3d tool examples

25
3D Tool Examples Dave Breslin (@ Tenable Discussions Forum)

Upload: edison

Post on 23-Feb-2016

45 views

Category:

Documents


0 download

DESCRIPTION

3D Tool Examples. Dave Breslin (@ Tenable Discussions Forum). Tenable Documentation. 3D Tool 2.0 User Guide 3D Tool 2.0 Quick Start Guide. Topology. Topology derived from Nessus traceroute data Consider creating a user in SecurityCenter just for use with the 3D Tool - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: 3D Tool Examples

3D Tool Examples

Dave Breslin (@ Tenable Discussions Forum)

Page 2: 3D Tool Examples

Tenable Documentation3D Tool 2.0 User Guide3D Tool 2.0 Quick Start Guide

Page 3: 3D Tool Examples

TopologyTopology derived from Nessus traceroute dataConsider creating a user in SecurityCenter just for use

with the 3D ToolFilter a SecurityCenter traceroute query by address to

control the areas of your network to render

Page 4: 3D Tool Examples

Nessus Traceroute Plugin 10287

Page 5: 3D Tool Examples

SC Host Query

Page 6: 3D Tool Examples

IP Topology Configuration

(Create a login first, see 3D Tool 2.0 Quick Start Guide->Step 4)

Page 7: 3D Tool Examples

Topology Rendering for Host

Page 8: 3D Tool Examples

Network Topology Rendering

(Use another SecurityCenter 10287 query not filtered on a single host)

Page 9: 3D Tool Examples

Internet Facing ServicesUse 3D Tool “Modifiers” to highlight Internet facing

servicesHosts will have raised bars representing counts for

Internet facing servicesIts important to understand where host services are

exposed to the Internet when prioritizing vulnerabilitiesUse PVS plugin 14, “Accepts External Connections”Use existing network topology demonstrated in previous

slide

Page 10: 3D Tool Examples

PVS Plugin 14

Page 11: 3D Tool Examples

SC Plugin 14 Query

Page 12: 3D Tool Examples

Modifier (PVS Plugin 14)

(3D Tool 2.0 User Guide -> Modifiers -> Count List)

Ensure to use “Total Vulns” from the Internet Facing Services SecurityCenter Query

Page 13: 3D Tool Examples
Page 14: 3D Tool Examples

Internet Browsing ServicesUse a “Count List” Modifier like the previous Internet

Facing Services exampleHosts will have raised bars representing counts for

services they connect to on the InternetIts important to understand where hosts reach out to the

Internet when prioritizing “client” vulnerabilitiesClient vulnerabilities are detected by PVS and Nessus

when using credentialed scansUse PVS plugin 16, “Outbound external connection”

Page 15: 3D Tool Examples

PVS Plugin 16

Page 16: 3D Tool Examples
Page 17: 3D Tool Examples

Port 21 FTP ConnectionsUse a “Connections List” ModifierShow connection line for hosts that connect to port 21Dark shaded side of a connection line will highlight a host

that makes a connection to port 21White shaded side of a connection line will highlight a

host that provides a service on port 21Its important to understand on a network where services

are provided and usedUse PVS plugin 3, “Internal client trusted connection”

Page 18: 3D Tool Examples

PVS Plugin 3

Page 19: 3D Tool Examples

SC Query FTP Connections

Page 20: 3D Tool Examples

Modifier (PVS Plugin 3)

(3D Tool 2.0 User Guide -> Modifiers -> Connections List)

Page 21: 3D Tool Examples
Page 22: 3D Tool Examples

Nessus Versus PVS VulnsUse two “Count List” ModifiersHosts will have bars on top of them representing Nessus

vulnerability countsHosts will have bars below them representing PVS

vulnerability countsIts important to look for potential gaps in coverageNessus gaps might be caused by unscanned service ports,

infrequent host scanning or lack of credentialed scanningPVS gaps might be caused by configuration errors,

network visibility issues or poor operations management

Page 23: 3D Tool Examples

SC Vuln Queries

Consider filtering out info and low severity rated vulnerabilities

Page 24: 3D Tool Examples

Modifiers (Vulnerability Counts)

(3D Tool 2.0 User Guide -> Modifiers -> Count List)

Ensure to use “Total Vulns” from both queries

Page 25: 3D Tool Examples