Vulnerability Assessment

Introduction

  • The vulnerability assessment phase is an analytical process based on the findings.

  • An analysis is a detailed examination of an event or process, describing its origin and impact, that with the help of certain precautions and actions, can be triggered to support or prevent future occurrences.

  • There are four different types of analysis:

    • Descriptive: Descriptive analysis is essential in any data analysis. On the one hand, it describes a data set based on individual characteristics. It helps to detect possible errors in data collection or outliers in the data set.

    • Diagnostic: Diagnostic analysis clarifies conditions' causes, effects, and interactions. Doing so provides insights that are obtained through correlations and interpretation. We must take a backward-looking view, similar to descriptive analysis, with the subtle difference that we try to find reasons for events and developments.

    • Predictive: By evaluating historical and current data, predictive analysis creates a predictive model for future probabilities. Based on the results of descriptive and diagnostic analyses, this method of data analysis makes it possible to identify trends, detect deviations from expected values at an early stage, and predict future occurrences as accurately as possible.

    • Prescriptive: Prescriptive analytics aims to narrow down what actions to take to eliminate or prevent a future problem or trigger a specific activity or process.

Vulnerability Research and Analysis

  • In Vulnerability Research, we look for known vulnerabilities, exploits, and security holes that have already been discovered and reported.

  • Some Sources of CVE data:

    • CVEdetails

    • Exploit DB

    • Vulners

    • Packet Storm Security

    • NIST

  • This is where Diagnostic Analysis and Predictive Analysis is used. Once we have found a published vulnerability like this, we can diagnose it to determine what is causing or has caused the vulnerability.

  • Whether we have received specific evasion level requirements from our client, we test the services and applications found locally or on the target system.

  • If we have to test covertly and avoid alerts, we should mirror the target system locally as precisely as possible.

The Return

  • Suppose we are unable to detect or identify potential vulnerabilities from our analysis. In that case, we will return to the Information Gathering stage and look for more in-depth information than we have gathered so far.

  • It is important to note that these two stages (Information Gathering and Vulnerability Assessment) often overlap, resulting in regular back and forth movement between them.

Last updated