VAPT - Vulnerability Assessment & Penetration Testing

Netpluz Asia Pte Ltd
Netpluz Asia Pte LtdNetpluz Asia Pte Ltd
Innovative Solutions Hub for the Future
Introduction to VAPT – What, Why, When
What is VAPT?
Vulnerability Assessment
• A process to evaluate and review key
systems, networks and applications
• To identify vulnerabilities and
configuration issues that may put the
organization at risk of being breached
or exploited
• Effective in identifying vulnerabilities,
but it cannot differentiate between
exploitable vs non-exploitable
vulnerabilities
Penetration Testing
• Goal-driven test focused on identifying
all possible routes of entry an attacker
could use to gain unauthorized entry
into the target
• Identifies the potential damage and
further internal compromise an
attacker could carry out once they are
past the perimeter.
• Proof of concept strategy to
investigate, exploit and validate the
extent of the identified vulnerability
• Testing from an external network with no prior
knowledge of the internal network and system
Black Box
Testing
• Test being performed from within the network
• Prior knowledge of the network, architecture and
system.
White Box
Testing
• Testing from an internal or external network
• Partial knowledge of the internal network and system
• Combination of both white and black box testing
Grey Box
Testing
Process Type
Network
Vulnerability
Assessment &
Penetration
Testing
• Internal & External IPs
• VoIP & Cloud ;Telephony
• Devices – Firewall, Switches, Routers, etc
• AWS Cloud
Configuration
Review
• AWS Cloud Assessment
• Devices – Firewall, Switches, Routers, etc
Objective - The scope will be scanned and tested for vulnerabilities using a wide variety of tools and
techniques. The tools and techniques used will be consistent with current industry trends regarding exploitation
of vulnerabilities. The tools and procedures are:
• Threat and attack vectors
• Combination of vulnerabilities exploited in a particular sequence
• Business and operational impact of attacks
• Efficiency of the client’s network and environment to detect and respond to attacks
• Areas of focused investment to reduce or mitigate risks
Test Type
Objective – Key objective is to impersonate a
real-world attacker and discover security issues
within an application. We also want to assist the
organisation in resolving the findings. We also
want to provide a business case for investing in
relevant security controls.
Methodology – Industry standard test cases like,
cookie attacks, sensitive data exposure, session
management, data validation, business logic,
security misconfigurations and much more.
Evaluation – Impact and Risk Factor for the
business. Remediation methods
Application Security
Test Type
Social
Engineering
Training
USB PhishingEmail Phishing
Campaigns
Objective – A simulated attack vector that relies
heavily on human interaction and often involves
manipulating people into breaking normal security
procedures and best practices in order to gain
access to systems, networks or physical locations.
Methodology:
Baiting – An attacker leaves a malware-infected
physical device, such as a USB flash drive, in a
place it is sure to be found. The finder then picks
up the device and loads it onto his or her
computer, unintentionally installing the malware.
Spear Phishing/Phishing – Phishing is when a
malicious party sends a fraudulent email disguised
as a legitimate email, often purporting to be from a
trusted source. The message is meant to trick the
recipient into sharing personal or financial
information or clicking on a link that installs
malware.
Test Type
Why VAPT?
THE PROBLEM
Hacktivist Cyber Criminals Malware/Ransomware State Sponsored Attacks
VAPT for SMEs
Cybersecurity Myths for SMEs
• I have a firewall, so I’m safe from attacks
• Hackers understand strategies adopted by a firewall quite well. Disrupting codes and exploiting basic IT
oversights to gain access to your system is easy.
• While most cyber security threats are avoidable, your organizations can not rely solely on firewalls for
protection.
• I use HTTPS, so my site is secure
• HTTPs safeguards the transmission of information from source to destination. This is web security at a
minimal.
• It does not block attacks like DDoS, brute force, injections, etc.
• There is also the issue of organizations using fake SSL certificates, resulting in their organization being
compromised
• SMEs are safe because they are not worthwhile targets
• SMEs are considered to be low hanging fruits for hackers because so many do not take security seriously.
• One of the most popular attacks that hackers use against SMEs is ransomware.
VAPT for SMEs
Why do SMEs need VAPT?
• Basic security measures are not enough.
• Firewalls or anti-virus solutions are not sufficient to protect against attacks.
• Security budget
• Unlike MNCs, SMEs do not have the budget to implement everything.
• There is limited or no resource for security expertise.
• What VAPT adds value to is to streamline what is needed for the organization.
• Reputation
• Potential clients or business partners will feel insecure on collaboration.
• Contributing factors can be issues like safeguard of important data.
• SMEs also lose out on potential/existing business.
• Compared to SMEs, larger organizations have a much greater potential to survive an attack due to the help of
current investors and existing large clients. (E.g. Sony (04/2011) survived through the attack.)
VAPT for SMEs
Almost 40% of cyberattacks in Singapore target small and medium enterprises (SMEs), according to the Cyber
Security Agency of Singapore (CSA). Phishing attempts and ransomware were the most common methods used.
https://www.insurancebusinessmag.com/asia/news/breaking-news/smes-hit-by-40-of-cyberattacks-in-singapore-
103736.aspx
Insurance Business Asia, 20-Jun-2018
Use Cases (2019)
Company: Fortnite / Online Gaming
- In January 2019, it was announced that all 200 Million user accounts on Fortnite had been
compromised through a company-wide data breach.
- By using a website developed in 2004 by Fortnite makers, Epic Games, hackers were able to gain access
to the database that housed usernames, and passwords. They used this to purchase in-game currency,
V-Bucks, and also listen into in-game chats.
https://research.checkpoint.com/hacking-fortnite/
Checkpoint Research, 16-Jan-2019
Company: Dow Jones / Financial
- American financial information and publishing firm, Dow Jones, suffered a data leak in March 2019. It
compromised over 2 Million identity records for politicians and government officials around the
world.
https://securitydiscovery.com/dow-jones-risk-screening-watchlist-exposed-publicly/
Security Discovery, 27-Feb-2019
Company: Instagram / Social Media
• On May 20th, 2019, news broke that over 49 million Instagram influencers, celebrities, and companies
had large amounts of their personal data compromised. The data compromised included personal
telephone numbers, emails, and location data.
• The breach is a result of Indian social media marketing firm, ChatrBox, having completely unsecured
AWS databases.
https://techcrunch.com/2019/05/20/instagram-influencer-celebrity-accounts-scraped/
Tech Crunch, 23-May-2019
Below is an extract of a price table, based on Infosec Institute.
https://resources.infosecinstitute.com/hacking-communities-in-the-deep-web/#gref
Infosec Institute, 15-Jan-2019
Hacking web server (vps or hosting) USD 250 (1,04 BTC at the time I’m writing)
Hacking personal computer USD 200 (0,83 BTC at the time I’m writing)
Hacking Social Media Account (Facebook, Twitter) USD 300 (1,25 BTC at the time I’m writing)
Gmail Account Take over USD 300 (1,25 BTC at the time I’m writing)
Security Audit
Web Server security Audit USD 400 (1,66 BTC at the time I’m writing)
Malware
Remote Access Trojan USD 150 – 400 (0,62 – 1,66 BTC at the time I’m writing)
Banking Malware Customization (Zeus source code) USD 900 (3,75 BTC at the time I’m writing)
DDoS attack
Rent a botnet for DDoS attack (24 hours) USD 150 – 500 (2,08 – 1,66 BTC at the time I’m writing)
www.netpluz.asia
contact@netpluz.asia
+65 6805 8998
1 de 19

Recomendados

VAPT PRESENTATION full.pptx por
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxDARSHANBHAVSAR14
1.9K visualizações36 slides
Vulnerability assessment & Penetration testing Basics por
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Mohammed Adam
2K visualizações17 slides
Vapt life cycle por
Vapt life cycleVapt life cycle
Vapt life cyclepenetration Tester
632 visualizações20 slides
Penetration testing reporting and methodology por
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
5.3K visualizações18 slides
Vulnerability and Assessment Penetration Testing por
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingYvonne Marambanyika
309 visualizações7 slides
Ethical Hacking n VAPT presentation by Suvrat jain por
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
6.5K visualizações25 slides

Mais conteúdo relacionado

Mais procurados

Introduction To OWASP por
Introduction To OWASPIntroduction To OWASP
Introduction To OWASPMarco Morana
3.4K visualizações32 slides
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra... por
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Edureka!
2K visualizações20 slides
Introduction to Web Application Penetration Testing por
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingAnurag Srivastava
2.2K visualizações27 slides
Penetration Testing Basics por
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
12.7K visualizações62 slides
VAPT Services by prime por
VAPT Services by primeVAPT Services by prime
VAPT Services by primePrime Infoserv
863 visualizações36 slides
Introduction to penetration testing por
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingNezar Alazzabi
1.9K visualizações14 slides

Mais procurados(20)

Introduction To OWASP por Marco Morana
Introduction To OWASPIntroduction To OWASP
Introduction To OWASP
Marco Morana3.4K visualizações
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra... por Edureka!
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!2K visualizações
Introduction to Web Application Penetration Testing por Anurag Srivastava
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
Anurag Srivastava2.2K visualizações
Penetration Testing Basics por Rick Wanner
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
Rick Wanner12.7K visualizações
VAPT Services by prime por Prime Infoserv
VAPT Services by primeVAPT Services by prime
VAPT Services by prime
Prime Infoserv863 visualizações
Introduction to penetration testing por Nezar Alazzabi
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
Nezar Alazzabi1.9K visualizações
Understanding Application Threat Modelling & Architecture por Priyanka Aash
 Understanding Application Threat Modelling & Architecture Understanding Application Threat Modelling & Architecture
Understanding Application Threat Modelling & Architecture
Priyanka Aash2.5K visualizações
Security testing por Khizra Sammad
Security testingSecurity testing
Security testing
Khizra Sammad1.1K visualizações
Vulnerability Management por asherad
Vulnerability ManagementVulnerability Management
Vulnerability Management
asherad8.5K visualizações
Pen Testing Explained por Rand W. Hirt
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
Rand W. Hirt5.6K visualizações
Overview of the Cyber Kill Chain [TM] por David Sweigert
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
David Sweigert3.5K visualizações
Intro to Network Vapt por Apurv Singh Gautam
Intro to Network VaptIntro to Network Vapt
Intro to Network Vapt
Apurv Singh Gautam405 visualizações
Cyber Threat Hunting Workshop por Digit Oktavianto
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
Digit Oktavianto682 visualizações
Business case for information security program por William Godwin
Business case for information security programBusiness case for information security program
Business case for information security program
William Godwin2.8K visualizações
Cyber Security Incident Response por PECB
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
PECB 11K visualizações
Introduction to MITRE ATT&CK por Arpan Raval
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
Arpan Raval986 visualizações
Security testing por Rihab Chebbah
Security testingSecurity testing
Security testing
Rihab Chebbah1.5K visualizações

Similar a VAPT - Vulnerability Assessment & Penetration Testing

Ethical hacking and social engineering por
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
940 visualizações12 slides
Application Security: Safeguarding Data, Protecting Reputations por
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsCognizant
254 visualizações7 slides
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis por
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisNorth Texas Chapter of the ISSA
440 visualizações35 slides
Module 3-cyber security por
Module 3-cyber securityModule 3-cyber security
Module 3-cyber securitySweta Kumari Barnwal
554 visualizações12 slides
Law Firm Cybersecurity: Practical Tips for Protecting Your Data por
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
466 visualizações30 slides
Part 1 Vulnerability AssessmentNambo FrancisN.docx por
Part 1 Vulnerability AssessmentNambo FrancisN.docxPart 1 Vulnerability AssessmentNambo FrancisN.docx
Part 1 Vulnerability AssessmentNambo FrancisN.docxdanhaley45372
3 visualizações16 slides

Similar a VAPT - Vulnerability Assessment & Penetration Testing (20)

Ethical hacking and social engineering por Sweta Kumari Barnwal
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal940 visualizações
Application Security: Safeguarding Data, Protecting Reputations por Cognizant
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
Cognizant254 visualizações
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis por North Texas Chapter of the ISSA
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
North Texas Chapter of the ISSA440 visualizações
Law Firm Cybersecurity: Practical Tips for Protecting Your Data por Accellis Technology Group
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Accellis Technology Group466 visualizações
Part 1 Vulnerability AssessmentNambo FrancisN.docx por danhaley45372
Part 1 Vulnerability AssessmentNambo FrancisN.docxPart 1 Vulnerability AssessmentNambo FrancisN.docx
Part 1 Vulnerability AssessmentNambo FrancisN.docx
danhaley453723 visualizações
Cyber-Espionage: Understanding the Advanced Threat Landscape por Aaron White
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
Aaron White2.1K visualizações
Cyber Security for Financial Planners por Michael O'Phelan
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
Michael O'Phelan143 visualizações
Cyber Security Company.pdf por pdfcompressor1
Cyber Security Company.pdfCyber Security Company.pdf
Cyber Security Company.pdf
pdfcompressor14 visualizações
Cyber 101 for smb execs v1 por NetWatcher
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
NetWatcher1K visualizações
Hacking the Human - How Secure Is Your Organization? por CBIZ, Inc.
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
CBIZ, Inc.1.8K visualizações
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks por FitCEO, Inc. (FCI)
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
FitCEO, Inc. (FCI) 947 visualizações
Webinar - Cyber Hygiene: Stay Clean at Work and at Home por WPICPE
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
WPICPE1.1K visualizações
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management por DevOps.com
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk ManagementProtect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
DevOps.com135 visualizações
Introduction to the Current Threat Landscape por Melbourne IT
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
Melbourne IT356 visualizações
CYBER51-FYLER por Cyber 51 LLC
CYBER51-FYLERCYBER51-FYLER
CYBER51-FYLER
Cyber 51 LLC179 visualizações
Securité : Le rapport 2Q de la X-Force por Patrick Bouillaud
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
Patrick Bouillaud976 visualizações
IBM X-Force.PDF por Ban Selvakumar
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
Ban Selvakumar763 visualizações

Mais de Netpluz Asia Pte Ltd

Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy... por
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Netpluz Asia Pte Ltd
2.3K visualizações21 slides
Cyber Risk Management in the New Digitalisation Age - eSentinel™ por
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Netpluz Asia Pte Ltd
2.1K visualizações58 slides
Netpluz corp presentation 2020 por
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz Asia Pte Ltd
155 visualizações42 slides
Secure & Protect your Data with Druva por
Secure & Protect your Data with Druva Secure & Protect your Data with Druva
Secure & Protect your Data with Druva Netpluz Asia Pte Ltd
1.5K visualizações17 slides
The State of Ransomware 2020 por
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020Netpluz Asia Pte Ltd
1.6K visualizações35 slides
Simplifying Communication with Microsoft Teams & Netpluz SIP Trunk por
Simplifying Communication with Microsoft Teams & Netpluz SIP TrunkSimplifying Communication with Microsoft Teams & Netpluz SIP Trunk
Simplifying Communication with Microsoft Teams & Netpluz SIP TrunkNetpluz Asia Pte Ltd
1.9K visualizações12 slides

Mais de Netpluz Asia Pte Ltd(20)

Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy... por Netpluz Asia Pte Ltd
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Netpluz Asia Pte Ltd2.3K visualizações
Cyber Risk Management in the New Digitalisation Age - eSentinel™ por Netpluz Asia Pte Ltd
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Netpluz Asia Pte Ltd2.1K visualizações
Netpluz corp presentation 2020 por Netpluz Asia Pte Ltd
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
Netpluz Asia Pte Ltd155 visualizações
Secure & Protect your Data with Druva por Netpluz Asia Pte Ltd
Secure & Protect your Data with Druva Secure & Protect your Data with Druva
Secure & Protect your Data with Druva
Netpluz Asia Pte Ltd1.5K visualizações
The State of Ransomware 2020 por Netpluz Asia Pte Ltd
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020
Netpluz Asia Pte Ltd1.6K visualizações
Simplifying Communication with Microsoft Teams & Netpluz SIP Trunk por Netpluz Asia Pte Ltd
Simplifying Communication with Microsoft Teams & Netpluz SIP TrunkSimplifying Communication with Microsoft Teams & Netpluz SIP Trunk
Simplifying Communication with Microsoft Teams & Netpluz SIP Trunk
Netpluz Asia Pte Ltd1.9K visualizações
SAY HELLO TO MICROSOFT TEAMS por Netpluz Asia Pte Ltd
SAY HELLO TO MICROSOFT TEAMSSAY HELLO TO MICROSOFT TEAMS
SAY HELLO TO MICROSOFT TEAMS
Netpluz Asia Pte Ltd1.9K visualizações
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA... por Netpluz Asia Pte Ltd
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
Netpluz Asia Pte Ltd240 visualizações
eSentinel™ – 360° Cybersecurity Platform Simplified por Netpluz Asia Pte Ltd
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform Simplified
Netpluz Asia Pte Ltd220 visualizações
Using a secured, cloud-delivered SD-WAN to transform your business network por Netpluz Asia Pte Ltd
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business network
Netpluz Asia Pte Ltd3.3K visualizações
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl... por Netpluz Asia Pte Ltd
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz Asia Pte Ltd2K visualizações
Netpluz DDoS Mitigation - Managed Cyber Security por Netpluz Asia Pte Ltd
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz Asia Pte Ltd403 visualizações
Netpluz - Managed Firewall & Endpoint Protection por Netpluz Asia Pte Ltd
Netpluz - Managed Firewall & Endpoint Protection Netpluz - Managed Firewall & Endpoint Protection
Netpluz - Managed Firewall & Endpoint Protection
Netpluz Asia Pte Ltd209 visualizações
Netpluz Managed Cyber Security por Netpluz Asia Pte Ltd
Netpluz Managed Cyber Security Netpluz Managed Cyber Security
Netpluz Managed Cyber Security
Netpluz Asia Pte Ltd190 visualizações
Netpluz Managed SOC - MSS Service por Netpluz Asia Pte Ltd
Netpluz Managed SOC - MSS Service Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service
Netpluz Asia Pte Ltd541 visualizações
Netpluz Managed Services Portfolio por Netpluz Asia Pte Ltd
Netpluz Managed Services PortfolioNetpluz Managed Services Portfolio
Netpluz Managed Services Portfolio
Netpluz Asia Pte Ltd183 visualizações
Y5Zone Singapore - Wifi Advertisement & EDM services por Netpluz Asia Pte Ltd
Y5Zone Singapore - Wifi Advertisement & EDM services Y5Zone Singapore - Wifi Advertisement & EDM services
Y5Zone Singapore - Wifi Advertisement & EDM services
Netpluz Asia Pte Ltd129 visualizações
Getting ready for wi-fi 6 and IOT por Netpluz Asia Pte Ltd
Getting ready for wi-fi 6 and IOTGetting ready for wi-fi 6 and IOT
Getting ready for wi-fi 6 and IOT
Netpluz Asia Pte Ltd1.1K visualizações
Managed Security Operations Centre Alternative - Managed Security Service por Netpluz Asia Pte Ltd
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
Netpluz Asia Pte Ltd118 visualizações

Último

Integrating Talent Management Practices por
Integrating Talent Management PracticesIntegrating Talent Management Practices
Integrating Talent Management PracticesSeta Wicaksana
28 visualizações29 slides
Building Careers at Specialty TRE 2023 por
Building Careers at Specialty TRE 2023Building Careers at Specialty TRE 2023
Building Careers at Specialty TRE 2023Jennifer Sanborn
45 visualizações22 slides
Monthly Social Media Update November 2023 copy.pptx por
Monthly Social Media Update November 2023 copy.pptxMonthly Social Media Update November 2023 copy.pptx
Monthly Social Media Update November 2023 copy.pptxAndy Lambert
16 visualizações49 slides
voice logger software aegis.pdf por
voice logger software aegis.pdfvoice logger software aegis.pdf
voice logger software aegis.pdfNirmal Sharma
30 visualizações1 slide
Group and Teams: Increasing Cooperation and Reducing Conflict por
Group and Teams: Increasing Cooperation and Reducing Conflict Group and Teams: Increasing Cooperation and Reducing Conflict
Group and Teams: Increasing Cooperation and Reducing Conflict Seta Wicaksana
20 visualizações14 slides
Why are KPIs(key performance indicators) important? por
Why are KPIs(key performance indicators) important? Why are KPIs(key performance indicators) important?
Why are KPIs(key performance indicators) important? Epixel MLM Software
11 visualizações17 slides

Último(20)

Integrating Talent Management Practices por Seta Wicaksana
Integrating Talent Management PracticesIntegrating Talent Management Practices
Integrating Talent Management Practices
Seta Wicaksana28 visualizações
Building Careers at Specialty TRE 2023 por Jennifer Sanborn
Building Careers at Specialty TRE 2023Building Careers at Specialty TRE 2023
Building Careers at Specialty TRE 2023
Jennifer Sanborn45 visualizações
Monthly Social Media Update November 2023 copy.pptx por Andy Lambert
Monthly Social Media Update November 2023 copy.pptxMonthly Social Media Update November 2023 copy.pptx
Monthly Social Media Update November 2023 copy.pptx
Andy Lambert16 visualizações
voice logger software aegis.pdf por Nirmal Sharma
voice logger software aegis.pdfvoice logger software aegis.pdf
voice logger software aegis.pdf
Nirmal Sharma30 visualizações
Group and Teams: Increasing Cooperation and Reducing Conflict por Seta Wicaksana
Group and Teams: Increasing Cooperation and Reducing Conflict Group and Teams: Increasing Cooperation and Reducing Conflict
Group and Teams: Increasing Cooperation and Reducing Conflict
Seta Wicaksana20 visualizações
Why are KPIs(key performance indicators) important? por Epixel MLM Software
Why are KPIs(key performance indicators) important? Why are KPIs(key performance indicators) important?
Why are KPIs(key performance indicators) important?
Epixel MLM Software11 visualizações
Defcon Network.pdf por Jesse Mauck
Defcon Network.pdfDefcon Network.pdf
Defcon Network.pdf
Jesse Mauck17 visualizações
Businesses to Start in 2024.pdf por Dante St James
Businesses to Start in 2024.pdfBusinesses to Start in 2024.pdf
Businesses to Start in 2024.pdf
Dante St James19 visualizações
NYKAA PPT .pptx por 125071081
NYKAA PPT .pptxNYKAA PPT .pptx
NYKAA PPT .pptx
12507108113 visualizações
2023 Photo Contest.pptx por culhama
2023 Photo Contest.pptx2023 Photo Contest.pptx
2023 Photo Contest.pptx
culhama27 visualizações
SUGAR cosmetics ppt por shafrinn5
SUGAR cosmetics pptSUGAR cosmetics ppt
SUGAR cosmetics ppt
shafrinn563 visualizações
Cookie Business Plan Example por Jessica Larson
Cookie Business Plan ExampleCookie Business Plan Example
Cookie Business Plan Example
Jessica Larson20 visualizações
PMU Launch - Guaranteed Slides por pmulaunch
PMU Launch - Guaranteed SlidesPMU Launch - Guaranteed Slides
PMU Launch - Guaranteed Slides
pmulaunch16 visualizações
Navigating EUDR Compliance within the Coffee Industry por Peter Horsten
Navigating EUDR Compliance within the Coffee IndustryNavigating EUDR Compliance within the Coffee Industry
Navigating EUDR Compliance within the Coffee Industry
Peter Horsten41 visualizações
Coomes Consulting Business Profile por Chris Coomes
Coomes Consulting Business ProfileCoomes Consulting Business Profile
Coomes Consulting Business Profile
Chris Coomes46 visualizações
Basic of Air Ticketing & IATA Geography por Md Shaifullar Rabbi
Basic of Air Ticketing & IATA GeographyBasic of Air Ticketing & IATA Geography
Basic of Air Ticketing & IATA Geography
Md Shaifullar Rabbi 51 visualizações
Presentation on proposed acquisition of leading European asset manager Aermon... por KeppelCorporation
Presentation on proposed acquisition of leading European asset manager Aermon...Presentation on proposed acquisition of leading European asset manager Aermon...
Presentation on proposed acquisition of leading European asset manager Aermon...
KeppelCorporation171 visualizações
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf por Bloomerang
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdfBloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf
Bloomerang112 visualizações

VAPT - Vulnerability Assessment & Penetration Testing

  • 1. Innovative Solutions Hub for the Future Introduction to VAPT – What, Why, When
  • 3. Vulnerability Assessment • A process to evaluate and review key systems, networks and applications • To identify vulnerabilities and configuration issues that may put the organization at risk of being breached or exploited • Effective in identifying vulnerabilities, but it cannot differentiate between exploitable vs non-exploitable vulnerabilities
  • 4. Penetration Testing • Goal-driven test focused on identifying all possible routes of entry an attacker could use to gain unauthorized entry into the target • Identifies the potential damage and further internal compromise an attacker could carry out once they are past the perimeter. • Proof of concept strategy to investigate, exploit and validate the extent of the identified vulnerability
  • 5. • Testing from an external network with no prior knowledge of the internal network and system Black Box Testing • Test being performed from within the network • Prior knowledge of the network, architecture and system. White Box Testing • Testing from an internal or external network • Partial knowledge of the internal network and system • Combination of both white and black box testing Grey Box Testing Process Type
  • 6. Network Vulnerability Assessment & Penetration Testing • Internal & External IPs • VoIP & Cloud ;Telephony • Devices – Firewall, Switches, Routers, etc • AWS Cloud Configuration Review • AWS Cloud Assessment • Devices – Firewall, Switches, Routers, etc Objective - The scope will be scanned and tested for vulnerabilities using a wide variety of tools and techniques. The tools and techniques used will be consistent with current industry trends regarding exploitation of vulnerabilities. The tools and procedures are: • Threat and attack vectors • Combination of vulnerabilities exploited in a particular sequence • Business and operational impact of attacks • Efficiency of the client’s network and environment to detect and respond to attacks • Areas of focused investment to reduce or mitigate risks Test Type
  • 7. Objective – Key objective is to impersonate a real-world attacker and discover security issues within an application. We also want to assist the organisation in resolving the findings. We also want to provide a business case for investing in relevant security controls. Methodology – Industry standard test cases like, cookie attacks, sensitive data exposure, session management, data validation, business logic, security misconfigurations and much more. Evaluation – Impact and Risk Factor for the business. Remediation methods Application Security Test Type
  • 8. Social Engineering Training USB PhishingEmail Phishing Campaigns Objective – A simulated attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices in order to gain access to systems, networks or physical locations. Methodology: Baiting – An attacker leaves a malware-infected physical device, such as a USB flash drive, in a place it is sure to be found. The finder then picks up the device and loads it onto his or her computer, unintentionally installing the malware. Spear Phishing/Phishing – Phishing is when a malicious party sends a fraudulent email disguised as a legitimate email, often purporting to be from a trusted source. The message is meant to trick the recipient into sharing personal or financial information or clicking on a link that installs malware. Test Type
  • 10. THE PROBLEM Hacktivist Cyber Criminals Malware/Ransomware State Sponsored Attacks
  • 11. VAPT for SMEs Cybersecurity Myths for SMEs • I have a firewall, so I’m safe from attacks • Hackers understand strategies adopted by a firewall quite well. Disrupting codes and exploiting basic IT oversights to gain access to your system is easy. • While most cyber security threats are avoidable, your organizations can not rely solely on firewalls for protection. • I use HTTPS, so my site is secure • HTTPs safeguards the transmission of information from source to destination. This is web security at a minimal. • It does not block attacks like DDoS, brute force, injections, etc. • There is also the issue of organizations using fake SSL certificates, resulting in their organization being compromised • SMEs are safe because they are not worthwhile targets • SMEs are considered to be low hanging fruits for hackers because so many do not take security seriously. • One of the most popular attacks that hackers use against SMEs is ransomware.
  • 12. VAPT for SMEs Why do SMEs need VAPT? • Basic security measures are not enough. • Firewalls or anti-virus solutions are not sufficient to protect against attacks. • Security budget • Unlike MNCs, SMEs do not have the budget to implement everything. • There is limited or no resource for security expertise. • What VAPT adds value to is to streamline what is needed for the organization. • Reputation • Potential clients or business partners will feel insecure on collaboration. • Contributing factors can be issues like safeguard of important data. • SMEs also lose out on potential/existing business. • Compared to SMEs, larger organizations have a much greater potential to survive an attack due to the help of current investors and existing large clients. (E.g. Sony (04/2011) survived through the attack.)
  • 13. VAPT for SMEs Almost 40% of cyberattacks in Singapore target small and medium enterprises (SMEs), according to the Cyber Security Agency of Singapore (CSA). Phishing attempts and ransomware were the most common methods used. https://www.insurancebusinessmag.com/asia/news/breaking-news/smes-hit-by-40-of-cyberattacks-in-singapore- 103736.aspx Insurance Business Asia, 20-Jun-2018
  • 15. Company: Fortnite / Online Gaming - In January 2019, it was announced that all 200 Million user accounts on Fortnite had been compromised through a company-wide data breach. - By using a website developed in 2004 by Fortnite makers, Epic Games, hackers were able to gain access to the database that housed usernames, and passwords. They used this to purchase in-game currency, V-Bucks, and also listen into in-game chats. https://research.checkpoint.com/hacking-fortnite/ Checkpoint Research, 16-Jan-2019
  • 16. Company: Dow Jones / Financial - American financial information and publishing firm, Dow Jones, suffered a data leak in March 2019. It compromised over 2 Million identity records for politicians and government officials around the world. https://securitydiscovery.com/dow-jones-risk-screening-watchlist-exposed-publicly/ Security Discovery, 27-Feb-2019
  • 17. Company: Instagram / Social Media • On May 20th, 2019, news broke that over 49 million Instagram influencers, celebrities, and companies had large amounts of their personal data compromised. The data compromised included personal telephone numbers, emails, and location data. • The breach is a result of Indian social media marketing firm, ChatrBox, having completely unsecured AWS databases. https://techcrunch.com/2019/05/20/instagram-influencer-celebrity-accounts-scraped/ Tech Crunch, 23-May-2019
  • 18. Below is an extract of a price table, based on Infosec Institute. https://resources.infosecinstitute.com/hacking-communities-in-the-deep-web/#gref Infosec Institute, 15-Jan-2019 Hacking web server (vps or hosting) USD 250 (1,04 BTC at the time I’m writing) Hacking personal computer USD 200 (0,83 BTC at the time I’m writing) Hacking Social Media Account (Facebook, Twitter) USD 300 (1,25 BTC at the time I’m writing) Gmail Account Take over USD 300 (1,25 BTC at the time I’m writing) Security Audit Web Server security Audit USD 400 (1,66 BTC at the time I’m writing) Malware Remote Access Trojan USD 150 – 400 (0,62 – 1,66 BTC at the time I’m writing) Banking Malware Customization (Zeus source code) USD 900 (3,75 BTC at the time I’m writing) DDoS attack Rent a botnet for DDoS attack (24 hours) USD 150 – 500 (2,08 – 1,66 BTC at the time I’m writing)