Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Network Vulnerability Assessment
Network Vulnerability Assessment

Network Vulnerability Assessment: Identify security loopholes in your network's infrastructure

eBook
€8.99 €26.99
Paperback
€32.99
Subscription
Free Trial
Renews at €18.99p/m

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Table of content icon View table of contents Preview book icon Preview Book

Network Vulnerability Assessment

Setting Up the Assessment Environment

In the last chapter, we learned about understanding the essentials of a vulnerability management program from a governance perspective. This chapter will introduce various methods and techniques for setting up a comprehensive vulnerability assessment and penetration testing environment. We will learn how to set up our own environment that could be effectively used for various vulnerability assessment techniques discussed later in the book.

We will cover the following topics in this chapter:

  • Setting up a Kali virtual machine
  • Basics of Kali Linux
  • Environment configuration and setup
  • List of tools to be used during assessment

Setting up a Kali virtual machine

Performing vulnerability assessment or a penetration test involves a series of tasks that need to be performed with the help of multiple tools and utilities. For every task involved in the process, there are tools available, both commercial as well as freeware and open source. It all depends on our choice of tool that suits best as per the context.

For performing an end-to-end assessment, we can either have individual tools downloaded as and when required or we can use a distribution such as Kali Linux that comes with all required tools pre-installed. Kali Linux is a stable, flexible, powerful, and proven platform for penetration testing. It has a baseline of tools that are required to perform various tasks across all phases of penetration testing. It also allows you to easily add tools and utilities that aren't part of the default installation...

Basics of Kali Linux

The default credentials in order to access Kali Linux are username:root and password:toor. However, after the first login, it is important to change the default credentials and set a new password. A new password can be set using the passwd command as shown in the following screenshot:

Kali Linux is comprehensively used for network and application penetration testing. So it is important that Kali Linux is connected to the network as a standalone Kali installation wouldn't be of much use. The first step in ensuring network connectivity is checking whether Kali has a valid IP address. We can use the ifconfig command as shown in the following screenshot and confirm the IP address allocation:

Now that we have changed the default credentials and also affirmed network connectivity, it's now time to check the exact version of our Kali installation. This...

Environment configuration and setup

While our basic Kali setup is up and running, we also need to install and configure some additional services that we might need during our assessment. In the upcoming sections, we will discuss a few such useful services in Kali Linux.

Web server

A web server is going to be of help to us during the exploitation phase, wherein we may need to host a backdoor executable. The Apache web server is installed by default in Kali Linux. We can start the Apache web server using the service apache2 start command, as shown in the following screenshot.

We can verify whether the service started successfully by using the netstat -an | grep ::80 command:

Now that the Apache server is up and running, we...

List of tools to be used during assessment

There are tons of tools available for performing various tasks throughout the penetration testing lifecycle. However, the following is a list of tools that are most commonly used during a penetration test:

Sr. no Penetration testing phase Tools
1 Information gathering SPARTA, NMAP, Dmitry, Shodan, Maltego, theHarvester, Recon-ng
2 Enumeration NMAP, Unicornscan
3 Vulnerability assessment OpenVAS, NExpose, Nessus
4 Gaining access

Metasploit, Backdoor-factory, John The Ripper, Hydra

5 Privilege escalation Metasploit
6 Covering tracks Metasploit
7 Web application security testing Nikto, w3af, Burp Suite, ZAP Proxy, SQLmap
8 Reporting KeepNote, Dradis

Summary

In this chapter, we learned that Kali Linux in a virtual environment can be effectively used to perform vulnerability assessment and penetration tests. We also went through some absolute basics about Kali Linux and configure its environment.

Left arrow icon Right arrow icon

Key benefits

  • Develop a network security threat model for your organization
  • Gain hands-on experience in working with network scanning and analyzing tools
  • Learn to secure your network infrastructure

Description

The tech world has been taken over by digitization to a very large extent, and so it’s become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure. Network Vulnerability Assessment starts with network security assessment concepts, workflows, and architectures. Then, you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters, you will use these scanning results to analyze and design a threat model for network security. In the concluding chapters, you will dig deeper into concepts such as IP network analysis, Microsoft Services, and mail services. You will also get to grips with various security best practices, which will help you build your network security mechanism. By the end of this book, you will be in a position to build a security framework fit for an organization.

Who is this book for?

Network Vulnerability Assessment is for security analysts, threat analysts, and any security professionals responsible for developing a network threat model for an organization. This book is also for any individual who is or wants to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program.

What you will learn

  • Develop a cost-effective end-to-end vulnerability management program
  • Implement a vulnerability management program from a governance perspective
  • Learn about various standards and frameworks for vulnerability assessments and penetration testing
  • Understand penetration testing with practical learning on various supporting tools and techniques
  • Gain insight into vulnerability scoring and reporting
  • Explore the importance of patching and security hardening
  • Develop metrics to measure the success of the vulnerability management program

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Aug 31, 2018
Length: 254 pages
Edition : 1st
Language : English
ISBN-13 : 9781788624725
Vendor :
Offensive Security
Tools :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Aug 31, 2018
Length: 254 pages
Edition : 1st
Language : English
ISBN-13 : 9781788624725
Vendor :
Offensive Security
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
€18.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
€189.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts
€264.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 106.97
Network Vulnerability Assessment
€32.99
Network Scanning Cookbook
€36.99
Information Security Handbook
€36.99
Total 106.97 Stars icon
Banner background image

Table of Contents

14 Chapters
Vulnerability Management Governance Chevron down icon Chevron up icon
Setting Up the Assessment Environment Chevron down icon Chevron up icon
Security Assessment Prerequisites Chevron down icon Chevron up icon
Information Gathering Chevron down icon Chevron up icon
Enumeration and Vulnerability Assessment Chevron down icon Chevron up icon
Gaining Network Access Chevron down icon Chevron up icon
Assessing Web Application Security Chevron down icon Chevron up icon
Privilege Escalation Chevron down icon Chevron up icon
Maintaining Access and Clearing Tracks Chevron down icon Chevron up icon
Vulnerability Scoring Chevron down icon Chevron up icon
Threat Modeling Chevron down icon Chevron up icon
Patching and Security Hardening Chevron down icon Chevron up icon
Vulnerability Reporting and Metrics Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Rating distribution
Full star icon Full star icon Full star icon Full star icon Full star icon 5
(1 Ratings)
5 star 100%
4 star 0%
3 star 0%
2 star 0%
1 star 0%
Przemyslaw Aug 11, 2020
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Vulnerability Assessment from zero to hero! Very nice book!
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.