A vulnerability assessment is an in-depth examination of the ability of a system or application, including current security procedures and controls, to withstand exploitation. It detects, evaluates, and categorises security flaws in computer systems, networks, and communication channels. It also scans networks for known security flaws. Spotting security gaps or vulnerabilities in the current security system before attackers can exploit them also helps security professionals secure the network.
Attackers use programs like Nessus, Qualys, GFI LanGuard, and OpenVAS to
search for vulnerabilities. An attacker can find network vulnerabilities, open
ports and services that are operating, application and service configuration
issues, and application and service vulnerabilities by using vulnerability
scanning.
A vulnerability assessment may be used to:
- Identify weaknesses that could be exploited.
- Predict the effectiveness of additional security measures in protecting information resources from attack.
INFORMATION OBTAINED
- The OS version running on computers or devices
- IP and Transmission Control Protocol/User Datagram protocol (TCP/UDP) ports that are listening
- Applications installed on computers.
- An account with weak passwords.
- Files and folders with weak permissions.
- Default services and applications that might have to be uninstalled.
- Errors in the security and configuration of common applications.
- Computers exposed to known or publicly reported vulnerabilities.
- EOL/EOS software information.
- Missing patches and hotfixes
- Weak network configuration and misconfigured or risky ports
- Help to verify the inventory of all devices on the network
SCORING SYSTEMS AND DATABASES
Common Vulnerability Scoring System (CVSS)
Common Vulnerabilities and Exposures (CVE)
National Vulnerability Database (NVD)
Common Weakness Enumeration (CWE)
VULNERABILITY RESEARCH
- To gather information about security trends, newly discovered threats, attack surfaces, attack vectors and techniques.
- To find weaknesses in the OS and applications and alert the network administrator before a network attack.
- To understand information that helps prevent security problems.
- To know how to recover from a network attack.
RESOURCES
- Microsoft Vulnerability Research
- Dark Reading
- SecurityTracker
- Trend Micro
- Security Magazine
- PenTest Magazine
- SC Magazine
- Exploit Database
- Security Focus
- Help Net Security
- HackerStorm
- ComputerWorld
- WindowsSecurity
- D'Crypt
- Phases of Hacking
- Vulnerability Management and Assessment Phases
- Vulnerability Classification
- Vulnerability Assessment Types
- Vulnerability Assessment Solutions and Tools
- Vulnerability Assessment Reports
No comments:
Post a Comment