Vulnerability Assessment & Penetration Test
Home » Secure Online Desktop Projects » Vulnerability Assessment & Penetration Test
- ♦ identify the IT security vulnerabilities of the corporate network and systems (in particular of systems deemed critical), including web servers;
- ♦ Verify the correctness and completeness of the behavioral policies and procedures implemented, as well as of the related training, to prevent the security risks associated with carelessness and lack of awareness on the part of users in using the IT system. li>
OBJECTIVES
The Vulnerability Assessment (VA) / Penetration Test (PT) service allows you to verify the robustness of the network through the following activities:- ♦ Network sniffing.
- ♦ IP and Port scanning .
- ♦ ARP spoofing .
- ♦ Access to the company network.
- ♦ Attempt to steal and deduce domain passwords.
- ♦ Search for possible vulnerabilities on layers 2,3 and 7 of the ISO / OSI stack.
- ♦ Using any vulnerabilities found to control systems / services.
- ♦ Analysis, verification and interpretation of the results.
ACRONYMS AND ABBREVIATIONS
VAT = Internal Vulnerability Assessment E.V.A. = External Vulnerability Assessment I.P.T. = Internal Penetration Test E.P.T. = External Penetration TestMETHODOLOGY OF APPROACH
The methodology used aims to measure corporate IT security by means of four steps macros:- 1) Internal Vulnerability Assessment (1st Step).
- 2) External Vulnerability Assessment (2nd Step).
- 3) Internal Penetration Test (3rd Step).
- 4) External Penetration Test (4th Step).
INTERNAL VULNERABILITY ASSESSMENT (I.V.A.)
The robustness of the IT measures from Inside (trust network), trying to identify which possible known vulnerabilities could be exploited by malicious users to carry out cyber attacks.
It will be a matter of performing “scans” not destructive on systems, with tools that have been designed to detect the status of standard operating systems or applications.
Such tools will be those commonly used by malicious users and available on the Internet; or, upon specific request, tools prepared by well-known security software manufacturers can be used. The use of “open-source” public tools or of a specific company does not lead to a substantial difference in results.
In the analysis of the vulnerabilities and weaknesses of infrastructure as a whole, the critical ones will be highlighted. By “critical” we mean that vulnerability that could cause serious and immediate damage, such as blocking of activities, loss of sensitive data, loss of credibility, image or money. So that immediate steps can be taken to mitigate the problem.
At the end of the activity you will have a series of results that will be summarized in a Vulnerability Assessment Report.
TARGET I.V.A.
By Target we mean the set of elements subject to the Vulnerability Assessment. This set changes based on different structural factors, characteristic of the business reality analyzed, and on the type of V.A. conducted. Based on some considerations, the Target is identified in the LAN (attestation to any segment of the LAN) seen as a weak link in the network infrastructure. Subsequently it will be possible to modify the Target based on further observations and the result of the V.A. The target object of the proposal includes the following devices within the LAN:- ◊ Network device.
- ◊ Security device.
- ◊ Application server.
- ◊ Storage server.
VAT PHASES
The project is divided into the following phases:- 1) Reconnaissance phase.
- ◊ Network structure ( reverse engineering to derive network topology).
- ◊ Identification and classification of servers and “critical” network devices from an architectural point of view of security.
- ◊ Identification of operating systems used ( S. fingerprint ).
- ◊ Finding public information on the applications used.
- 2) Vulnerability Assessment.
- 3) Vulnerability classification.
- 4) Reporting and countermeasures management.
VAT REPORT
The report relating to the Internal Vulnerability Assessment includes all the documentation provided to the end of its activity. Figure 2 schematizes the first step, described above, highlighting the reporting phase intended as the output of the VAT activity. The report will contain the following information:- ♦ List of vulnerabilities associated with the single server / network device if any.
- ♦ Vulnerability classification.
- ◊ High (Critical): Vulnerabilities that constitute or may constitute a serious risk to the company.
- ◊ Medium: Medium risk vulnerabilities, exploitable with few attack vectors or with little impact for the company.
- ◊ Low: Vulnerabilities with little or no impact on business productivity.
- ♦ Best practice.
EXTERNAL VULNERABILITY ASSESSMENT (E.V.A.)
TARGET E.V.A.
Based on some considerations, the Target is identified in the perimeter network devices seen as physical separators between the LAN and the Internet ( trusted network and untrusted network). Subsequently it will be possible to modify the Target based on further observations and the result of the V.A. The target object of the proposal includes the following network devices:- ♦ Security device.
- ◊ Firewall
- ◊ VPN Terminators.
- ◊ Access Points / Radio bridges.
- ♦ Application server
STEPS E.V.A.
The project is divided into the following phases:- 1) Reconnaissance phase.
- ♦ Perimeter network structure ( reverse engineering to derive network topology).
- ♦ Identification and classification of servers and “critical” network devices from an architectural point of view of security.
- ♦ Identification of operating systems used ( S. fingerprint ).
- ♦ Identification of remote access methodology.
- ♦ Finding public information of the company requesting the security test.
- ♦ Finding public information on the applications used.
- 2) Vulnerability Assessment.
- 3) Vulnerability classification.
- 4) Reporting and countermeasures management.
REPORT E.V.A.
The report relating to the External Vulnerability Assessment includes all the documentation provided at the end of the related activity. Figure 3 schematizes the second step, described above, highlighting the reporting phase intended as the output of the activity of E.V.A. The report will contain the following information:- ♦ List of vulnerabilities associated with the single server / network device if any.
- ♦ Vulnerability classification.
- ♦ High (Critical): Vulnerabilities that constitute or may constitute a serious risk to the company.
- ♦ Medium: Medium risk vulnerabilities, exploitable with few attack vectors or with little impact for the company.
- ♦ Low: Vulnerabilities with little or no impact on business productivity.
- ♦ Best practice.
INTERNAL PENETRATION TEST (I.P.T.)
TARGET I.P.T.
Based on some considerations, the Target is identified in the LAN (attestation to any segment of the LAN) seen as a weak link in the network infrastructure. Subsequently it will be possible to modify the Target based on further observations and the result of the V.A. The target object of the proposal includes the following devices within the LAN:- Network device.
- Security device.
- Application server.
- Storage server.
I.P.T. PHASES
- Exploiting server application.
- Penetrating Network.
- Privilege escalation.
- Reporting and countermeasures management.
I.P.T. REPORT
The report relating to the Internal Penetration Test includes all the documentation provided at the end of the related activity. Figure 4 shows the third step, described above, highlighting the reporting phase intended as the output of the I.P.T. The report will contain the following information:- Methods of attack (exploit) used.
- Best practice.
EXTERNAL PENETRATION TEST (E.P.T.)
TARGET E.P.T.
Based on some considerations, the Target is identified in the perimeter network devices seen as physical separators between the LAN and the Internet ( trusted network and untrusted network). Subsequently it will be possible to modify the Target based on further observations and the result of the V.A. The target object of the proposal includes the following network devices:- Security device.
- Firewall.
- VPN Terminators.
- Access Points / Radio bridges.
- Application server
E.P.T. PHASES
- Exploiting server application.
- Penetrating Network.
- Privilege escalation.
- Reporting and countermeasures management.
E.P.T. REPORT
The report relating to the External Penetration Test includes all the documentation provided at the end of the related activity. The report will contain the following information:- Methods of attack (exploit) used.
- Best practice.
Customers
Twitter FEED
Recent activity
-
SecureOnlineDesktop
Estimated reading time: 6 minutes L'impatto crescente delle minacce informatiche, su sistemi operativi privati op… https://t.co/FimxTS4o9G
-
SecureOnlineDesktop
Estimated reading time: 6 minutes The growing impact of cyber threats, on private or corporate operating systems… https://t.co/y6G6RYA9n1
-
SecureOnlineDesktop
Tempo di lettura stimato: 6 minuti Today we are talking about the CTI update of our services. Data security is… https://t.co/YAZkn7iFqa
-
SecureOnlineDesktop
Estimated reading time: 6 minutes Il tema della sicurezza delle informazioni è di grande attualità in questo peri… https://t.co/tfve5Kzr09
-
SecureOnlineDesktop
Estimated reading time: 6 minutes The issue of information security is very topical in this historical period ch… https://t.co/TP8gvdRcrF
Newsletter
{subscription_form_1}Products and Solutions
News
- From Secure Online Desktop to Cyberfero: rebranding of the leading cybersecurity company May 6, 2024
- NIS: what it is and how it protects cybersecurity April 22, 2024
- Advanced persistent threats (APTs): what they are and how to defend yourself April 17, 2024
- Penetration Testing and MFA: A Dual Strategy to Maximize Security April 15, 2024
- Penetration Testing: Where to Strike to Protect Your IT Network March 25, 2024
Google Reviews
Ottima azienda, servizi molto utili, staff qualificato e competente. Raccomandata!read more
Ottimo supportoread more
E' un piacere poter collaborare con realtà di questo tiporead more
Un ottimo fornitore.
Io personalmente ho parlato con l' Ing. Venuti, valore aggiunto indubbiamente.read more
© 2024 Cyberfero s.r.l. All Rights Reserved. Sede Legale: via Statuto 3 - 42121 Reggio Emilia (RE) – PEC [email protected] Cod. fiscale e P.IVA 03058120357 – R.E.A. 356650 Informativa Privacy - Certificazioni ISO