Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
32 views18 pages

How To VA Step-By-step

This document provides a comprehensive guide on conducting vulnerability assessments and penetration testing (VAPT) to identify and mitigate security flaws in systems. It outlines the steps involved in the vulnerability assessment process, including defining the scope, information gathering, scanning, analysis, reporting, remediation support, and re-assessment. The guide emphasizes the importance of regular assessments to enhance security posture, ensure compliance, and build trust with stakeholders.

Uploaded by

aymanix
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views18 pages

How To VA Step-By-step

This document provides a comprehensive guide on conducting vulnerability assessments and penetration testing (VAPT) to identify and mitigate security flaws in systems. It outlines the steps involved in the vulnerability assessment process, including defining the scope, information gathering, scanning, analysis, reporting, remediation support, and re-assessment. The guide emphasizes the importance of regular assessments to enhance security posture, ensure compliance, and build trust with stakeholders.

Uploaded by

aymanix
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

HOW TO DO

VULNERABILITY
Vulnerability ASSESSMENT STEP-BY-STEP

A Practical Guide to Vulnerability Assessment


WHAT IS VAPT

VAPT is a security testing process that


identifies vulnerabilities in a system and
determines whether they can be exploited.

Two Components:

Vulnerability Assessment (VA): Focuses on


identifying known vulnerabilities.
Penetration Testing (PT): Simulates an
actual attack to exploit identified
vulnerabilities.

Purpose: To improve the security posture of


systems by identifying and fixing security
flaws.
TYPES OF VULNERABILITIES
Type What It Means Examples

Unpatched Windows, outdated


System/OS Flaws in the operating system.
Linux kernel
SQL Injection, Cross-Site Scripting
Application Weaknesses in app code.
(XSS)

Network Issues in network setup or services. Open ports, weak firewall rules

Default admin password, exposed


Configuration Improper security settings.
directory

Authentication Login/session-related flaws. Weak passwords, session ID reuse

Business Logic Misuse of app flow or rules. Unlimited coupon use, refund abuse

Third-party/Dependency Vulnerable external components. Log4j, outdated plugins


VULNERABILITY ASSESSMENT –
OVERVIEW
The process of identifying, classifying, and prioritizing security vulnerabilities.

Objective: To detect and highlight potential vulnerabilities before attackers can


find and use them.

Common Tools

Nessus – Popular for deep scanning

OpenVAS – Open-source vulnerability scanner

Qualys – Cloud-based scanning

Nexpose – Real-time vulnerability management


PENETRATION TESTING –
OVERVIEW
Simulated cyber-attack on a system to evaluate its security.

Goal: To ethically exploit vulnerabilities and assess how far an attacker


could go, revealing real-world security risks.

Common Types

Black Box: No prior knowledge of the system; simulates


an external attacker.

White Box: Full knowledge of internal architecture,


credentials, and code.

Gray Box: Limited information, like an insider or an


attacker with some access.
WHY IS VULNERABILITY
ASSESSMENT IMPORTANT?

Fix weaknesses before


Prevent Breaches
attackers exploit them.

Meet standards like ISO


Stay Compliant
27001, PCI DSS, HIPAA.

Detect misconfigurations
Find Hidden Risks
and outdated systems.

Show customers &


Build Trust stakeholders you prioritize
security.
VULNERABILITY
ASSESSMENT PROCESS
04
03 Vulnerability 05
Analysis
Vulnerability
Reporting
Scanning

02 06

Information Remediation
Gathering 7 Support

Steps of
Vulnerability
01 Assessment 07
Process
Define Re-
Scope assessment
STEP 1 – DEFINE THE SCOPE
Objective: Understand what you’re assessing.

What to Do:

Identify the assets you want to assess – servers, websites, applications,


cloud services, internal networks, etc.
Decide on scope boundaries: Which systems are in scope and which are
out of scope?
Get permissions: Always take written approval before scanning or testing.
Unauthorized scanning can disrupt services or violate policies.
Clarify goals: Are you doing this for compliance, security hardening, or
both?

Scanning 10 internal IPs and a public web app

No testing on production database


STEP 2 – INFORMATION GATHERING
Objective: Learn about the systems before testing.

What to Do:
Use passive methods: WHOIS lookup, Shodan, Google Dorking, Netcraft
Use active methods: Nmap or Masscan to detect open ports, running
services, and OS info
Identify:
Software versions
Open ports & services (e.g., SSH, FTP, HTTP)
Technologies used (e.g., Apache, WordPress, Linux)

Why It Matters:

The more you know about the target, the more accurate your scan will be.

Nmap, Netdiscover, WhatWeb, BuiltWith


STEP 3 – VULNERABILITY SCANNING
Objective: Use tools to find known weaknesses.

What to Do:

Run an automated scan using tools like Nessus, OpenVAS, or Qualys


Perform both:
Unauthenticated Scans: Scan like an outsider
Authenticated Scans: Scan with credentials for deeper inspection
Choose scan profiles based on the asset type (e.g., web app scan vs internal
server scan)

What You’ll Find:

Missing patches
Misconfigurations (e.g., open FTP)
Known CVEs (Common Vulnerabilities & Exposures)

Scans can slow down systems, schedule them wisely!


STEP 4 – VULNERABILITY ANALYSIS
Objective: Understand what the results mean and how serious they are.

What to Do:

Review scan results: Separate true positives from false positives


Assign risk levels: Use CVSS (Common Vulnerability Scoring System) or the
tool’s severity score
Critical (9–10)
High (7–8.9)
Medium (4–6.9)
Low (0–3.9)
Prioritize based on impact: What’s easier to exploit or causes the most
damage?

Think Like an Attacker:


Could this vulnerability allow access to sensitive data or full system control?

A public-facing login page vulnerable to SQL injection = High Risk


STEP 5 – REPORTING
Objective: Present the findings in a clear, actionable format.

What to Include:

Executive Summary: A high-level overview for non-technical stakeholders


Technical Details: Description of each vulnerability, severity, and how it was
found
Screenshots/Proof of Concept (PoC): Where applicable
Remediation Steps: Clear instructions for fixing each issue
Risk Ratings: Based on CVSS, tool-based score, or business impact

Use tables, graphs, and color codes to improve readability.

The report is the bridge between discovery and action.


STEP 6 – REMEDIATION SUPPORT
Objective: Help fix the issues found.

What to Do:

Share the report with relevant teams (IT, DevOps, App Owners)
Assist with:
Patch application
Secure configuration guides
Code changes (for application vulnerabilities)
Provide alternate controls if immediate fixes are not possible (e.g., WAF
rules)
Offer timelines based on risk levels (e.g., Critical issues in 7 days)

Assign clear ownership for each vulnerability

Some teams may not understand the urgency, make it simple!


STEP 7 – RE-ASSESSMENT
Objective: Make sure everything is actually fixed.

What to Do:

Re-scan the systems after fixes are applied


Verify each vulnerability: Has it been patched, blocked, or mitigated?
Update the report: Mark issues as “Remediated” or “Partially Fixed”
Close the loop: Confirm with stakeholders and sign off on the assessment

Why It Matters:

No vulnerability assessment is complete without verifying that fixes worked.

Always verify fixes through re-scans or manual validation.


COMMON TOOLS FOR
VULNERABILITY ASSESSMENT

Category Tools

Open Source Tools OpenVAS, Nikto, Nmap

Commercial Tools Nessus, Qualys, Burp Suite Pro, Acunetix

Cloud/Container Tools Prisma Cloud, AWS Inspector


BEST PRACTICES
Conduct regular scans
(mothly/quarterly) 01
Use authenticated
scans 02
03
Prioritize vulnerabilities via
CVSS & business impact

04
Combine with PT for
better accuracy

05
Maintain a vulnerability
management program
CONCLUSION

Vulnerability Assessment is not just a scan,


it's a security strategy.
It helps organizations proactively identify,
prioritize, and fix weaknesses before
attackers can exploit them.

Key Takeaways:

Regular assessments reduce the risk of


breaches and downtime.
It supports compliance, builds trust, and
strengthens your security posture.
A good assessment combines tools,
analysis, and collaboration.
Always follow through with remediation
and re-assessment for lasting impact.
THANK YOU
Authored by : KHUSHI MALHOTRA

WWW.MINISTRYOFSECURITY.CO

You might also like