Vulnerability analysis or Assessment is the process of finding the weakness or bugs in an environment, either in OS, network, web, mobile, etc. which hackers can use for their own benefit. As we
being a penetration tester we do report to the company rather than using it for our own benefit.
Discovered vulnerability is categorized into three categories based on their security level i.e low, medium, and high.
example: IF you have got Vulnerability on the payment gateway it will be at a high level, session hijacking in medium and like source code disclosure, info.
so, The disclosure comes under low-level Vulnerability.
Vulnerability Analysis Or Assessment
This is the phase where you focus on only the target, we try to find the vulnerability in this phase. The assessment process includes examination and inspection of security measures such as physical security as well as security policies and controls.
in this phase, the target is evaluated for misconfigurations, default configurations, faults, and other vulnerabilities either by probing each component individually or using assessment tools.
Once the scanning is complete, findings are ranked in terms of their priorities, which is to be patched at first.
RISK ASSESSMENT:
After all, we assess the risk from the vulnerabilities we found, that if an attacker finds this vulnerability what he can impact on their organization.
REMEDIATION:
This is the most imp. phase in which we fix all the vulnerabilities that we founded. address the high one at first.
VERIFICATION:
suppose I have found 5 vulnerability and reported to the team to patch it, what if he didn’t understand the process to patch two of the vulnerabilities from the 5…so we do verify for this if all the vulnerabilities have been fixed or not.
MONITOR:
The monitoring phase includes monitoring the network traffic and system behaviors for any further intrusion. (monitor for the next intrusion)
Types of Vulnerability Analysis:
1. Active assessment:
whenever an active term comes in the security field it means we are directly communicating with the target or host active assessment means we actively send requests to the live host or target. suppose I am using nexus or Acunetix for scanning vulnerability which means we’re actively scanning the vulnerability as we are directly communicating with the target host.
2. Passive Assessment:
Passive assessment means we are not directly communicating with the target host. It means being in the same network we do sniff the packets and try to find out the vulnerability.
thus, there are lots of sniffing tools like Wireshark, expose, etc. In this assessment, attackers don’t ping or scan the host.
3. External Assessment:
e.g. an organization offers an ethical hacker outside of network to hack website, and he has no knowledge about target. It is just like a black-box methodology.
4. Internal Assessment:
it can be possible in an organization there may be an employee who is a hacker, who can try to harm the organization may be for there a personal reason or to take revenge.
or it can be anything as they have all the knowledge about the target and are in the same network which can be easier for them.
however, the company does the internal assessment and sees how much the company can be affected. And resolves those.
Article By: Sayan Chatterjee
If you are Interested In Machine Learning You Can Check Machine Learning Internship Program
Also Check Other Technical And Non Technical Internship Programs