PTC - Interview Questions On Vulnerability Assessment 1
PTC - Interview Questions On Vulnerability Assessment 1
Vulnerability Management
What is Vulnerability?
• A vulnerability is a weakness in a system, network or application.
• System - Running with older version of a software
• Network - Use of unsecure protocols
• Application - No user input validation (leads to injection attacks)
What is Threat?
• Anything/Anyone that can exploit a vulnerability, intentionally or accidentally is a Threat
What is Risk?
• The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability.
Example: Financial losses because a e-commerce server is down, Loss of reputation etc.
What is Exploit?
• A tool used to take advantage of the vulnerability.
• Vulnerability Assessment is the process of defining, identifying, classifying and prioritizing vulnerabilities in
computer systems, applications and network infrastructures.
• Vulnerability Assessment team closely works with other infrastructure teams to help them remediate/patch
vulnerabilities with the systems they manage.
Explain Vulnerability Management life cycle.
• Prioritize Assets - Prioritize the assets based on the criticality and risk.
• Vulnerability Assessment is all about identifying the vulnerabilities and reporting them for patching and
remediation.
• Penetration Testing is going one step ahead (after identifying the vulnerabilities) and exploiting the
vulnerability.
• Penetration Testing will help companies assess the risk in a better way.
Name few VA tools?
• The popular Vulnerability Assessment tools are
✓ Tenable Nessus
✓ Qualys Guard
✓ Rapid7 Nexpose
✓ OpenVAS (Open Vulnerability Scanner) - Open source tool
What is a Scan Template?
• A scan template is a pre-configured setting for a specific type of scan a user wants to perform.
Example: Scar, -emplates
< 88ick to Scans
Basic NetwOf'k Scan Advanced Scan Advanced Dynamic Scan Malware Scan
Web Application Tests Credentialed Patch Audit Badlock OetecUon Bash Shellshock OetecUon DROWN Detection
Intel AMT Security Bypan Shadow Brokers Scan Spectre and Meltdown WannaCry Ransomware
How do VA Scanner identify Vulnerabilities?
• Most VA scanners use some kind of Scripting languages to scan the machines and the results are compared
with the database of know vulnerabilities.
• A vulnerability scanner can also detect weak configurations and passwords, no password, default
passwords.
• Some of the scripts looks for Registry values to identify the version and patch level of an application.
Where do you find Vulnerability details?
• CVE stands for Common Vulnerabilities and Exploits. It is a number given to each identified vulnerability.
• CVE is a list of entries-each containing an identification number, a description, and at least one public
reference-for publicly known cybersecurity vulnerabilities.
• The format of the CVE is:
CVE prefix + Year + 4 Arbitrary Digits (CVE-YYYY-NNNN)
Example: CVE-2019-1760
What is CVSS?
• CVSS stands for Common Vulnerability Scoring System. It is an industry standard used by vendors to define
the criticality of a vulnerability. The score ranges from Oto 10.
00 O 39 O 6.9
• Vulnerability assessments are usually performed on a scheduled basis, typically Monthly once or Quarterly
once.
• Also scan can be run on need basis. A solid example is when a new headline vulnerability emerges. When
this vulnerability assessment is performed, the scan are configured to specifically look for the new
vulnerability.
What is Patch Management?
• Patch management is the process of applying (installing) patches to a system or application in order to get
new features, fix bugs or security issues.
• Patch is a collection of hotfixes and new features. Usually requires a reboot of the system to be effectively
applied.
v8.5.0 to 8.5.1
• When a team (or individual) wants to perform a change in the server, they raise a Change Request (CR)
• Buffer Overflow vulnerability is a weakness in an application that lets an attacker over-run the fixed length
block of memory. It is possible that attacker might consume the entire memory there by slowing down or
crashing the server. This leads to Denial of Service attack.
Example: CVE-2016-6808 - Buffer overflow in Apache Tomcat Connectors (modjk) before 1.2.42.
What is Remote Code Execution Vulnerability?
• Remote Code Evaluation is a vulnerability that when exploited gives the attacker execute commands on the
compromised server.
• A Remote Code Evaluation can lead to a full compromise of the server.
Example: CVE-2019-1238 - VBScript Remote Code Execution Vulnerability
If a vulnerability cannot be patched immediately, what has to be done?
• Step up the security for the server
• Like Tighten the configurations on OS, AV, Host Firewall etc.
• Check with IPS team if there is a signature available to detected if the vulnerability is being exploited, if so
assign a high severity to it
• Increasing the level of monitoring on the server.
• Typically done by putting the affected server(s) in a list and writing more sensitive rules.
• Like if the default threshold for Brute-force is 100 attempts in 1 minute. On this server it will be 10 in 1 minute.
What are the vulnerabilities you have worked on?
• I can always recall working on the WannaCry Ransomware Threat.
• We had 800 Windows Servers and around 4000 Windows Client Machines.
• We were working closely with server/system team and vulnerability management team.
• Pulling reports on a regular basis. We presented a report to our CISO every 3 hours once for almost 4 days. Till we got
98% of the machines patched.
What is the latest vulnerability you have heard of?