Analyzing Scans
Process of interpreting collected scan data to distinguish real threats from noise.
- Purpose: Identify genuine vulnerabilities; plan targeted attacks
- Importance: Reduces false positives/negatives; informs risk-based prioritization
Domain: Vulnerability Discovery & Analysis (3) & Attacks & Exploits (4)
Lesson Previews
- Positive vs Negative Results
- True Positives: Confirmed real vulnerabilities (e.g., exploitable SQLi)
- True Negatives: Confirmed absence of issues
- False Positives/Negatives: Scanner errors; require manual verification
- Validation Techniques: Cross-tool checks (Nmap, Netcat), manual tests (SSH, Apache version)
- Vulnerability Prioritization: CVEs, CVSS, EPSS, target criteria (high-value assets, EOL, defaults)
- Automation: Scripting for result validation
- Documentation: Clear record of scan config, findings, attack plan
- Other Considerations: Dependencies, scope limits, labeling sensitive systems
Positive & Negative Results
- True Positives: e.g., CVE-2022-123 SQL injection confirmed
- True Negatives: Manual review verifies no issues
- False Positives: Scanner flags sanitized XSS form
- False Negatives: Missed buffer overflow
Validating Scan Results
- Combine automated scans with manual tests
- Commands:
- SSH check:
ssh user@host -p 22
- Apache version:
apache2 -v
orhttpd -v
- SSH check:
- Cross-check data with OSINT tools (theHarvester, Hunter.io)
Using CVEs & CVSS
- CVE: Unique IDs for known vulnerabilities
- CVSS: Severity score (0–10: Low→Critical)
- Resources: JPCERT, NVD, CERT, CWE, CAPEC
- Use: Map scan findings to CVEs; prioritize by CVSS
Exploit Prediction Scoring System (EPSS)
- Predicts exploitation likelihood vs CVSS’s impact focus
- Integration: Combine EPSS with asset criticality for triage
Target Prioritization
- High-Value Assets: Customer DBs, financial servers
- EOL Systems: Windows XP, Flash Player
- Default Configs: admin/admin, open services
- Encryption Flaws: MD5, SHA-1, POODLE
- Defense Gaps: Bypass IDS/IPS using stealth scans
Scripting for Validation
Automate result checks:
for host in $(nmap -sn 192.168.1.0/24 -oG - | awk '/Up$/{print $2}'); do
ssh -oBatchMode=yes -p22 user@$host echo ok;
done
Capability & Tool Selection
- Correct Tool: Nmap/Nessus (network), Burp/ZAP/Nikto (web), Metasploit/exploitdb (exploit)
- Consider environment (internal vs external), target, and learning curve
- Code analysis & public exploits from GitHub in sandboxed environment.
- Scan completeness: to cover all potential vulns
- Troubleshooting scans: to provide accurate and reliable results
Attack Documentation
- Attack Path: Step-by-step record (recon to exploit)
- Diagrams: Network layouts (draw.io)
- Storyboard: Screenshots + captions for stakeholders
Other Attack Considerations
- Dependencies: DBs, APIs, services
- Scope Limits: Define off-limits systems and actions
- Sensitive Systems: Label PII/financial servers; handle with care
Takeaway: Effective scan analysis transforms raw data into prioritized, actionable insights for precision attacks.