The Vulnerability Assessment is a “light-touch” evaluation to identify gaps and vulnerabilities in your network, help you validate your configuration and patch management, and identify steps you can take to improve your information security. The assessment helps you meet your minimum compliance mandates and security assessment needs.
Why it is required?
To identify the present vulnerability that exists in our network, like missing patches, buffer overflow, Default username & passwords, unused users, file\folder sharing found on the network.
- Discovery: The penetrator performs information discovery via a wide range of techniques such as scan utilities, Google dorks, and more in order to gain as much information about the target system as possible. These discoveries often reveal sensitive information that can be used to perform specific attacks on a given machine.
- Port Scanning: Finding open port on target ports.
- Enumeration: Once the specific networks and systems are identified through discovery, it is important to gain as much information as possible about each system. The difference between enumeration and discovery depends on the state of intrusion. Enumeration is all about actively trying to obtain usernames as well as software and hardware device version information.
- Vulnerability Identification: The vulnerability identification step is a very important phase in the Vulnerability Assessment. This allows the user to determine the weaknesses of the target system and where to launch the attacks.
- Reporting: All the findings that are observed during the vulnerability assessment are needed to be documented, along with the recommendations, in order to produce the testing report to the management for suitable actions.
Standards to follow
We use Sans Top 25 vulnerabilities & Critical Security Controls to perform Vulnerability Assessment