Lec 4 - Vuln Assessment
Lec 4 - Vuln Assessment
14 jul 23
Vulnerability Assesssment
• A vulnerability assessment is the testing process used to identify and
assign severity levels to as many security defects as possible in a
given timeframe
• This process may involve automated and manual techniques
• It is a systematic process of identifying and evaluating vulnerabilities
in computer systems, networks, and applications
• Vulnerability testing helps organizations to identify vulnerabilities in
their software, hosts, application, network and supporting
infrastructure before a compromise
Vulnerability Assessment solutions
• Vulnerability Scanners: Vulnerability scanners are automated tools that scan networks,
systems, or applications to identify known vulnerabilities. They analyze configurations,
software versions, and patch levels to generate reports highlighting potential vulnerabilities
• Web Application Scanners: Web application scanners focus specifically on identifying
vulnerabilities in web applications, including common issues like SQL injection, cross-site
scripting (XSS), or insecure authentication mechanisms. They simulate attacks and provide
detailed reports on vulnerabilities found
• Network Vulnerability Assessment Tools: Network vulnerability assessment tools analyze
network devices, such as routers, switches, firewalls, and identify vulnerabilities in their
configurations. They assess network security settings and policies to uncover potential
weaknesses
• Continuous Monitoring Solutions: Continuous monitoring solutions provide ongoing
vulnerability assessment and monitoring capabilities. They continuously scan systems,
networks, or applications for vulnerabilities, and can often integrate with other security
tools for real-time threat detection and response
• Threat Intelligence Platforms: These platforms leverage threat intelligence feeds and data
to assess vulnerabilities in the context of emerging threats. They provide insights into
potential vulnerabilities that could be targeted by specific threats or attack campaigns
objectives
• Primary goal of a vulnerability
assessment is to discover vulnerabilities
before they are exploited, allowing
organizations to take proactive
measures to mitigate
Gathering Information (Pre task): Collecting information about the target systems,
such as IP addresses, domain names, system configurations, and network topology
Vulnerability analysis: The objective of this step is to identify the source and root
cause of the vulnerabilities identified in previous step. It involves the identification
of system components responsible for each vulnerability, and the root cause of the
vulnerability
Vulnerability assessment: Security scanning process
Modern vulnerability assessments rely on automated scanning tools to find new and
existing threats that can target your system. Types of tools include: