Network VAPT?
Network VAPT?
Tools:
Methods:
1. OpenVAS:
o Scans networks and systems for known vulnerabilities, including
CVEs.
2. Nessus:
o Identifies vulnerabilities in networks, systems, and applications,
including CVE-listed vulnerabilities.
3. QualysGuard:
o A cloud-based vulnerability management solution that identifies
CVE-listed vulnerabilities.
1. Custom Scripts:
o Security professionals create custom scripts using languages like
Python, Bash, or PowerShell to scan for specific CVE-listed
vulnerabilities.
2. Nmap Scripting Engine (NSE):
o Nmap’s scripting engine allows users to create custom scripts to
identify vulnerabilities, including CVEs.
Packet Sniffers:
1. Wireshark:
o Captures and displays network packets, decoding various
protocols and providing detailed packet information.
2. Tcpdump:
o A command-line packet analyzer that captures packets and can
display them in real-time or save them for later analysis.
Flow-based Analysis:
1. NetFlow:
o Collects and aggregates network traffic flow data, providing
insights into traffic patterns and bandwidth utilization.
2. sFlow:
o Provides real-time traffic sampling and can be used to analyze
traffic patterns and detect anomalies.
Protocol Analyzers:
1. Splunk:
o Ingests and analyzes large volumes of network traffic data,
correlating network events with other security data.
2. ELK Stack (Elasticsearch, Logstash, Kibana):
o An open-source SIEM solution that collects, parses, and analyzes
network traffic data.
1. Snort:
o An open-source network intrusion detection system that uses DPI
to analyze network traffic for signs of malicious activity.
Practical Application
Objective: Scan the target website www.testfire.net for open services and
potential vulnerabilities using Nmap.
1. Open Ports:
o Port 80 (HTTP): Open, associated with web services.
o Port 443 (HTTPS): Open, associated with secure web services.
o Port 8080 (HTTP-proxy): Open, often used for proxy services.
2. Vulnerabilities:
o Weak DH Parameter: Detected with a size of less than 1024 bits
on port 443 (HTTPS). This indicates a vulnerability to the Logjam
attack (CVE-2015-4000).
Recommendations:
Conclusion:
Reference
https://medium.com/@mohanad.hussam23/full-guide-to-network-
penetration-testing-and-network-penetration-methodology-43f5c9fdb91d
https://medium.com/@davevishwas98/basics-of-network-vapt-f16bff5bf325
https://medium.com/@billgats.3421/complete-notes-about-vapt-
07d593c0dcb4
https://medium.com/@ibo1916a/what-is-nmap-a0aae7f65694
https://medium.com/@riteshs4hu/a-step-by-step-guide-to-nmap-scanning-
for-beginners-45d00dd759f9
https://medium.com/@aka.0x4C3DD/exploring-nmap-a-comprehensive-guide-
to-network-scanning-and-security-3bf494da33e1