vapt · 2021. 5. 6. · vapt | overview next: vapt process 7-m vapt: vulnerability assessment &...

20
VAPT WWW.KGHAWES.COM | (866) 687-9006 | [email protected]

Upload: others

Post on 31-Aug-2021

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

VAPT

W W W . K G H A W E S . C O M | ( 8 6 6 ) 6 8 7 - 9 0 0 6 | C O N T A C T @ K G H A W E S . C O M

Page 2: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

TOCW

WW

.KG

HA

WE

S.C

OM

|

(

86

6)

68

7-

90

06

|

C

ON

TA

CT

@K

GH

AW

ES

.CO

M

VAPT | OverviewVAPT | ProcessVAPT | Step 1: PlanningVAPT | Step 2: ReconnaissanceVAPT | Step 3: ScanningVAPT | Step 4: ExploitationVAPT | Step 5: Post ExploitationVAPT | Step 6: ReportingVAPT | Scanners UsedVAPT | Methods UsedVAPT | Tools UsedVAPT | Certifications

After the VAPT: RemediationOther Services

Page 3: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

VAPT

WW

W.K

GH

AW

ES

.CO

M

|

(8

66

) 6

87

-9

00

6

|

CO

NT

AC

T@

KG

HA

WE

S.C

OM

Vulnerability Assessment & Penetration Testing

TOC

Page 4: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

NEXT: VAPT ProcessVAPT | OverviewW

WW

.KG

HA

WE

S.C

OM

|

(

86

6)

68

7-

90

06

|

C

ON

TA

CT

@K

GH

AW

ES

.CO

M

VAPT: Vulnerability Assessment & Penetration TestingThough vulnerability assessments can be conducted without a penetration test, it is not recommended. Vulnerability testing involves the use of both manual methods and high-tech scanners to identify the security vulnerabilities in an organization’s servers, applications and network devices. While it is useful for identifying a system’s vulnerabilities, it will not differentiate between exploitable and non-exploitable vulnerabilities. For this you need...

Penetration testing attempts to exploit the vulnerabilities found in the vulnerability assessment.

VULNERABILITYASSESSMENT

PENETRATION TESTING

TOC

Page 5: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

NEXT: Step 1. PlanningVAPT | Process

RECONNAISSANCE

PLANNING

WW

W.K

GH

AW

ES

.CO

M

|

(8

66

) 6

87

-9

00

6

|

CO

NT

AC

T@

KG

HA

WE

S.C

OM

SCANNING EXPLOITATION POSTEXPLOITATION REPORTING

TOC

Page 6: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

NEXT: Step 2. ReconnaissanceVAPT | Step 1: Planning

In this step, KG Hawes and your business will determine the scope of testing, and what the preferred strategy is going forward. This will include a questionnaire as well as your organization’s expectations and outcome goals.

WW

W.K

GH

AW

ES

.CO

M

|

(8

66

) 6

87

-9

00

6

|

CO

NT

AC

T@

KG

HA

WE

S.C

OM

TOC

Page 7: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

NEXT: Step 3. ScanningVAPT | Step 2: Reconnaissance

This step denotes the act of gathering information about the host. The information encompassed will vary based on the scope determined in Step 1, but generally includes:

• Host’s location, • Type of server it’s hosted on, • Type of CMS platforms used, • Version on which it’s built, • Programming software used, and • Any other possible information about your system.

WW

W.K

GH

AW

ES

.CO

M

|

(8

66

) 6

87

-9

00

6

|

CO

NT

AC

T@

KG

HA

WE

S.C

OM

TOC

Page 8: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

NEXT: Step 4. ExpoitationVAPT | Step 3: Scanning

In this step, penetration scanners (both automated and manual) come into play. This phase determines:

• The type of server used, • Its service version, • The open ports left unclosed, and• Any security loopholes that exist in an application through which

cyber stalkers can infiltrate and exploit.

The difference between this and the reconnaissance stage, is that in reconnaissance, the information is taken passively (without hitting the host) while this phase has the host being hit and responded to (active scanning).

WW

W.K

GH

AW

ES

.CO

M

|

(8

66

) 6

87

-9

00

6

|

CO

NT

AC

T@

KG

HA

WE

S.C

OM

TOC

Page 9: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

NEXT: Step 5. Post ExploitationVAPT | Step 4: Exploitation

In this step, previously identified vulnerabilities, from Step 3, will be manually scanned. The exploitation phase of a penetration test focuses solely on establishing access to a system or resource by bypassing security restrictions.

If there are any findings which are determined to be false positives, then these are eliminated, so that only actual issues are accounted for.

Web Applications Mobile Applications Networks APIsWW

W.K

GH

AW

ES

.CO

M

|

(8

66

) 6

87

-9

00

6

|

CO

NT

AC

T@

KG

HA

WE

S.C

OM

TOC

Page 10: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

NEXT: Step 6. ReportingVAPT | Step 5: Post Exploitation

Once the testers have gained access to their target (as described in Step 4 Exploitation), they will attempt to gain greater access to your organization’s systems. A few examples are listed below of what a tester may attempt to post exploit. They may:

• Access sensitive data stored within the exploited system, and/or• See what additional systems the exploited network can provide (if

the network was accessed), and/or• Maybe the exploited system is part of a domain that can be used

to exploit other systems, etc.

WW

W.K

GH

AW

ES

.CO

M

|

(8

66

) 6

87

-9

00

6

|

CO

NT

AC

T@

KG

HA

WE

S.C

OM

TOC

Page 11: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

NEXT: Scanners UsedVAPT | Step 6: Reporting

This is the final step of our VAPT process. Identified issues are tracked, listed in terms of their vulnerability’s severity ratings, through CVE, and a complete report is given to your company. This report will include precise details on actual issues and our recommendations on how to address (remediate) them.

WW

W.K

GH

AW

ES

.CO

M

|

(8

66

) 6

87

-9

00

6

|

CO

NT

AC

T@

KG

HA

WE

S.C

OM

TOC

Page 12: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

NEXT: Methods UsedVAPT | Scanners UsedW

WW

.KG

HA

WE

S.C

OM

|

(

86

6)

68

7-

90

06

|

C

ON

TA

CT

@K

GH

AW

ES

.CO

M

Host-based scans are used to locate and

identify vulnerabilities in servers, workstations

and other network hosts.

Wireless Wi-Fi network scans usually

focus on points of attack in the wireless

network infrastructure.

Application scans can be used to test websites in order to detect known

software vulnerabilities and misconfigurations in

web applications.

Network-based scans are used to identify

possible network security attacks and

vulnerabilities in wired or wireless networks.

Database scans can be used to identify the weak points in a database so as

to prevent malicious attacks, such as SQL

Injection attacks.

TOC

Page 13: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

NEXT: Step 6. Tools UsedVAPT | Methods UsedW

WW

.KG

HA

WE

S.C

OM

|

(

86

6)

68

7-

90

06

|

C

ON

TA

CT

@K

GH

AW

ES

.CO

M

WHITE BOX

Testing method in which internal structure,

design and implementation of the

item being tested is known to the tester.

GRAY BOX BLACK BOX

Testing method performed with limited

information about internal functionality of

the system. Gray-box testers have access

to the design documents along with

information about requirements.

Testing method in which internal structure, design, implementation of the item being tested

is not known to the tester.

TOC

Page 14: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

NEXT: CertificationsVAPT | Tools UsedW

WW

.KG

HA

WE

S.C

OM

|

(

86

6)

68

7-

90

06

|

C

ON

TA

CT

@K

GH

AW

ES

.CO

M

TOC

Page 15: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

NEXT: RemediationVAPT | CertificationsW

WW

.KG

HA

WE

S.C

OM

|

(

86

6)

68

7-

90

06

|

C

ON

TA

CT

@K

GH

AW

ES

.CO

M

TOC

Page 16: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

REMEDIATION

WW

W.K

GH

AW

ES

.CO

M

|

(8

66

) 6

87

-9

00

6

|

CO

NT

AC

T@

KG

HA

WE

S.C

OM

After the VAPT (Separate Service)

TOC

Page 17: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

NEXT: Other ServicesAFTER THE VAPT | Remediate & MitigateW

WW

.KG

HA

WE

S.C

OM

|

(

86

6)

68

7-

90

06

|

C

ON

TA

CT

@K

GH

AW

ES

.CO

M

The next step after a VAPT is to address the found vulnerabilities. How you proceed depends upon the type of vulnerabilities found.

REMEDIATE MITIGATEVulnerability can be removed (software patches, upgrades, etc.)

Vulnerability can be minimized (configuration setting change).

TOC

Page 18: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

OTHER SERVICES

WW

W.K

GH

AW

ES

.CO

M

|

(8

66

) 6

87

-9

00

6

|

CO

NT

AC

T@

KG

HA

WE

S.C

OM

TOC

Page 19: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

VAPT | Other Services

Management ManagementInfrastructure Database

WW

W.K

GH

AW

ES

.CO

M

|

(8

66

) 6

87

-9

00

6

|

CO

NT

AC

T@

KG

HA

WE

S.C

OM

Vulnerability Assessment & Penetration Testing

VAPT

TOC

Migration & ManagementCloud

After VAPT AuditRemediation

Page 20: VAPT · 2021. 5. 6. · VAPT | Overview NEXT: VAPT Process 7-M VAPT: Vulnerability Assessment & Penetration Testing Though vulnerability assessments can be conducted without a penetration

Con

tact

Us

[email protected]

866.687.9006

https://kghawes.com

Executive / Corporate12204 SE Mill Plain Blvd, Vancouver, WA 98684

Operations / Development400 International Way, Suite #300 Springfield, OR 97477