You need to know what you have in order to protect it.
Stackpole loves numbers. “Do the math” - stackpole
Undocumented machines may have a good reason for being there.
Sometimes undocumented machines have a good reason for being undocumented.
But most of the time it’s a bad reason.
Scanning tools will identify physical things that respond, but they don’t know about policy. They don’t know who owns that hardware.
When performing an audit, you need information. Discussions with a point-of-contact. Local knowledge.
If using tools, understand how they work. Tools:
Assets can be many things:
Consider layer 2 assets:
Layer 3:
Layer n:
There’s a tool, Bro / Zeek, that categorizes protocols.
If during, say, a PCI audit, you want to verify that all traffic is encrypted - Zeek can catch all the running shenanigans.
write a bash ping-sweeper using /dev/tcp
and/or /dev/udp
. If two separate scripts, post them separately.
Assignment detailed in slide-deck 5. Two scripts. Virtual Env required.