• Vulnerability Assessment

    by  • July 31, 2008 • Core Security, Exclusive, Tips and Tricks • 0 Comments


    Basic Terms:

    Vulnerability: Drawback of a system through which hackers intrude in a network and get space to try attacks on administrators. Vulnerability is also known as Security Hole.

    Exploit: By taking advantage of the vulnerabilities when the attack is performed is called as exploit of the vulnerability. There can be different exploit for the same vulnerability.

    Scenarios When Vulnerability Assessment is Performed:

              Now Vulnerability assessment test is the initial test of any network for security.

              The test is done when priority of work is very low.

              Also at the initial set up of the network test is performed.

              Before carrying out a penetration test also vulnerability assessment is done.

              Performing the test consist of :

              Gathering basic information about configuration of the subjected network.

              Dividing the network according to priorities.

              This test is performed by automated scanners.

              Web vulnerability scanners, network vulnerability scanners are the basic types.

    Finalization of Assessment:

    When we perform such tests the software suggests us where the drawbacks are and where security can be increased. It also suggests the ways to secure them. But it only detects common vulnerabilities not the one that exists uniquely and that are minimized by penetration tests.

    Now the results of all assessment on various parts of network brought together.

    They are analyzed and corresponding security majors are taken to remove such drawbacks.

    After securing them, assessments are repeated again and again to ensure the maximum security.

    Vulnerability assessment is always a better tests than any other as it is econmomical and experts are not needed for such tests. But still it is not used on  networks where sensitive databases are stored.

    About

    Author is a Tech blogger & loves to share his work on web by writing guidelines for Ethical Hacking students & Security professionals. Performing various types of hacking from pen test to smartphone hacking – He enjoys hacking just for personal research purpose. Working with more of 'grey as well as black hat' hackers for learning advanced hacking as well as defending techniques & share them with learners. His prime area of research is Cyber Criminals & currently working on a Video Product Development to teach hacking & Pen Testing for absolute beginners.

    http://www.hackersenigma.com