🕶️
VICEINTELPRO
GitHub: HorrorClause
  • In Tenebris Videmus
  • 🚩CTFs
    • 💾Hack the Box
      • 🏫Academy
        • Command Injection Assessment
        • XSS Assessment
        • Web Attacks Assessment
    • Try Hack Me
      • In Progress
  • 📖Documents
  • 👨‍🏫HOW-TOs
    • Obisidian How-To
    • Setup Mandiant FLARE VM
  • 📑Security Fundamentals
    • Security Controls
      • Physical Security
      • Endpoint Security
      • Email Security
      • Network Security
      • AAA Controls
    • Networking 101
      • OSI Model
      • Network Fundamentals
      • Network Devices
      • Network Tools
      • Protocols and Ports
    • 👨‍💼Management Principles
      • Risk
      • Policies and Procedures
      • Compliance and Frameworks
      • Change and Patch Management
  • 🛡️Security Concepts
    • ⚠️Risk Assessment Models
      • DREAD Risk Assessment Model
      • STRIDE Threat Model
      • Common Vulnerability Scoring System (CVSS)
    • Pentesting
      • Common Terms
      • AV Identification-Evasion
      • Introduction to Payloads
      • Automating Payloads & Delivery with Metasploit
      • Shells Jack Us In, Payloads Deliver Us Shells
      • Web Shells
      • Pentesting Overview
      • Penetration Testing Process
    • 🐛Vulnerability Assessment
      • Common Vulnerabilities and Exposures (CVE)
      • Common Vulnerability Scoring System (CVSS)
      • Assessment Standards
      • Vulnerability Assessment
      • Vulnerability Scanning
      • Reporting
      • 🎯Nessus
        • Getting Started with Nessus
        • Nessus Scan
        • Working with Nessus Scan Output
        • Advanced Settings
        • Scanning Issues
      • 🦴OpenVAS (Greenbone)
        • Getting Started with OpenVAS
        • OpenVAS
        • Exporting Results
    • Passwords
      • Password Managers
      • Password Policies
      • Password Security Fundamentals
    • Frameworks
    • GRC
    • Logon Types
    • What is Dev-Null ?
  • ⚔️Offensive Security
    • OSINT
      • OSINT - Websites
      • Google Dorks
    • 🔫Attacking Common Services
      • The Concept of Attacks
      • Interacting with Common Services
      • Finding Sensitive Information
      • Attacking DNS
      • Attacking Email Services
      • Attacking FTP
      • Attacking RDP
      • Attacking SMB
      • Attacking SQL Databases
      • Cheat Sheet - Attacking Common Services
      • Service Misconfigurations
    • 🔪Attacking Web Apps with Ffuf
      • Web Fuzzing
      • Directory Fuzzing
      • Page Fuzzing
      • Recursive Fuzzing
      • DNS Records
      • Sub-domain Fuzzing
      • Vhost Fuzzing
      • Filtering Results
      • Parameter Fuzzing - GET
      • Parameter Fuzzing - POST
      • Value Fuzzing
    • ☁️Cloud
      • AWS
        • AWS S3 Buckets
    • 💉Command Injection
      • Command Injection Cheat Sheet
      • Intro to Command Injections
      • Detection
      • Injecting Commands
      • Other Injection Operators
      • Identifying Filters
      • Bypassing Space Filters
      • Bypassing Other Blacklisted Characters
      • Bypassing Blacklisted Commands
      • Advanced Command Obfuscation
      • Evasion Tools
      • Command Injection Prevention
    • Containers
      • Docker
    • ❌Cross-Site Scripting (XSS)
      • Introduction to XSS
      • Stored XSS
      • Reflected XSS
      • DOM XSS
      • XSS Discovery
      • Defacing
      • Phishing
      • Session Hijacking
      • XSS Prevention
    • Directory Busting
      • DirB
      • DirBuster
      • Ffuf
      • Gobuster
    • 🅰️DNS
      • DNSRecon
      • Fierce
    • File Inclusion
      • Local File Inclusion Cheatsheet
      • Intro to File Inclusion
      • Local File Inclusion (LFI)
      • Basic Bypass
      • PHP Filters
      • PHP Wrappers
      • Remote File Inclusion (RFI)
      • LFI and File Uploads
      • Log Poisoning
      • Automated Scanning
      • File Inclusion Prevention
    • File Transfers
      • Transferring Files
      • File Transfer - Quick Commands
      • Living off the Land
      • Windows File Transfer Methods
      • Linux File Transfer Methods
      • Catching Files over HTTP(S)
      • Transferring Files with Code
      • Miscellaneous File Transfer Methods
      • Protected File Transfers
      • Mounting Encrypted VHD Drives
      • Mounting VHD in Kali
      • File Transfer Detection
    • File Upload Attacks
      • File Upload Cheatsheet
      • Absent Validation
      • Upload Exploitation
      • Client-Side Validation
      • Blacklist Filters
      • Whitelist Filters
      • Type Filters
      • Limited File Uploads
      • Other Upload Attacks
      • Preventing File Upload Vulnerabilities
    • 👣Footprinting
      • Linux Remote Management Protocols
      • Windows Remote Management Protocols
      • Enumeration
        • Enumeration Methodology
        • 🖥️Host Based
          • Quick Commands
          • DNS
          • FTP
          • IMAP-POP3
          • IPMI
          • MSSQL
          • MySQL
          • NFS
          • Oracle TNS
          • SMB
  • Powershell
    • Powershell CheatSheet
  • Python
    • Map
    • Anonymous Functions
    • Recursion
      • ZipMap
      • Nested Sum
      • Recursion on a Tree
      • Count Nested Levels
      • Longest Word
    • Function Transformations
      • More Transformations
      • Why Transform?
    • Closures
    • Currying
    • Decorators
    • Sum Types
    • Enums
    • Match
    • Regex
  • Kusto (KQL)
    • SQL and KQL Comparison
    • Using the Where and Sort Operators
    • KQL Queries
  • HTML
  • Insecure File Uploads
Powered by GitBook
On this page
  • Change Management
  • Patch Management
  • Windows Server Update Services (WSUS)
  • Microsoft System Center Configuration Manager (SCCM)
  • Commercial Patch Management Solutions:
  • Retroactive Patch Releases:
  1. Security Fundamentals
  2. Management Principles

Change and Patch Management

Change Management

Change management is the process of ensuring that changes within an organization are planned, supported, well documented, and audit-able. In regards to cybersecurity, this allows us to identify the accountability of individuals or teams if a change results in a security risk, especially if it has been exploited.

From our perspective, if we are trying to get systems patched, we may be asked to raise (or assist in raising) a change request so that it can be reviewed, key stakeholders identified, and the whole process of patches being deployed can be well documented. The same could occur if we are making major security changes, such as editing security controls on employee systems or editing rules on a firewall.

By having a record of who made what changes, we can quickly identify individuals involved should we need to ask them questions about the activity they conducted.

Patch Management

Patch management is a process relating to IT administration, but can also be very closely associated with vulnerability management. It involves the ability to deploy patches and security fixes to IT assets that require them, such as Windows updates to laptops and servers, and new versions of software such as web browsers.

By deploying patches, an organization can remediate vulnerabilities that are present in older versions of software or the operating system and reduce the risk to the company. Some businesses may also choose to meet stricter patching requirements for compliance frameworks such as Security Essentials+, which can be a business enabler as clients must not work with companies that do not hold this qualification. Under this framework, critical and high-rated vulnerabilities must be remediated within 14 days of discovery to ensure compliance.

There are a number of ways that patches can be deployed, let's take a look!

Windows Server Update Services (WSUS)

WSUS enables IT teams to deploy the latest Microsoft product updates. You can use WSUS to fully manage the distribution of updates that are released through Microsoft Update to computers on your network.

In a WSUS implementation, at least one WSUS server, known as an “upstream server” on the network must be able to connect to Microsoft Update to get available update information. This means that endpoints and servers do not need to have an internet connection to download patches themselves – the upstream WSUS server will be the single system that communicates on the internet, downloads the patches, and deploys them to all systems that require them.

Microsoft System Center Configuration Manager (SCCM)

Microsoft’s SCCM is a paid solution that acts as an asset inventory, assists in software installation, and deploys updates and security patches to systems across the network. SCCM uses Microsoft’s WSUS as we covered above to check for and install updates, however, it provides users with additional patch management control over when and how patches are applied.

SCCM is built first and foremost for Windows systems and therefore its functionality and updates are focused on Windows. Non-Windows systems including Mac and Linux can be managed in a limited way through SCCM, but this poses a number of problems and 3rd-party patching requires additional configuration and is more work, compared to a solution that is designed to patch multiple operating systems and software products.

Commercial Patch Management Solutions:

There is a wide range of commercial solutions out there that are either designed purely to conduct patch management or offer this as part of a wider range of endpoint-based tools in a larger solution. To highlight some of the functionality these tools can include, we’re going to focus on ManageEngine Patch Manager Plus. The functionality this solution offers includes:

  • Deploy patches to Windows, MacOS, and Linux-based systems

  • Update operating systems

  • Update Microsoft Office software (widely used across organizations)

  • Update 3rd party applications such as Adobe products (Reader, Acrobat, Flash Player), browsers (internet explorer, chrome, Firefox, Edge), and utilities (7zip, CCleaner, and more)

  • Scan endpoints to detect any missing patches and report this to show patch compliance across the environment

One additional way commercial tools can aid organizations in effectively deploying patches is by managing the patch testing phase, transferring the risk away from the internal IT team.

Retroactive Patch Releases:

By now you should understand how risky end-of-support operating systems can be, as for the vast majority of OS-level vulnerabilities will not have patches released, meaning the system will continue to become more vulnerable over time. There have been vulnerabilities so bad that vendors have released security patches for old operating systems, such as Microsoft releasing updates all the way back to Windows XP to mitigate BlueKeep (CVE-2019-0708) in 2019, despite XP going end-of-support in April 2014.

In large enterprises, it is not uncommon to use multiple patching solutions, such as SCCM, and a solution such as ManageEngine for 3rd-party patching, such as browsers, other software, and non-Windows systems.

PreviousCompliance and FrameworksNextSecurity Concepts

Last updated 3 months ago

📑
👨‍💼