CompTIA Security+ 501
CompTIA Security+
SY0-501
Instructor: Ron Woerner, CISSP, CISM
CompTIA Security+ Domain 2 – Technologies & Tools
2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization
Cybrary Instructor: Ron Woerner 1 CompTIA Security+ 501
2.2 Security Assessment Tools
● Protocol analyzer ● Data sanitization tools ● Network scanners ● Steganography tools ● Vulnerability scanner ● Honeypot ● Exploitation frameworks ● Backup utilities ● Configuration ● Banner grabbing compliance scanner ● Passive vs. active ● Command line tools
Protocol Analyzers
● Aka Packet Sniffers ● Gathering packet-level information on a network ● Examples: Wireshark TCPDump
Cybrary Instructor: Ron Woerner 2 CompTIA Security+ 501
Wireshark
Network scanners / mappers
● Knowing what’s on your network ● Network enumeration
Cybrary Instructor: Ron Woerner 3 CompTIA Security+ 501
Network scanners
Network scanners
Nmap / ZenMap
Cybrary Instructor: Ron Woerner 4 CompTIA Security+ 501
Network scanners
Fing (iOS & Android)
Vulnerability scanner
● Software utility that scans a range of IP addresses and tests for the presence of known vulnerabilities in software configuration and accessible services ● Relies upon a database of known vulnerabilities
Cybrary Instructor: Ron Woerner 5 CompTIA Security+ 501
Vulnerability Scanners
Examples: ● Nessus (Tenable) ● OpenVAS: Linux ● Nexpose Community Edition: Scan web applications, databases, and virtual environments, ● Qualys FreeScan: Checks for hidden malware and SSL issues, among other network vulnerabilities
OWASP ZAP
● ZAP - Zed Application Proxy ● Discovers security vulnerabilities in web applications
Cybrary Instructor: Ron Woerner 6 CompTIA Security+ 501
Exploitation Frameworks
● Platforms used for penetration testing and risk assessments ● Frameworks contains a set of exploits for known vulnerabilities ● Examples: Metasploit, Canvas, and Core Impact ● Browser Exploitation Framework (BeEF) – pen testing tool for exploiting web vulnerabilities
Kali Linux
• Kali Linux is a Debian-derived Linux distribution, designed for digital forensics and penetration testing. • Kali Linux is preinstalled with numerous penetration-testing programs. • Kali Linux can be run from a hard disk, live CD, or live USB. It is a supported platform of the Metasploit Project's Metasploit Framework, a tool for developing and executing security exploits.