VAPT
VAPT
1. Reconnaissance
2. Scanning
3. Gaining Access
4. Maintaining Access
5. Clearing Tracks
Ethical hacking
Hacking is broadly defined as the act of breaking into a computer system. Hacking may
lead to criminal charges when a hacker accesses someone else's computer system without
consent.
For example, a hacker may use a phishing scam to install malware on a computer network.
They may also install computer programs, allowing them to commit identity theft or steal
confidential information.
❖ What damage can hackers do?
Cybersecurity hacking can cause real havoc. Whatever technique hackers use, once they
have gained access to your data or devices, they can:
❖ Steal your money and open credit card and bank accounts in your name
❖ Destroy your credit rating
❖ Request new account Personal Identification Numbers (PINs) or additional credit
cards
❖ Make purchases on your behalf
❖ Add themselves or an alias that they control as an authorized user so it’s easier to use
your credit
❖ Use and abuse your Social Security number
❖ Sell your information to others who will use it for malicious purposes
❖ Delete or damage important files on your computer
❖ Obtain sensitive personal information and share it, or threaten to share it, publicly
Domain Name System(DNS)
Domain Name System(DNS) is nothing but a program that converts or translates a website
name into an IP address and vice versa.
Example: A user enters www.redbull.org in a browser, now the DNS will intercept this
request and will fetch the corresponding IP address and connect the user to that fetched IP
address.
Information Gathering Methodologies OSINT Framework
Web Shells:
Attack Mechanism:
Web shells are malicious scripts that attackers upload to a web server to gain remote access
and control over the server. They can be used to execute commands, upload/download files,
and perform various malicious activities.
Defensive Mechanism:
● Implement the principle of least privilege to limit the permissions of web server
processes and directories where uploads occur.
● Use WAFs to detect and block known web shell patterns and behaviors.
Language Specific Vulnerabilities:
Template injection occurs when an attacker injects malicious code into a template engine,
leading to the execution of unintended commands.
Defensive Mechanism:
Attack Mechanism:
Object injection involves manipulating serialized objects to execute arbitrary code and
compromise the application.
Defensive Mechanism:
Input Validation:
● Validate and sanitize user input, especially if it is used in object deserialization
processes.
Use Safe Deserialization Libraries:
● Employ libraries that support safe deserialization practices, or implement proper
input validation before deserialization.
Evaluation Method Vulnerability (RCE):
Attack Mechanism:
Code Review:
● Regularly review code to identify and fix potential vulnerabilities related to code
evaluation.
Least Privilege Principle:
● Restrict the permissions of components to the minimum necessary for their
functionality to minimize the impact of a successful RCE attack.
Other Vulnerabilities:
Defensive Mechanism:
● Employ a WAF to filter and monitor HTTP traffic between a web application and
the Internet.
Network Segmentation:
● Implement network segmentation to isolate web application servers from critical
internal resources.
Web service hardening refers to the process of securing and strengthening web services
to protect them from various security threats and vulnerabilities. Web services are often
essential components in modern applications, enabling communication and data exchange
between different systems over the internet. Hardening these services is crucial to prevent
unauthorized access, data breaches, and other security incidents