Tools

2.2 Given a scenario, analyze output from vulnerability assessment tools.

📘CompTIA CySA+ (CS0-003)


This section is very important for the CySA+ exam. You must understand:

  • What each tool is used for
  • What type of output it produces
  • How to read and analyze that output
  • How to identify real risks vs. false positives
  • When to escalate or recommend remediation

The exam does not require you to run the tools. It tests your ability to analyze the results.


1. Network Scanning and Mapping Tools

These tools help security analysts discover systems, services, and relationships inside a network.


🔹 Angry IP Scanner

Type: Network discovery tool
Purpose: Finds live hosts (active devices) on a network

What It Does

  • Scans IP ranges
  • Identifies:
    • Live hosts
    • Open ports
    • Hostnames
    • MAC addresses

Output You May See

  • IP address list
  • Status (Alive/Dead)
  • Open ports (e.g., 80, 443, 22)
  • Ping response time

How to Analyze the Output

  • Identify unauthorized devices
  • Identify unexpected open ports
  • Check for systems that should not be accessible
  • Look for unusual services (e.g., Telnet port 23 open)

If a device appears that is not in asset inventory → possible rogue device.


🔹 Maltego

Type: OSINT and relationship mapping tool
Purpose: Visualizes relationships between entities

What It Does

  • Maps domains, IPs, emails, usernames
  • Shows connections between systems
  • Helps in reconnaissance

Output You May See

  • Graph diagrams
  • Nodes (domains, IPs, people)
  • Connections between entities

How to Analyze

  • Identify unknown external connections
  • Detect suspicious domain associations
  • Spot infrastructure tied to known malicious entities

For exam: understand that Maltego is used for intelligence gathering and mapping relationships, not direct vulnerability scanning.


2. Web Application Scanners

These tools test web applications for vulnerabilities.


🔹 Burp Suite

Type: Web vulnerability testing platform
Used for: Intercepting and analyzing HTTP/HTTPS traffic

Key Features

  • Proxy
  • Scanner
  • Intruder (fuzzing)
  • Repeater

Common Findings

  • SQL injection
  • Cross-site scripting (XSS)
  • Broken authentication
  • Insecure cookies

Output Analysis

Burp reports include:

  • Severity level (Low, Medium, High, Critical)
  • Affected URL
  • Parameter vulnerable
  • Proof of concept

You must:

  • Verify severity
  • Check exploitability
  • Confirm if vulnerability is authenticated or public-facing

🔹 OWASP Zed Attack Proxy (ZAP)

Type: Web application scanner
Developed by: OWASP

What It Finds

  • XSS
  • Injection flaws
  • Security misconfigurations
  • Missing headers

Output

  • Alerts
  • Risk level
  • Description
  • Recommended fix

For exam:

  • Understand risk categories
  • Know that ZAP supports automated and manual testing

🔹 Arachni

Type: Web application vulnerability scanner

Focuses On:

  • SQL injection
  • XSS
  • File inclusion
  • Command injection

Output

  • Detailed vulnerability reports
  • Technical explanation
  • HTTP request/response

You should analyze:

  • Attack vector
  • Parameter affected
  • Impact level

🔹 Nikto

Type: Web server scanner

What It Scans

  • Outdated software
  • Default files
  • Dangerous configurations
  • Known vulnerabilities

Output Example

  • Server version
  • Missing patches
  • Exposed admin panels

Important: Nikto often produces many findings.
You must:

  • Identify false positives
  • Focus on high-risk findings
  • Confirm outdated server versions

3. Vulnerability Scanners

These tools scan systems for known vulnerabilities using databases.


🔹 Nessus

Developed by: Tenable

Type: Vulnerability scanner

What It Detects

  • Missing patches
  • CVEs
  • Weak configurations
  • Compliance issues

Output Includes

  • CVE number
  • CVSS score
  • Severity rating
  • Plugin ID
  • Remediation steps

How to Analyze

  • Check CVSS score (0–10)
  • Identify exploit availability
  • Prioritize critical vulnerabilities
  • Look for systems exposed to the internet

High CVSS + public exploit + external exposure = urgent.


🔹 OpenVAS

Type: Open-source vulnerability scanner

Similar To:

Nessus (community alternative)

Output

  • Vulnerability list
  • Risk rating
  • Technical details

For exam:

  • Know that OpenVAS uses a vulnerability feed
  • Know that it produces false positives
  • You must validate findings before remediation

4. Debuggers

Used for analyzing program behavior and malware.


🔹 Immunity Debugger

Type: Windows debugger

Used For:

  • Malware analysis
  • Exploit development
  • Buffer overflow investigation

Output

  • CPU registers
  • Memory dump
  • Stack trace
  • Assembly instructions

You may need to:

  • Identify crash location
  • Detect buffer overflow patterns
  • Analyze shellcode behavior

🔹 GNU Debugger (GDB)

Part of: GNU Project

Type: Linux debugger

Used For:

  • Debugging applications
  • Analyzing crashes
  • Examining memory

Output

  • Backtrace
  • Stack information
  • Register values

For exam:

  • Know GDB is common in Linux environments
  • Used in exploit and malware analysis

5. Multipurpose Tools

These tools can scan, enumerate, and exploit.


🔹 Nmap

Type: Network scanner

Functions

  • Port scanning
  • Service detection
  • OS detection
  • Script scanning (NSE)

Output Example

  • Open ports
  • Service versions
  • Operating system guess
  • Script results

How to Analyze

  • Look for outdated services
  • Identify exposed services
  • Compare with asset baseline
  • Detect unexpected open ports

If port 21 (FTP) is open on a system that should not use FTP → possible risk.


🔹 Metasploit Framework (MSF)

Developed by: Rapid7

Type: Exploitation framework

Used For:

  • Exploit testing
  • Post-exploitation
  • Validation of vulnerabilities

Output

  • Successful/failed exploit attempts
  • Shell access
  • Session information

For exam:

  • Used to validate vulnerabilities
  • Helps confirm exploitability
  • Often used in penetration testing

🔹 Recon-ng

Type: Reconnaissance framework

Used For:

  • OSINT gathering
  • Domain enumeration
  • API-based intelligence gathering

Output

  • Domain info
  • Subdomains
  • Email addresses
  • Exposed credentials

You analyze:

  • Exposed information
  • Data leakage
  • External attack surface

6. Cloud Infrastructure Assessment Tools

These tools analyze cloud environments for security misconfigurations.


🔹 Scout Suite

Type: Multi-cloud security auditing tool

Supports:

  • AWS
  • Azure
  • Google Cloud

Output

  • HTML report
  • Misconfigurations
  • Risk levels
  • IAM issues

You must analyze:

  • Public storage buckets
  • Over-permissive IAM roles
  • Exposed databases

🔹 Prowler

Type: AWS security assessment tool

Focus:

  • Compliance checks
  • CIS benchmarks
  • AWS security best practices

Output

  • Pass/Fail results
  • Risk rating
  • Service affected

You analyze:

  • Failed checks
  • Critical IAM issues
  • Logging disabled findings

🔹 Pacu

Type: AWS exploitation framework

Used For:

  • Cloud penetration testing
  • IAM privilege escalation
  • S3 data access testing

Output

  • Successful role assumptions
  • Privilege escalation paths
  • Data access results

For exam:

  • Understand Pacu tests cloud security weaknesses
  • Used after misconfigurations are discovered

Key Exam Concepts: Analyzing Tool Output

For CySA+, you must know how to:

1. Identify False Positives

  • Scanner reports vulnerability
  • But patch is already applied
  • Or service is not actually accessible

2. Prioritize Findings

Look at:

  • CVSS score
  • Exploit availability
  • Internet exposure
  • Business impact

3. Identify Common Vulnerability Types

  • Injection flaws
  • Broken authentication
  • Security misconfiguration
  • Outdated software
  • Weak encryption

4. Correlate Results

Example:

  • Nmap shows open port 445
  • Nessus shows SMB vulnerability
  • Metasploit confirms exploit works

That means high-risk confirmed vulnerability.


Important Differences for the Exam

Tool TypeMain Purpose
Angry IP ScannerFind live hosts
MaltegoRelationship mapping
Burp/ZAPWeb app testing
NiktoWeb server scanning
Nessus/OpenVASVulnerability scanning
NmapPort scanning & service detection
MetasploitExploit validation
Scout Suite/ProwlerCloud misconfiguration checks
GDB/ImmunityDebugging & malware analysis

Final Exam Tips

  • Know what category each tool belongs to.
  • Understand the type of output each tool produces.
  • Focus on severity, exploitability, and exposure.
  • Be able to identify the next action:
    • Patch?
    • Disable service?
    • Harden configuration?
    • Escalate?
Buy Me a Coffee