Vulnerabilities and exploits in cyber security_ (1)
Vulnerabilities and exploits in cyber security_ (1)
Vulnerability :
Software Vulnerabilities:
● Coding Flaws: Bugs, errors, or weaknesses in the software code (e.g., buffer overflow,
SQL injection, improper input validation).
● Unpatched Software: Failure to update or apply security patches leaves software
vulnerable to known threats.
● Default Configurations: Using default settings or credentials without securing them can
create security risks.
Hardware Vulnerabilities:
● Weak Hardware Design: Flaws in the design of hardware components can be exploited
(e.g., the Spectre and Meltdown vulnerabilities in CPUs).
● Firmware Vulnerabilities: Outdated firmware can have weaknesses that attackers
exploit to gain control over hardware.
Network Vulnerabilities:
Operational Vulnerabilities:
● Weak Passwords: Using weak or easily guessable passwords makes systems more
susceptible to brute-force attacks.
The password must be strong enough to protect your data or file whatever it could be
● Unsecured Devices: Physical access to servers, laptops, or network devices can allow
attackers to bypass logical security measures.
● Inadequate Building Security: Lack of physical security measures (like locks or
surveillance) can expose critical systems to risks.
2. Vulnerability Scanning: Automated tools like Nessus, OpenVAS, and Qualys are used
to scan systems and networks for known vulnerabilities.
3. Code Reviews: Manual or automated reviews of source code to identify potential
vulnerabilities.
4. Bug Bounty Programs: Organizations offer rewards to independent security
researchers who discover and report vulnerabilities.
5. Security Audits: Comprehensive security assessments that include reviewing
infrastructure, software, and policies to identify weaknesses.
6. Threat Intelligence: Gathering information from threat intelligence sources about newly
discovered vulnerabilities affecting systems.
The CVSS is a standard method for measuring the severity of vulnerabilities. It provides a
numerical score (from 0.0 to 10.0) that helps organizations understand the risk level:
Reasons :
● Software bugs: Errors in coding can create entry points for attackers.
● Misconfigurations: Incorrect setup or permissions in software or hardware.
● Outdated software: Old software may lack the latest security patches.
● Human error: Weak passwords, lack of training, or unintentional data exposure.
Exploits :
with these techniques Attackers can steal sensitive data or they can modify the data.
1. Regular Patching and Updates: Keep software up-to-date to close known vulnerabilities.
2. Network Segmentation: Limits the spread of attacks within the network.
3. Access Controls: we have to give the required permission or access to the user. Implement
least privilege principles to minimize exposure. (Admin team)
4. Security Monitoring: Use Security Information and Event Management (SIEM) systems to
detect suspicious activity.with that help of that tool we can come to know the vulnerability is
present or this exploitation gonna happen.
5. User Training and Awareness: Educate users on safe practices to reduce human
error-related vulnerabilities. (cyberhoot)
IOAs are about identifying the methods and tactics used by attackers during an attack.
Purpose: To detect and stop an attack before it succeeds. IOAs focus on understanding the
behavior of an attacker to predict and interrupt their actions.
● They are proactive indicators that help cybersecurity teams predict, prevent, and stop
attacks before they cause damage.
Key Focus:
Examples:
Unusual User Behavior: An employee accessing files or systems they typically don't use.
After what are all the steps we need to take after a system or device gets compromised .
Timing Before or during the attack (proactive) After the attack (reactive)
Purpose To detect and prevent potential attacks To analyze, investigate, and respond to
completed attacks
Example Suspicious file transfers, unusual user Malicious IP addresses, file hashes,
activity, privilege misuse unauthorized registry changes