Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Introduction to Vulnearbility Assessment and Penetration Testing
- -------------------------------------------------------------------
- What does this VAPT stands for :
- V --> Vulnerability : The LOOPHOLES ,security misconfigurations which can cause an attacker to get inside a network or website or in other terms the ways which help an attacker to intrude in the systems.
- A --> Assessment : It simply mean that analyzing the vulnerability and scanning the vulnerability onto how much it could cause damage to the victim.
- P --> Penetration : When you get the vulnerability and is accessed, a report is generated and through that further exploitation or intrusion is done this is known as penetrtion .
- T --> Testing : When a person is penetrating it requires several procedures or attacks to penetrate this is done thrugh this testing phase.
- Most of the scenario this whole process is carried out in two parts
- VA and PT
- VA : Scanning of loopholes and weak security points. In this phase we just scan for the devices, web application, server, network, website and database.We don't penetrate in this phase.
- PT : To gain access into the scanned vulnerabilities. We just try to hack into the services, devices, web application, servers and databases via the scanned vulnerabilities.
- Several bug bounty programs :
- www.bugcrowd.com
- www.hackerone.com
- firebounty.com
- =======================================================================
- OWASP TOP-10
- ============
- Open Web Application Security Project
- -------------------------------------
- It is non-profit charitable organisation, which works towards the security of the web application. They gather the information from all around the globe. They gather the information through CTF initiative.
- They open challange the whole hacking community, to hack into the online system and capture the flag, in return, they will provide with the bounty. They gather the logs of the attacks which are performed in the CTF.
- After gathering the whole logs, they perform the analysis of these logs and categorise the attacks accordingly.
- They release a list of 10 attacks.
- OWASP TOP 10. --> top 10 attacks.
- A1 -Injection
- A2 -Broken Authentication and Session Management
- A3 -Cross-Site Scripting (XSS)
- A4 -Insecure Direct Object References
- A5 -Security Misconfiguration
- A6 -Sensitive Data Exposure
- A7 -Missing Function Level Access Control
- A8 -Cross-Site Request Forgery (CSRF)
- A9 -Using Components with Known Vulnerabilities
- A10 -Unvalidated Redirects and Forwards
- OWASP 2013 --> Stable
- OWASP 2017 --> Data insufficient
- https://www.owasp.org/images/7/72/OWASP_Top_10-2017_(en).pdf.pdf
- https://cybermap.kaspersky.com/
- https://www.fireeye.com/cyber-map/threat-map.html
- http://map.norsecorp.com/
- =====================================================================
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement