How To Perform A Vulnerability Assessment
How To Perform A Vulnerability Assessment
How To Perform A Vulnerability Assessment
PERFORM A
VULNERABILITY
ASSESSMENT:
STEP BY STEP
BY IZZMIER IZZUDDIN
Example 1: Vulnerability Assessment of a Web Application
1. Scope Definition
2. Data Collection
Results:
Results:
Results:
4. Data Analysis
5. Reporting
Detailed Report:
• Vulnerabilities Found:
o Apache Struts Remote Code Execution (CVE-2018-11776, CVE-2017-5638)
o Linux Kernel TCP SACK Panic (CVE-2019-5489)
o SQL Injection in login form
o Cross-Site Scripting in search functionality
o Cross-Site Request Forgery in critical actions
• Recommendations:
o Update and patch Apache Struts
o Patch the Linux kernel
o Implement prepared statements for database interactions
o Validate and sanitize user inputs
o Implement CSRF protection mechanisms
6. Remediation
1. Scope Definition
2. Data Collection
Results:
Results:
Results:
Results:
Steps:
use exploit/windows/rdp/cve_2019_0708_bluekeep_rce
set RHOST 192.168.1.1
exploit
Results:
4. Data Analysis
5. Reporting
Detailed Report:
• Vulnerabilities Found:
o BlueKeep (CVE-2019-0708)
o EternalBlue (CVE-2017-0144)
o SMBGhost (CVE-2020-0796)
o Plain text transmission of sensitive data
o Excessive broadcast traffic
• Recommendations:
o Apply patches for BlueKeep, EternalBlue, and SMBGhost vulnerabilities
o Implement encryption for sensitive data transmission
o Reconfigure network devices to reduce unnecessary broadcast traffic
6. Remediation
• Patching:
o Apply all relevant patches and updates for identified vulnerabilities
• Encryption:
o Implement TLS/SSL for all sensitive data transmissions
• Network Configuration:
o Optimize network configurations to minimize broadcast traffic
• Monitoring and Continuous Improvement:
o Regularly update systems and apply patches
o Conduct periodic vulnerability assessments and penetration tests
o Implement continuous network monitoring to detect and respond to threats
promptly
Example 3: Vulnerability Assessment of a Healthcare System
1. Scope Definition
2. Data Collection
Results:
Results:
Results:
• CVE-2019-0708: Remote Desktop Services Remote Code Execution Vulnerability
(BlueKeep)
• CVE-2020-3452: Cisco ASA Path Traversal Vulnerability
• CVE-2020-5902: F5 BIG-IP Remote Code Execution Vulnerability
• CVE-2021-26855: Microsoft Exchange Server Remote Code Execution Vulnerability
Results:
Results:
4. Data Analysis
5. Reporting
Executive Summary: The hospital's healthcare information system has several critical
vulnerabilities, including BlueKeep, Cisco ASA, and F5 BIG-IP remote code execution
vulnerabilities, as well as SQL injection and XSS in the web application. These issues pose
significant risks to patient data confidentiality and system integrity. Immediate remediation is
necessary to protect sensitive health information and ensure system security.
Detailed Report:
• Vulnerabilities Found:
o BlueKeep (CVE-2019-0708)
o Cisco ASA Path Traversal (CVE-2020-3452)
o F5 BIG-IP (CVE-2020-5902)
o Microsoft Exchange Server (CVE-2021-26855)
o SQL Injection in patient registration form
o Cross-Site Scripting in patient portal comments section
o Insecure Direct Object References in medical record access
o Plain text transmission of patient data
o Unencrypted FTP traffic
• Recommendations:
o Apply patches for BlueKeep, Cisco ASA, F5 BIG-IP, and Microsoft Exchange
vulnerabilities
o Implement secure coding practices for SQL queries and input handling
o Implement input validation and output encoding to prevent XSS
o Ensure proper authorization checks to prevent IDOR
o Implement encryption for sensitive data transmission
o Replace FTP with secure alternatives (e.g., SFTP)
6. Remediation
• Patching:
o Apply all relevant patches and updates for identified vulnerabilities
• Encryption:
o Implement TLS/SSL for all sensitive data transmissions
o Replace FTP with SFTP
• Code Fixes:
o Use prepared statements for database interactions
o Validate and sanitize user inputs
• Configuration Changes:
o Harden server configurations to reduce attack surface
• Monitoring and Continuous Improvement:
o Regularly update systems and apply patches
o Conduct periodic vulnerability assessments and penetration tests
o Implement continuous network monitoring to detect and respond to threats
promptly
Example 4: Vulnerability Assessment of a Financial Institution's Online Banking System
1. Scope Definition
2. Data Collection
Results:
Results:
Results:
• CVE-2019-11510: Pulse Secure VPN Arbitrary File Read Vulnerability
• CVE-2019-19781: Citrix ADC Directory Traversal Vulnerability
• CVE-2020-0601: Windows CryptoAPI Spoofing Vulnerability
• CVE-2020-0796: SMBv3 Remote Code Execution Vulnerability (SMBGhost)
Results:
• SQL Injection: Found in the transaction history search form, parameter transactionID
• Cross-Site Scripting (XSS): Found in the feedback form
• Cross-Site Request Forgery (CSRF): Found in the fund transfer functionality
• Insecure Direct Object References (IDOR): Found in account management
functions
Steps:
use exploit/windows/smb/ms17_010_eternalblue
set RHOST 192.168.100.2
exploit
Results:
4. Data Analysis
5. Reporting
Executive Summary: The online banking system has several critical vulnerabilities, including
Pulse Secure VPN, Citrix ADC, SMBGhost, and EternalBlue. Additionally, SQL injection, XSS,
and CSRF vulnerabilities were identified in the web application. These issues pose significant
risks to the security and integrity of the financial institution's systems and data. Immediate
remediation is necessary to protect sensitive customer information and ensure system
security.
Detailed Report:
• Vulnerabilities Found:
o Pulse Secure VPN Arbitrary File Read (CVE-2019-11510)
o Citrix ADC Directory Traversal (CVE-2019-19781)
o Windows CryptoAPI Spoofing (CVE-2020-0601)
o SMBGhost (CVE-2020-0796)
o SQL Injection in transaction history search form
o Cross-Site Scripting in feedback form
o Cross-Site Request Forgery in fund transfer functionality
o Insecure Direct Object References in account management functions
• Recommendations:
o Apply patches for Pulse Secure VPN, Citrix ADC, and Windows CryptoAPI
vulnerabilities
o Implement secure coding practices for SQL queries and input handling
o Implement input validation and output encoding to prevent XSS
o Ensure proper authorization checks to prevent IDOR
o Implement encryption for sensitive data transmission
o Replace unencrypted protocols with secure alternatives (e.g., SFTP)
6. Remediation
• Patching:
o Apply all relevant patches and updates for identified vulnerabilities
• Encryption:
o Implement TLS/SSL for all sensitive data transmissions
o Replace FTP with SFTP
• Code Fixes:
o Use prepared statements for database interactions
o Validate and sanitize user inputs
• Configuration Changes:
o Harden server configurations to reduce attack surface
• Monitoring and Continuous Improvement:
o Regularly update systems and apply patches
o Conduct periodic vulnerability assessments and penetration tests
o Implement continuous network monitoring to detect and respond to threats
promptly