3D Tool Examples
description
Transcript of 3D Tool Examples
![Page 1: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/1.jpg)
3D Tool Examples
Dave Breslin (@ Tenable Discussions Forum)
![Page 2: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/2.jpg)
Tenable Documentation3D Tool 2.0 User Guide3D Tool 2.0 Quick Start Guide
![Page 3: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/3.jpg)
TopologyTopology derived from Nessus traceroute dataConsider creating a user in SecurityCenter just for use
with the 3D ToolFilter a SecurityCenter traceroute query by address to
control the areas of your network to render
![Page 4: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/4.jpg)
Nessus Traceroute Plugin 10287
![Page 5: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/5.jpg)
SC Host Query
![Page 6: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/6.jpg)
IP Topology Configuration
(Create a login first, see 3D Tool 2.0 Quick Start Guide->Step 4)
![Page 7: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/7.jpg)
Topology Rendering for Host
![Page 8: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/8.jpg)
Network Topology Rendering
(Use another SecurityCenter 10287 query not filtered on a single host)
![Page 9: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/9.jpg)
Internet Facing ServicesUse 3D Tool “Modifiers” to highlight Internet facing
servicesHosts will have raised bars representing counts for
Internet facing servicesIts important to understand where host services are
exposed to the Internet when prioritizing vulnerabilitiesUse PVS plugin 14, “Accepts External Connections”Use existing network topology demonstrated in previous
slide
![Page 10: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/10.jpg)
PVS Plugin 14
![Page 11: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/11.jpg)
SC Plugin 14 Query
![Page 12: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/12.jpg)
Modifier (PVS Plugin 14)
(3D Tool 2.0 User Guide -> Modifiers -> Count List)
Ensure to use “Total Vulns” from the Internet Facing Services SecurityCenter Query
![Page 13: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/13.jpg)
![Page 14: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/14.jpg)
Internet Browsing ServicesUse a “Count List” Modifier like the previous Internet
Facing Services exampleHosts will have raised bars representing counts for
services they connect to on the InternetIts important to understand where hosts reach out to the
Internet when prioritizing “client” vulnerabilitiesClient vulnerabilities are detected by PVS and Nessus
when using credentialed scansUse PVS plugin 16, “Outbound external connection”
![Page 15: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/15.jpg)
PVS Plugin 16
![Page 16: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/16.jpg)
![Page 17: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/17.jpg)
Port 21 FTP ConnectionsUse a “Connections List” ModifierShow connection line for hosts that connect to port 21Dark shaded side of a connection line will highlight a host
that makes a connection to port 21White shaded side of a connection line will highlight a
host that provides a service on port 21Its important to understand on a network where services
are provided and usedUse PVS plugin 3, “Internal client trusted connection”
![Page 18: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/18.jpg)
PVS Plugin 3
![Page 19: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/19.jpg)
SC Query FTP Connections
![Page 20: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/20.jpg)
Modifier (PVS Plugin 3)
(3D Tool 2.0 User Guide -> Modifiers -> Connections List)
![Page 21: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/21.jpg)
![Page 22: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/22.jpg)
Nessus Versus PVS VulnsUse two “Count List” ModifiersHosts will have bars on top of them representing Nessus
vulnerability countsHosts will have bars below them representing PVS
vulnerability countsIts important to look for potential gaps in coverageNessus gaps might be caused by unscanned service ports,
infrequent host scanning or lack of credentialed scanningPVS gaps might be caused by configuration errors,
network visibility issues or poor operations management
![Page 23: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/23.jpg)
SC Vuln Queries
Consider filtering out info and low severity rated vulnerabilities
![Page 24: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/24.jpg)
Modifiers (Vulnerability Counts)
(3D Tool 2.0 User Guide -> Modifiers -> Count List)
Ensure to use “Total Vulns” from both queries
![Page 25: 3D Tool Examples](https://reader035.fdocuments.in/reader035/viewer/2022062410/56816385550346895dd46c55/html5/thumbnails/25.jpg)