Vapt life cycle

WHAT IS VAPT?
• Vulnerability assessment and penetration testing is a technique to
protect your organization against external and internal threats by
identifying the security threats. It is an on-demand activity and EGS
offers a broad range of network infrastructure, web application, and
mobile application security assessment services designed to detect
and gauge security vulnerabilities.
Why do you need VAPT?
• Considering the recent hacks
across the globe, it has become
imperative for companies to keep
their information secure. VAPT
helps in:
• Prevention from damage to an
organization’s reputation
• Fixing the issues caused by an
attack
• Preventing confidential data and
intellectual property from being
stolen
• Prevention of revenue loss due to
service disruption
What is Essential Terminology?
• Vulnerability :
The vulnerability refers to a weak point, loophole or a cause in any system or
network which can be helpful and utilized by the attackers to go through it. Any
vulnerability can be an entry point for them to reach the target.
• Exploit :
Exploit is a breach of security of a system through Vulnerabilities, Zero-Day
Attacks or any other hacking techniques.
• Payload :
The payload referrs to the actual section of information or data in a frame as
opposed to automatically generated metadata. In information security, Payload
is a section or part of a malicious and exploited code that causes the potentially
harmful activity and actions such as exploit, opening backdoors, and hijacking.
Essential Terminology :
• Daisy Chaining :
Daisy Chaining is a sequential process of several hacking or attacking
attempts to gain access to network or systems, one after another, using
the same information and the information obtained from the previous
attempt.
• Zero-day vulnerability:
A zero-day vulnerability, at its core, is a flaw. It is an unknown exploit
in the wild that exposes a vulnerability in software or hardware and
can create complicated problems well before anyone realizes
something is wrong. In fact, a zero-day exploit leaves NO opportunity
for detection ... at first.
What is the CIA Triad?
• The CIA triad is a model that shows the three
main goals needed to achieve information
security. While a wide variety of factors
determine the security situation of information
systems and networks. The assumption is that
there are some factors that will always be
important in information security. These factors
are the goals of the CIA triad, as follows:
• Confidentiality
• Integrity
• Availability
Confidentiality :
• We want to make sure that our secret and sensitive data is secure.
Confidentiality means that only authorized persons can work with
and see our infrastructure’s digital resources. It also implies that
unauthorized persons should not have any access to the data. There
are two types of data in general: data in motion as it moves across the
network and data at rest, when data is in any media storage (such as
servers, local hard drives, cloud). For data in motion, we need to
make sure data encryption before sending it over the network.
Another option we can use along with encryption is to use a separate
network for sensitive data. For data at rest, we can apply encryption
at storage media drive so that no one can read it in case of theft.
Integrity Availability
• We do not want our data to be
accessible or manipulated by
unauthorized persons. Data
integrity ensures that only
authorized parties can modify
data.
• It applies to systems and data. If
authorized persons cannot get
the data due to general network
failure or denial-of-service(DOS)
attack, then that is the problem
as long as the business is
concerned. It may also result in
loss of revenues or recording
some important results.
We can use the term “CIA” to remember these basic yet
most important security concepts.
1. Information gathering (Scoping)
• Scoping is the primary step of any security assessment activity. In order to execute a VA or PenTest, the first
step is to identify the scope of the assessment in terms of infrastructure against which the assessment is to
be conducted, for example, servers,network devices, security devices, databases, and applications.
• This stage includes finding out information about the target system using both technical (WhoIS) and
nontechnical passive methods such as the search engine.
• This step is critical as it helps in getting a better picture of the target infrastructure and its resources. As the
timeline of the assessment is generally time bound, information captured during this phase helps in
streamlining the effort of testing in the right direction by using the right tools and approach applicable to
target systems.
• This step becomes more important for a Black box assessment where very limited information about the
target system is shared. Information gathering is followed by a more technical approach to map the target
network using utilities such as pings and Telnet and using port scanners such as NMAP. The use of such tools
would enable assessors to find a live host, open services, operating systems, and other information.
2. Scanning
• This stage involves the actual scanning of the target infrastructure to identify existing
vulnerabilities of the system. This is done using Network scanners such as Nmap. Prior to
scanning, the tool should be configured optimally as per the target infrastructure
information captured during the initial phases.
• Care should alsobe taken that the tool is able to reach the target infrastructure by
allowing access through relevant intermediate systems such as firewalls.
• Such scanners perform protocol TCP, UDP, and ICMP scans to find open ports and
services running on the target machine and match them to well-known published
vulnerabilities updated regularly in the tool’s signature database if they exist in the target
infrastructure.
3. Vulnerbility analysis
• Defining and classifying network or System resources.
• Assigning priority to the resource( Ex: - High, Medium, Low)
• Identifying potential threats to each resource.
• Developing a strategy to deal with the most prioritize problems
first.
• Defining and implementing ways to minimize the consequences if
an attack occurs.
Vulnerability Assessment
• Advantages of Vulnerability
Assessment
 Open Source tools are available.
 Identifies almost all vulnerabilities
 Automated for Scanning.
 Easy to run on a regular basis.
• Disadvantages of Vulnerability
Assessment
 High false positive rate
 Can easily detect by IDS Firewall.
 Often fail to notice the latest
vulnerabilities.
4. Vulnerability exploitation (Penetration Testing)
• Penetration Testing is the next step to Vulnerability Assessment aiming to
penetrate the target system based on
• Exploits available for the identified vulnerabilities. For exploitation, our own
knowledge or publicly available exploits of well-known vulnerabilities can be
utilized.
• Penetration Testing or Vulnerability Exploitation can be broadly divided into
phases such as pre exploitation, exploitation, and post exploitation.
• Activities in the pre-exploitation phase are explained in phases 1 to 4, that is,
enumerating the infrastructure and identifying the vulnerability.
• Once any vulnerability is exploited to gain access to the system, the attacker
should aim to further detail the network by sniffing traffic, mapping the internal
network, and trying to obtain a higher privilege account to gain the maximum
level of access to the system.
5. Report generation
• After completing the assessment as per the scope of work, final
reporting needs to be done covering the following key areas:
• A brief introduction about the assessment
• The scope of assessment
• The management/executive summary
• A synopsis of findings with risk severity
• Details about each finding with their impact and your
recommendations to
• Fix the vulnerability with remediation.
Benefits of Penetration Testing
• Test network or system using the tools and techniques that attackers
use.
• Demonstrate at what depth vulnerabilities can be exploited.
• Validate vulnerabilities.
• Can provide the realism and evidence needed to address security
issue.
Weaknesses of Penetration Testing
• Labor intensive, require great expertise.
• Dangerous when conducted by inexperienced
• Tester. Revel source code to third party.
• Expensive.
• Some tools and methods may be banned by
• Agency regulation. Conducted in limited time period.
• If a service is not tested then there will be no information about its
security or insecurity.
Reasons for Vulnerability Existence
• Insecure coding practices
• Developer education not focused on security
• Limited testing budget and scope
• Disjoined security processes More resources outside than inside
• Misconfigurations Not updated.
Different Types of Vulnerabilities
• Missing data encryption
• OS command injection
• SQL injection
• Missing authentication for critical function
• Missing authorization
• Unrestricted upload of dangerous file types
• Reliance on untrusted inputs in a security decision
• Cross-site scripting and forgery
• Download of codes without integrity checks
• Use of broken algorithms
• URL redirection to untrusted sites
• Path traversal
• Bugs
• Weak passwords
• Software that is already infected with virus
Vapt life cycle
Vapt life cycle
1 de 20

Recomendados

VAPT - Vulnerability Assessment & Penetration Testing por
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
8.3K visualizações19 slides
Vulnerability assessment & Penetration testing Basics por
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Mohammed Adam
2K visualizações17 slides
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra... por
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Edureka!
2K visualizações20 slides
VAPT PRESENTATION full.pptx por
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxDARSHANBHAVSAR14
1.9K visualizações36 slides
Vulnerability and Assessment Penetration Testing por
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingYvonne Marambanyika
313 visualizações7 slides
Cyber Threat Intelligence: Building and maturing an intelligence program that... por
Cyber Threat Intelligence: Building and maturing an intelligence program that...Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...Mark Arena
4K visualizações33 slides

Mais conteúdo relacionado

Mais procurados

Cybersecurity Basics - Aravindr.com por
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
277 visualizações20 slides
Ethical Hacking n VAPT presentation by Suvrat jain por
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
6.5K visualizações25 slides
WTF is Penetration Testing v.2 por
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2Scott Sutherland
7.6K visualizações54 slides
Threat Hunting - Moving from the ad hoc to the formal por
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
1K visualizações27 slides
Penetration testing reporting and methodology por
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
5.3K visualizações18 slides
MITRE ATT&CK Framework por
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Frameworkn|u - The Open Security Community
3.3K visualizações31 slides

Mais procurados(20)

Cybersecurity Basics - Aravindr.com por Aravind R
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
Aravind R277 visualizações
Ethical Hacking n VAPT presentation by Suvrat jain por Suvrat Jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
Suvrat Jain6.5K visualizações
WTF is Penetration Testing v.2 por Scott Sutherland
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
Scott Sutherland7.6K visualizações
Threat Hunting - Moving from the ad hoc to the formal por Priyanka Aash
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
Priyanka Aash1K visualizações
Penetration testing reporting and methodology por Rashad Aliyev
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev5.3K visualizações
Red team Engagement por Indranil Banerjee
Red team EngagementRed team Engagement
Red team Engagement
Indranil Banerjee1.8K visualizações
Penetration Testing Execution Phases por Nasir Bhutta
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
Nasir Bhutta1.8K visualizações
Security testing presentation por Confiz
Security testing presentationSecurity testing presentation
Security testing presentation
Confiz8.2K visualizações
Networking and penetration testing por Mohit Belwal
Networking and penetration testingNetworking and penetration testing
Networking and penetration testing
Mohit Belwal2.5K visualizações
Cybercrime and Security por Noushad Hasan
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan1.5K visualizações
Vapt( vulnerabilty and penetration testing ) services por Akshay Kurhade
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) services
Akshay Kurhade536 visualizações
Introduction to Web Application Penetration Testing por Anurag Srivastava
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
Anurag Srivastava2.2K visualizações
Social engineering por Robert Hood
Social engineeringSocial engineering
Social engineering
Robert Hood2.5K visualizações
Introduction to penetration testing por Nezar Alazzabi
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
Nezar Alazzabi2K visualizações
What is pentest por itissolutions
What is pentestWhat is pentest
What is pentest
itissolutions895 visualizações
Cyber security por manoj duli
Cyber securityCyber security
Cyber security
manoj duli1.7K visualizações

Similar a Vapt life cycle

Penentration testing por
Penentration testingPenentration testing
Penentration testingtahreemsaleem
309 visualizações22 slides
Vulenerability Management.pptx por
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptxThavaselviMunusamy1
13 visualizações26 slides
NETWORK PENETRATION TESTING por
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGEr Vivek Rana
5.6K visualizações20 slides
Running Head Security Assessment Repot (SAR) .docx por
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docxSUBHI7
4 visualizações36 slides
Ethical hacking por
Ethical hacking Ethical hacking
Ethical hacking Јаѓќеѕн Јажѕшаф
28 visualizações18 slides
What is Penetration & Penetration test ? por
What is Penetration & Penetration test ?What is Penetration & Penetration test ?
What is Penetration & Penetration test ?Bhavin Shah
976 visualizações10 slides

Similar a Vapt life cycle(20)

Penentration testing por tahreemsaleem
Penentration testingPenentration testing
Penentration testing
tahreemsaleem309 visualizações
Vulenerability Management.pptx por ThavaselviMunusamy1
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
ThavaselviMunusamy113 visualizações
NETWORK PENETRATION TESTING por Er Vivek Rana
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
Er Vivek Rana5.6K visualizações
Running Head Security Assessment Repot (SAR) .docx por SUBHI7
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
SUBHI74 visualizações
What is Penetration & Penetration test ? por Bhavin Shah
What is Penetration & Penetration test ?What is Penetration & Penetration test ?
What is Penetration & Penetration test ?
Bhavin Shah976 visualizações
Vulnerability and Penetration Testing por Jeffery Brown
Vulnerability and Penetration TestingVulnerability and Penetration Testing
Vulnerability and Penetration Testing
Jeffery Brown610 visualizações
Info Security - Vulnerability Assessment por Marcelo Silva
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability Assessment
Marcelo Silva13.6K visualizações
CISM_WK_3.pptx por dotco
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptx
dotco16 visualizações
1 (20 files merged).ppt por seshas1
1 (20 files merged).ppt1 (20 files merged).ppt
1 (20 files merged).ppt
seshas16 visualizações
Introduction to cyber security por Geevarghese Titus
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Geevarghese Titus105 visualizações
The 5 Layers of Security Testing by Alan Koch por QA or the Highway
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
QA or the Highway89 visualizações
The 5 Layers of Security Testing by Alan Koch por QA or the Highway
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
QA or the Highway114 visualizações
Security (IM).ppt por GooglePay16
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
GooglePay1614 visualizações
Introduction to Cyber Forensics Module 1 por Anpumathews
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
Anpumathews200 visualizações
Phi 235 social media security users guide presentation por Alan Holyoke
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
Alan Holyoke1.4K visualizações
VMI based malware detection in virtual environment por Ayush Gargya
VMI based malware detection in virtual environmentVMI based malware detection in virtual environment
VMI based malware detection in virtual environment
Ayush Gargya156 visualizações
Cyber-Espionage: Understanding the Advanced Threat Landscape por Aaron White
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
Aaron White2.1K visualizações
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch! por Michele Chubirka
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Michele Chubirka6.7K visualizações

Mais de penetration Tester

Maven por
MavenMaven
Mavenpenetration Tester
55 visualizações3 slides
Jenkins por
JenkinsJenkins
Jenkinspenetration Tester
73 visualizações11 slides
Jenkins por
JenkinsJenkins
Jenkinspenetration Tester
62 visualizações5 slides
Sonar qube por
Sonar qubeSonar qube
Sonar qubepenetration Tester
135 visualizações9 slides
Owasp zap por
Owasp zapOwasp zap
Owasp zappenetration Tester
370 visualizações22 slides
Sonarlint por
SonarlintSonarlint
Sonarlintpenetration Tester
225 visualizações10 slides

Mais de penetration Tester(20)

Deployment Strategies por penetration Tester
Deployment StrategiesDeployment Strategies
Deployment Strategies
penetration Tester21 visualizações
Directory traversal por penetration Tester
Directory traversalDirectory traversal
Directory traversal
penetration Tester27 visualizações

Último

BUSINESS ETHICS MODULE 1 UNIT I_B.pdf por
BUSINESS ETHICS MODULE 1 UNIT I_B.pdfBUSINESS ETHICS MODULE 1 UNIT I_B.pdf
BUSINESS ETHICS MODULE 1 UNIT I_B.pdfDr Vijay Vishwakarma
55 visualizações21 slides
ICS3211_lecture 09_2023.pdf por
ICS3211_lecture 09_2023.pdfICS3211_lecture 09_2023.pdf
ICS3211_lecture 09_2023.pdfVanessa Camilleri
150 visualizações10 slides
Mineral nutrition and Fertilizer use of Cashew por
 Mineral nutrition and Fertilizer use of Cashew Mineral nutrition and Fertilizer use of Cashew
Mineral nutrition and Fertilizer use of CashewAruna Srikantha Jayawardana
59 visualizações107 slides
DISTILLATION.pptx por
DISTILLATION.pptxDISTILLATION.pptx
DISTILLATION.pptxAnupkumar Sharma
82 visualizações47 slides
Education of marginalized and socially disadvantages segments.pptx por
Education of marginalized and socially disadvantages segments.pptxEducation of marginalized and socially disadvantages segments.pptx
Education of marginalized and socially disadvantages segments.pptxGarimaBhati5
52 visualizações36 slides
UNIT NO 13 ORGANISMS AND POPULATION.pptx por
UNIT NO 13 ORGANISMS AND POPULATION.pptxUNIT NO 13 ORGANISMS AND POPULATION.pptx
UNIT NO 13 ORGANISMS AND POPULATION.pptxMadhuri Bhande
48 visualizações33 slides

Último(20)

BUSINESS ETHICS MODULE 1 UNIT I_B.pdf por Dr Vijay Vishwakarma
BUSINESS ETHICS MODULE 1 UNIT I_B.pdfBUSINESS ETHICS MODULE 1 UNIT I_B.pdf
BUSINESS ETHICS MODULE 1 UNIT I_B.pdf
Dr Vijay Vishwakarma55 visualizações
ICS3211_lecture 09_2023.pdf por Vanessa Camilleri
ICS3211_lecture 09_2023.pdfICS3211_lecture 09_2023.pdf
ICS3211_lecture 09_2023.pdf
Vanessa Camilleri150 visualizações
DISTILLATION.pptx por Anupkumar Sharma
DISTILLATION.pptxDISTILLATION.pptx
DISTILLATION.pptx
Anupkumar Sharma82 visualizações
Education of marginalized and socially disadvantages segments.pptx por GarimaBhati5
Education of marginalized and socially disadvantages segments.pptxEducation of marginalized and socially disadvantages segments.pptx
Education of marginalized and socially disadvantages segments.pptx
GarimaBhati552 visualizações
UNIT NO 13 ORGANISMS AND POPULATION.pptx por Madhuri Bhande
UNIT NO 13 ORGANISMS AND POPULATION.pptxUNIT NO 13 ORGANISMS AND POPULATION.pptx
UNIT NO 13 ORGANISMS AND POPULATION.pptx
Madhuri Bhande48 visualizações
GSoC 2024 .pdf por ShabNaz2
GSoC 2024 .pdfGSoC 2024 .pdf
GSoC 2024 .pdf
ShabNaz245 visualizações
Interaction of microorganisms with vascular plants.pptx por MicrobiologyMicro
Interaction of microorganisms with vascular plants.pptxInteraction of microorganisms with vascular plants.pptx
Interaction of microorganisms with vascular plants.pptx
MicrobiologyMicro75 visualizações
Introduction to AERO Supply Chain - #BEAERO Trainning program por Guennoun Wajih
Introduction to AERO Supply Chain  - #BEAERO Trainning programIntroduction to AERO Supply Chain  - #BEAERO Trainning program
Introduction to AERO Supply Chain - #BEAERO Trainning program
Guennoun Wajih135 visualizações
BUSINESS ETHICS MODULE 1 UNIT I_A.pdf por Dr Vijay Vishwakarma
BUSINESS ETHICS MODULE 1 UNIT I_A.pdfBUSINESS ETHICS MODULE 1 UNIT I_A.pdf
BUSINESS ETHICS MODULE 1 UNIT I_A.pdf
Dr Vijay Vishwakarma102 visualizações
Creative Restart 2023: Christophe Wechsler - From the Inside Out: Cultivating... por Taste
Creative Restart 2023: Christophe Wechsler - From the Inside Out: Cultivating...Creative Restart 2023: Christophe Wechsler - From the Inside Out: Cultivating...
Creative Restart 2023: Christophe Wechsler - From the Inside Out: Cultivating...
Taste39 visualizações
JRN 362 - Lecture Twenty-Two por Rich Hanley
JRN 362 - Lecture Twenty-TwoJRN 362 - Lecture Twenty-Two
JRN 362 - Lecture Twenty-Two
Rich Hanley39 visualizações
The Future of Micro-credentials: Is Small Really Beautiful? por Mark Brown
The Future of Micro-credentials:  Is Small Really Beautiful?The Future of Micro-credentials:  Is Small Really Beautiful?
The Future of Micro-credentials: Is Small Really Beautiful?
Mark Brown121 visualizações
INT-244 Topic 6b Confucianism por S Meyer
INT-244 Topic 6b ConfucianismINT-244 Topic 6b Confucianism
INT-244 Topic 6b Confucianism
S Meyer51 visualizações
Essay On Econ por Ashley Fisher
Essay On EconEssay On Econ
Essay On Econ
Ashley Fisher121 visualizações
Artificial Intelligence and The Sustainable Development Goals (SDGs) Adoption... por BC Chew
Artificial Intelligence and The Sustainable Development Goals (SDGs) Adoption...Artificial Intelligence and The Sustainable Development Goals (SDGs) Adoption...
Artificial Intelligence and The Sustainable Development Goals (SDGs) Adoption...
BC Chew40 visualizações
MercerJesse3.0.pdf por jessemercerail
MercerJesse3.0.pdfMercerJesse3.0.pdf
MercerJesse3.0.pdf
jessemercerail183 visualizações
Meet the Bible por Steve Thomason
Meet the BibleMeet the Bible
Meet the Bible
Steve Thomason83 visualizações
11.30.23A Poverty and Inequality in America.pptx por mary850239
11.30.23A Poverty and Inequality in America.pptx11.30.23A Poverty and Inequality in America.pptx
11.30.23A Poverty and Inequality in America.pptx
mary850239228 visualizações
JRN 362 - Lecture Twenty-Three (Epilogue) por Rich Hanley
JRN 362 - Lecture Twenty-Three (Epilogue)JRN 362 - Lecture Twenty-Three (Epilogue)
JRN 362 - Lecture Twenty-Three (Epilogue)
Rich Hanley44 visualizações

Vapt life cycle

  • 1. WHAT IS VAPT? • Vulnerability assessment and penetration testing is a technique to protect your organization against external and internal threats by identifying the security threats. It is an on-demand activity and EGS offers a broad range of network infrastructure, web application, and mobile application security assessment services designed to detect and gauge security vulnerabilities.
  • 2. Why do you need VAPT? • Considering the recent hacks across the globe, it has become imperative for companies to keep their information secure. VAPT helps in: • Prevention from damage to an organization’s reputation • Fixing the issues caused by an attack • Preventing confidential data and intellectual property from being stolen • Prevention of revenue loss due to service disruption
  • 3. What is Essential Terminology? • Vulnerability : The vulnerability refers to a weak point, loophole or a cause in any system or network which can be helpful and utilized by the attackers to go through it. Any vulnerability can be an entry point for them to reach the target. • Exploit : Exploit is a breach of security of a system through Vulnerabilities, Zero-Day Attacks or any other hacking techniques. • Payload : The payload referrs to the actual section of information or data in a frame as opposed to automatically generated metadata. In information security, Payload is a section or part of a malicious and exploited code that causes the potentially harmful activity and actions such as exploit, opening backdoors, and hijacking.
  • 4. Essential Terminology : • Daisy Chaining : Daisy Chaining is a sequential process of several hacking or attacking attempts to gain access to network or systems, one after another, using the same information and the information obtained from the previous attempt. • Zero-day vulnerability: A zero-day vulnerability, at its core, is a flaw. It is an unknown exploit in the wild that exposes a vulnerability in software or hardware and can create complicated problems well before anyone realizes something is wrong. In fact, a zero-day exploit leaves NO opportunity for detection ... at first.
  • 5. What is the CIA Triad? • The CIA triad is a model that shows the three main goals needed to achieve information security. While a wide variety of factors determine the security situation of information systems and networks. The assumption is that there are some factors that will always be important in information security. These factors are the goals of the CIA triad, as follows: • Confidentiality • Integrity • Availability
  • 6. Confidentiality : • We want to make sure that our secret and sensitive data is secure. Confidentiality means that only authorized persons can work with and see our infrastructure’s digital resources. It also implies that unauthorized persons should not have any access to the data. There are two types of data in general: data in motion as it moves across the network and data at rest, when data is in any media storage (such as servers, local hard drives, cloud). For data in motion, we need to make sure data encryption before sending it over the network. Another option we can use along with encryption is to use a separate network for sensitive data. For data at rest, we can apply encryption at storage media drive so that no one can read it in case of theft.
  • 7. Integrity Availability • We do not want our data to be accessible or manipulated by unauthorized persons. Data integrity ensures that only authorized parties can modify data. • It applies to systems and data. If authorized persons cannot get the data due to general network failure or denial-of-service(DOS) attack, then that is the problem as long as the business is concerned. It may also result in loss of revenues or recording some important results.
  • 8. We can use the term “CIA” to remember these basic yet most important security concepts.
  • 9. 1. Information gathering (Scoping) • Scoping is the primary step of any security assessment activity. In order to execute a VA or PenTest, the first step is to identify the scope of the assessment in terms of infrastructure against which the assessment is to be conducted, for example, servers,network devices, security devices, databases, and applications. • This stage includes finding out information about the target system using both technical (WhoIS) and nontechnical passive methods such as the search engine. • This step is critical as it helps in getting a better picture of the target infrastructure and its resources. As the timeline of the assessment is generally time bound, information captured during this phase helps in streamlining the effort of testing in the right direction by using the right tools and approach applicable to target systems. • This step becomes more important for a Black box assessment where very limited information about the target system is shared. Information gathering is followed by a more technical approach to map the target network using utilities such as pings and Telnet and using port scanners such as NMAP. The use of such tools would enable assessors to find a live host, open services, operating systems, and other information.
  • 10. 2. Scanning • This stage involves the actual scanning of the target infrastructure to identify existing vulnerabilities of the system. This is done using Network scanners such as Nmap. Prior to scanning, the tool should be configured optimally as per the target infrastructure information captured during the initial phases. • Care should alsobe taken that the tool is able to reach the target infrastructure by allowing access through relevant intermediate systems such as firewalls. • Such scanners perform protocol TCP, UDP, and ICMP scans to find open ports and services running on the target machine and match them to well-known published vulnerabilities updated regularly in the tool’s signature database if they exist in the target infrastructure.
  • 11. 3. Vulnerbility analysis • Defining and classifying network or System resources. • Assigning priority to the resource( Ex: - High, Medium, Low) • Identifying potential threats to each resource. • Developing a strategy to deal with the most prioritize problems first. • Defining and implementing ways to minimize the consequences if an attack occurs.
  • 12. Vulnerability Assessment • Advantages of Vulnerability Assessment  Open Source tools are available.  Identifies almost all vulnerabilities  Automated for Scanning.  Easy to run on a regular basis. • Disadvantages of Vulnerability Assessment  High false positive rate  Can easily detect by IDS Firewall.  Often fail to notice the latest vulnerabilities.
  • 13. 4. Vulnerability exploitation (Penetration Testing) • Penetration Testing is the next step to Vulnerability Assessment aiming to penetrate the target system based on • Exploits available for the identified vulnerabilities. For exploitation, our own knowledge or publicly available exploits of well-known vulnerabilities can be utilized. • Penetration Testing or Vulnerability Exploitation can be broadly divided into phases such as pre exploitation, exploitation, and post exploitation. • Activities in the pre-exploitation phase are explained in phases 1 to 4, that is, enumerating the infrastructure and identifying the vulnerability. • Once any vulnerability is exploited to gain access to the system, the attacker should aim to further detail the network by sniffing traffic, mapping the internal network, and trying to obtain a higher privilege account to gain the maximum level of access to the system.
  • 14. 5. Report generation • After completing the assessment as per the scope of work, final reporting needs to be done covering the following key areas: • A brief introduction about the assessment • The scope of assessment • The management/executive summary • A synopsis of findings with risk severity • Details about each finding with their impact and your recommendations to • Fix the vulnerability with remediation.
  • 15. Benefits of Penetration Testing • Test network or system using the tools and techniques that attackers use. • Demonstrate at what depth vulnerabilities can be exploited. • Validate vulnerabilities. • Can provide the realism and evidence needed to address security issue.
  • 16. Weaknesses of Penetration Testing • Labor intensive, require great expertise. • Dangerous when conducted by inexperienced • Tester. Revel source code to third party. • Expensive. • Some tools and methods may be banned by • Agency regulation. Conducted in limited time period. • If a service is not tested then there will be no information about its security or insecurity.
  • 17. Reasons for Vulnerability Existence • Insecure coding practices • Developer education not focused on security • Limited testing budget and scope • Disjoined security processes More resources outside than inside • Misconfigurations Not updated.
  • 18. Different Types of Vulnerabilities • Missing data encryption • OS command injection • SQL injection • Missing authentication for critical function • Missing authorization • Unrestricted upload of dangerous file types • Reliance on untrusted inputs in a security decision • Cross-site scripting and forgery • Download of codes without integrity checks • Use of broken algorithms • URL redirection to untrusted sites • Path traversal • Bugs • Weak passwords • Software that is already infected with virus

Notas do Editor

  1. NMAP