New Training: Analyze Vulnerability Scan Results
In this 5-video skill, CBT Nuggets trainer Shawn Powers teaches you how to analyze the results of a vulnerability scan information on clients, networks, and businesses using various pentesting procedures. Watch this new CompTIA training.
Learn CompTIA with one of these courses:
This training includes:
- 5 videos
- 20 minutes of training
You’ll learn these topics in this skill:
- Intro to Analyzing Scan Results
- Categorizing Assets
- Adjudicating Scan Results
- Prioritizing Vulnerabilities
- Identifying Common Themes
You Found Multiple Vulnerabilities: Which One Do You Fix First?
The job of an IT security analyst is to find any potential exploits in applications and IT environments. Once these exploits are found, analysts will need to prioritize which ones need to be fixed first. How do you do that?
Prioritizing which exploits need attention first may seem easy on paper but the answer may not always be clear. Though some exploits may be incredibly dangerous, they may also be extremely difficult to use. In this case, these exploits may not take priority.
A good example of this is Heart Bleed. Heart Bleed is a security exploit that could be used to leak sensitive data from servers. Due to its nature, it was difficult to implement. Likewise, using Heart Bleed was not guaranteed to be successful due to how it worked.
While Heart Bleed was making its rounds in the news cycle, another exploit was discovered that could affect TLS connections. This exploit could force a TLS connection between a client and server to downgrade itself to a version of SSL that was vulnerable to attacks.
If you discovered both exploits in your system at the same time, which exploit would take priority? Though Heartbleed was considered the most dangerous at that time, the TLS downgrade attack had a much more critical impact on systems.