Artwork

Content provided by Tenable Network Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tenable Network Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Tenable Network Security Podcast - Episode 179

 
Share
 

Archived series ("HTTP Redirect" status)

Replaced by: Tenable Network Security Podcast

When? This feed was archived on October 12, 2017 15:13 (6+ y ago). Last successful fetch was on August 30, 2017 15:49 (6+ y ago)

Why? HTTP Redirect status. The feed permanently redirected to another series.

What now? If you were subscribed to this series when it was replaced, you will now be subscribed to the replacement series. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 18722562 series 12331
Content provided by Tenable Network Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tenable Network Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

IPMI Detection - The embedded systems inside your servers used to manage the hardware use IPMI. Nessus and PVS contain checks for this protocol. Dan Farmer has released v2 of his paper detailing several vulnerabilities.
IPv6 SLAAC attack - Ron Gula wrote a blog post on this topic. Nessus supports discovery of IPv6 interfaces during IPv4 scans. If you have IPv6 connectivity supported on an IPv4 network, you are likely vulnerable to SLAAC attacks unless you have layered firewalls and routers that prevent IPv6 communication.
The Power of Powershell - We recently released an update to the configuration auditing functionality of Nessus to include the ability to run a full Powershell script. Powershell is an extremely useful way to get even more information from Windows hosts. Previously Nessus users were limited to running a single command. By encoding your Powershell script, you can now write more complex scripts that use variables and logic to pull settings and information from your hosts. What are some use cases for this functionality?
Keeping Up with Vulnerabilities - Reviewing new vulnerabilities is a weekly, sometimes daily, task for many (including myself). I often wonder about prioritization. With so many vulnerabilities being released each week, how do we maintain a patch management program to keep up? For example, I was reviewing the Junos SSL VPN XSS vulnerability. Not much information is provided. The impact is listed as "low", but curiosity gets the better of me, and I wonder why. Now, its just listed as XSS, not qualified whether or not it is stored or reflective. The user must be logged in. The parameter is in the help section of the application. There is no telling just how many characters we have to implement an attack script. Short of trying to exploit it yourself, how do you prioritize this vulnerability and hundred like it?

  continue reading

210 episodes

Artwork
iconShare
 

Archived series ("HTTP Redirect" status)

Replaced by: Tenable Network Security Podcast

When? This feed was archived on October 12, 2017 15:13 (6+ y ago). Last successful fetch was on August 30, 2017 15:49 (6+ y ago)

Why? HTTP Redirect status. The feed permanently redirected to another series.

What now? If you were subscribed to this series when it was replaced, you will now be subscribed to the replacement series. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 18722562 series 12331
Content provided by Tenable Network Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tenable Network Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

IPMI Detection - The embedded systems inside your servers used to manage the hardware use IPMI. Nessus and PVS contain checks for this protocol. Dan Farmer has released v2 of his paper detailing several vulnerabilities.
IPv6 SLAAC attack - Ron Gula wrote a blog post on this topic. Nessus supports discovery of IPv6 interfaces during IPv4 scans. If you have IPv6 connectivity supported on an IPv4 network, you are likely vulnerable to SLAAC attacks unless you have layered firewalls and routers that prevent IPv6 communication.
The Power of Powershell - We recently released an update to the configuration auditing functionality of Nessus to include the ability to run a full Powershell script. Powershell is an extremely useful way to get even more information from Windows hosts. Previously Nessus users were limited to running a single command. By encoding your Powershell script, you can now write more complex scripts that use variables and logic to pull settings and information from your hosts. What are some use cases for this functionality?
Keeping Up with Vulnerabilities - Reviewing new vulnerabilities is a weekly, sometimes daily, task for many (including myself). I often wonder about prioritization. With so many vulnerabilities being released each week, how do we maintain a patch management program to keep up? For example, I was reviewing the Junos SSL VPN XSS vulnerability. Not much information is provided. The impact is listed as "low", but curiosity gets the better of me, and I wonder why. Now, its just listed as XSS, not qualified whether or not it is stored or reflective. The user must be logged in. The parameter is in the help section of the application. There is no telling just how many characters we have to implement an attack script. Short of trying to exploit it yourself, how do you prioritize this vulnerability and hundred like it?

  continue reading

210 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide