detection
    • Sniffing Wireless Networks
    • Links to Additional Resources
  • Cyber Threat Intelligence
    • Links to Additional Resources
  • Incident Response and Computer Network Forensics
    • Links to Additional Resources