Unit No. 2 Part 2 Vulnerabiltity Assessment
Unit No. 2 Part 2 Vulnerabiltity Assessment
Overview
Discovering
weaknesses in an environment
design flaws
other security
Vulnerability Examples
Misconfigurations
Default configurations
buffer overflows
Operating System flaws
Open Services
and others
Classification of
Vulnerabilities
There are different tools available for
network administrators and
Pentesters to scan for vulnerabilities
in a network.
Discovered vulnerabilities are
classified into three different
categories based on their security
levels, i.e., low, medium or high.
furthermore, they can also be
categorized as exploit range such as
Vulnerability
Assessment
Vulnerability Assessment can be defined
as a process of examination, discovery,
and identification of system and
applications security measures and
weaknesses.
Vulnerability assessment also helps to
recognize the vulnerabilities that could
be exploited, need of additional security
layers, and information’s that can be
revealed using scanners.
Types of Vulnerability
Assessments
Active Assessments: which includes actively sending
requests to the live network and examining the responses. It
requires probing the target host.
Passive Assessments: which usually includes packet
sniffing to discover vulnerabilities, running services, open
ports and other information. It is done without interfering the
target host.
External Assessment: It the process of assessment
with hacking's perspective to find out vulnerabilities to exploit
them from outside.
Internal Assessment: includes discovering
vulnerabilities by scanning internal network and infrastructure.
Vulnerability Assessment
Life-Cycle
Vulnerability Assessment Life-
Cycle
Creating Baseline
Creating Baseline is a pre-assessment phase of the vulnerability
assessment life-cycle in which pentester or network
administrator who is performing assessment identifies the nature
of the corporate network, the applications, and services.
He creates an inventory of all resources and assets which helps
to manage, prioritize the assessment.
furthermore, he also maps the infrastructure, learns about the
security controls, policies, and standards followed by the
organization.
In the end, baseline helps to plan the process effectively,
schedule the tasks, and manage them with respect to priority
Vulnerability Assessment