638054877497077243CSE 20CS54I W8 D3 Ms PT

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23

Department of Collegiate and Technical Education

CYBER SECURITY
(V Semester)
Development(Week-8)
Day 3
Session 1
Course Code: 20CS54IP
Computer Science and Engineering

Computer Science & Engineering – 20CS54I


Previous Session
TOPICS OF THE CLASS

BASICS OF WEB
WEB VULNERABILITIES
BURP SUITE ESSENTIALS

Computer Science & Engineering – 20CS54I


TOPICS OF THE CLASS

CLOUD VUNERABILITIES
INTRODUCTION TO TOOLS
NESSUS
NMAP
PROWLER

Computer Science & Engineering – 20CS54I


Learning Outcomes

VARIOUS CLOUD VULNERABILITIES

TOOLS TO PERFORM PENETRATION


TESTING LIKE NESSUS NMAP AND PROWLER

Computer Science & Engineering – 20CS54I


CLOUD VULNERABILITIES

MOST COMMON CLOUD VULNERABILITIES ARE

1 Cloud Misconfiguration

Often caused by a lack of knowledge of good practices or


lack of peer review from your DevOps/infra team.

Computer Science & Engineering – 20CS54I


CONTD….

2 Identity and Access Management

Having unsecure identity and access management (IAM) is


a common vulnerability in cloud systems

To minimize this threat:


 Enforce the principle of least privilege for all of your
cloud resources and users

 Use third-party tools to scan and detect misconfiguration of


IAM policies.

 Frequently review access and privileges,


Computer Science & Engineering – 20CS54I
CONTD….
3. Public Data Storage

This vulnerability occurs when a given data blob, like an


S3 bucket or, an SQL database, is partly or completely opened to
the public, which then has access via either read-only or both read
and write.

To minimize this threat:

 Use third-party tools to scan your infrastructure.

 Always have your data storage set to private by default.

Computer Science & Engineering – 20CS54I


CONTD….

4. Insecure APIs
Having a secure API is critical to ensuring cyber threat
mitigation and to protect against unwanted traffic.

The malicious requests to an API can take a wide array of forms


 Code and query injection
 Taking advantage of a bad access control
 Targeting a vulnerability due to an outdated component

To minimize this threat:


 Have a web application firewall (WAF) to filter requests by
IP address
 Implement DDoS protection.

Computer Science & Engineering – 20CS54I


CONTD….

5. Lack of Visibility
Lack of visibility of cloud infrastructure is a major issue
that can delay action on a threat and result in a data breach.
When companies are using thousands of instances of
cloud services, it can be easy to get lost in them or forget about
some of those running instances.

To minimize this threat:


 Monitor for and detect threats.
 Ensure visibility into your cloud infra.
 Implement tools such as a CNAPP.
Computer Science & Engineering – 20CS54I
CONTD….

6. Lack of Multi-factor Authentication


Authentication method in which a user must present at
least two forms of identification validation to access an
account or data.
Passwords and users are vulnerable to theft, making a
lack of MFA a potentially critical vulnerability.

To minimize this threat:


 Always enforce MFA for any employees granted cloud access
to their accounts and data.

Computer Science & Engineering – 20CS54I


CONTD….

7. Malicious Insiders
This can result from too loose of rules or a former employee still
having valid credentials to the accounts
This kind of vulnerability can be particularly dangerous, as not
only data is at risk of being stolen or changed, but also intellectual
property.

To minimize this threat:


Make sure MFA is activated.
Filter out phishing emails using an automated tool.
Educate employees about phishing attacks.
Make sure safe password practices are being followed.

Computer Science & Engineering – 20CS54I


CONTD….

8. Distributed Denial-of-Service Attacks


It works by flooding the server with requests from
different sources and overcharging it

To minimize this threat:


Choose a cloud provider that protects against DDoS attacks
Make sure DDoS protection on your cloud service is always
turned on

Computer Science & Engineering – 20CS54I


INTRODUCTION TO TOOLS
NESSUS

 Nessus is a proprietary vulnerability scanner developed by


Tenable, Inc.

 Nessus is an open-source network vulnerability scanner

 Nessus works by testing each port on a computer,


determining what service it is running, and then testing this
service to make sure there are no vulnerabilities in it

Computer Science & Engineering – 20CS54I


CONTD….

Nessus can scan these vulnerabilities and exposures:

 Vulnerabilities that could allow unauthorized control or


access to sensitive data on a system.

 Misconfiguration (e.g. open mail relay).

 Denials of service (Dos) vulnerabilities.

 Default passwords, a few common passwords, and


blank/absent passwords on some system accounts

Computer Science & Engineering – 20CS54I


CONTD….

Significant capabilities of Nessus include:

Scheduled security audits.


 Detection of security holes in local or remote hosts.
 Simulated attacks to pinpoint vulnerabilities.
Detection of missing security updates and patches.
 Nessus Professional perform internal network scans
as required by the PCI DSS 11.2.1 requirement.

Computer Science & Engineering – 20CS54I


CONTD….

Vulnerability Scanning with Nessus :

Nessus performs its scans by utilizing plugins, which run


against each host on the network in order to

 Identify which operating systems and services are


running on which ports
 Identify which software components are vulnerable to
attacks (FTP, SSH, SMB and more)

Computer Science & Engineering – 20CS54I


NMAP
 Network Mapper is a security auditing and network scanning
independent tool developed by Gordon Lyon.
 It is used by network administrators to detect the devices
currently running on the system and the port number by which
the devices are connected.
 Nmap provides the network details, and also helps to
determine the security flaws present in the system.
 Nmap is platform-independent.

Computer Science & Engineering – 20CS54I


CONTD….

Computer Science & Engineering – 20CS54I


CONTD….
Advantages of Nmap

 Nmap is a useful tool for network scanning and auditing purposes.


 It can search for hosts connected to the Network.
 It can search for free ports on the target host.
 It detects all services running on the host with the help
of operating system.
 It also detects any flaws or potential vulnerabilities in
networked systems.

Computer Science & Engineering – 20CS54I


CONTD….

Types of Nmap scan

TCP Scan
UDP Scan
SYN Scan
ACK Scan
Full Scan

Computer Science & Engineering – 20CS54I


PROWLER

Prowler is an open source Amazon Web Services (AWS)


“Security Best Practices Assessment, Auditing, Hardening,
and Forensics Readiness tool”.
 Prowler scans your AWS account to check for potential
vulnerabilities
 Prowler runs 49 checks against the Centre for Internet
Security (CIS) AWS Foundation Benchmark.

Computer Science & Engineering – 20CS54I


CONTD….

Why You Should Use Prowler

Using Prowler, you can verify your permissions, ensure


your CloudTrail captures and logs all account activity, and
set up alarms for various suspicious behavior.
To ensure you have a secure environment and have proper
protections in place

Computer Science & Engineering – 20CS54I


THANK YOU

July 12, 2024 23

You might also like