Dark Arts
  • index
  • BUY ME A BOOK
  • 🪄Dark Magic
    • Pentesting
      • Industry Methodologies
    • Scopes of Testing
    • Reconnaissance
      • Passive
        • WHOIS
        • DNS
          • nslookup
          • dig
        • WAF
        • Subdomain
        • Google Dork
        • Misc. Techniques
        • Leaked Passwords
      • Active
        • Browser & Plugins
        • ping & traceroute
        • fping
        • telnet & netcat
        • DNS
          • Zone Transfer
          • DNS Amplification DDoS Attack Breakdown
        • Misc. Techniques
    • Vulnerability Assessment
    • Attack Types
  • 🕷️Aragoogs Nest
    • Web Application Overview & Security
      • Security Testing
      • Common Threats & Risks
    • Web Application Architecture
      • Technologies
    • HTTP/S
      • Message
      • Request
      • Response
        • Status Code
    • Crawling/Spidering
  • 🧪Potions
    • Web Browsers
    • Computer Networking
      • Network Protocol
      • Packets
      • OSI Layer
        • Layer 3: Network
        • Layer 4: Transport
      • DNS
        • Primary-Secondary
        • Local Name Resolution
        • Domain Hierarchy
        • FQDN
        • Lookups
        • DNS Resolution
        • DNS Records
        • Security: Attack-Defense (Default)
  • 🎆Spells
    • 📜Linux Scroll
    • 📜WebShell Scroll
    • git
      • Attacks + Vulnerabilities
  • 🖼️Flaws w/ Magical Frameworks
    • Windows
      • In a Nutshell
      • CVE-2019-0708: BlueKeep
      • CVE-2017-0144: EternalBlue: MS17-010
      • Attacking Services
        • MS IIS - WebDAV
        • SMB
        • HTTP File Server (HFS)
        • Apache Tomcat Web Server
        • RDP
        • WinRM
      • File System Vulnerabilities
      • Credential Dumping
        • Password Search in Windows Configuration Files
        • Mimikatz
        • Pass-the-Hash Attack
    • Linux
      • In a Nutshell
      • CVE-2014-6271: Shellshock
      • Attacking Services
        • FTP
        • SSH
        • SAMBA
        • SMTP
        • RSYNC
      • Dumping Hashes
  • 🌼Marauder's Boost
    • Privilege Escalation
    • Windows PrivEsc
      • Windows Kernel Exploit
      • Bypassing UAC
      • Access Token Impersonation
    • Linux PrivEsc
      • Linux Kernel Exploit
      • Misconfigured Cron Jobs
      • Exploiting SUID Binaries
      • shells
      • File Permissions
  • ☠️Death Eaters
    • Post Exploitation
      • Windows
      • Linux
  • 🪄OLLIVANDERS
    • nmap
      • Host Discovery
      • Port Scan
      • Service & OS
      • NSE
      • Firewall/IDS Evasion
      • Scan Optimization
      • Misc. Methods
    • ffuf
    • Hydra
    • Metasploit Framework
      • Architecture
      • Must to Know
      • msfvenom
      • Auxiliary Modules
      • Service Enumeration
      • Vulnerability Scanning
      • Imports
      • Automating
    • Vulnerability Scanners
    • Wireshark
  • 🚂Platform 9(3/4)
    • Auth-Auth
      • Authentication
        • Password-based Authentication
        • Basic Authentication
        • Multi-factor Authentication
        • Access Token
        • Token-based Authentication
          • JWT
          • OAuth 2.0
    • Secure Headers
      • Content-Security-Policy (CSP)
    • Cryptography
      • Caesar Cipher
  • ⛲Port Pensieve
    • Enumeration
      • SMB & NetBIOS
      • SNMP
    • Wordlists
  • 🔆DUELS
    • Pivoting
    • SMB Relay Attack
  • 🗺️Marauder's Map
    • Web Application Pentesting
    • API Pentesting
      • GraphQL
        • Primer
    • Mobile Application Pentesting
  • 🎧SIDE CHANNEL
    • Side Channel Analysis
    • Timing Side-Channel Attacks
      • Vulnerable Login
  • 🥃Sky
    • Cloud Basics
    • Cloud Management
      • Shared Responsibility Model
    • Using Cloud Resources
      • Monitoring & Alerts
      • Identity & Access Management
      • Scalability & Availability
      • Solution Design
    • Cloud Providers
    • Cloud Security & Regulatory Compliance
      • Resource Protection
      • ICCA: Cloud Security & Regulatory Compliance
    • ICCA Preparation
      • Knowledge Tests
      • Lab
  • 🔷Obsidian
    • Pentest Engagement
      • Scoping
    • Pentest Ethics
      • Rules of Engagement
    • Auditing Fundamentals
      • Process/Lifecycle
      • Pentest & Security Auditing
      • GRC
      • Standards, Frameworks & Guidelines
      • From Audit to Pentest
  • 💢Threat Modeling
    • Why Threat Model?
  • 📡THREAT INTEL
    • Threat Intelligence
    • Tool Dump
  • 📱Anything-Mobile-IoT
    • Firmware
    • Firmware Analysis
      • Example: CVE-2016-1555
    • Firmware Installation/Flashing
  • 🎉Mischeif
    • Social Engineering
    • Phishing
      • GoPhish
    • Pretexting
Powered by GitBook
On this page
  • Vulnerability Types
  • Scoring
  • CVSS
  • VPR
  • Vulnerability DB
  1. Dark Magic

Vulnerability Assessment

PreviousMisc. TechniquesNextAttack Types

Last updated 8 months ago

A vulnerability in cybersecurity refers to a weakness or flaw in a system's design, implementation, or behavior that can be exploited by an attacker to gain unauthorized access or perform unauthorized actions. For example, NIST defines it as a weakness in an information system or its security procedures that could be exploited by a threat source.

In short, a vulnerability is a security gap that can be used by attackers to compromise a system.

A vulnerability assessment is the process of identifying, evaluating, and prioritizing security weaknesses in systems, networks, or applications. It involves scanning for vulnerabilities, analyzing their potential impact, and providing recommendations for mitigating or fixing them to reduce the risk of exploitation by attackers.

Vulnerability Types

Vulnerability Type

Description

Example

Operating System

Vulnerabilities found within Operating Systems, often leading to privilege escalation.

A user gaining unauthorized admin-level access.

(Mis)Configuration-based

Vulnerabilities stemming from incorrectly configured applications or services.

A website exposing customer details due to a misconfigured database.

Weak or Default Credentials

Occur when applications and services with authentication use default or weak credentials, making them easy for attackers to guess.

An admin dashboard with "admin/admin" as default username and password.

Application Logic

Result from poorly designed applications, where flaws in logic allow attackers to exploit the system.

Poorly implemented authentication allowing attackers to impersonate users.

Human-Factor

Vulnerabilities that exploit human behavior, often relying on deception or manipulation.

Phishing emails tricking users into providing sensitive information.

Scoring

Vulnerability management is the process of identifying, categorizing, and addressing security vulnerabilities in an organization. Since it is impractical to fix every vulnerability, organizations focus on the most dangerous ones, as only around 2% of vulnerabilities are typically exploited.

Vulnerability scoring, such as the Common Vulnerability Scoring System (CVSS), is crucial for prioritizing vulnerabilities by assessing their potential risk and impact. Different frameworks exist to support vulnerability management, each with varying approaches.

CVSS

The Common Vulnerability Scoring System (CVSS) was introduced in 2005 and is a widely-used framework for assessing and scoring vulnerabilities. It has gone through three iterations, with CVSSv3.1 being the current version, and version 4.0 in draft. CVSS assigns a score to a vulnerability based on several factors, such as the ease of exploitation, the existence of exploits, and how the vulnerability affects the Confidentiality, Integrity, and Availability (CIA) triad. Due to the complexity, a calculator is often used to determine the score. The final score falls into one of five classifications based on severity.

CVSS Qualitative Severity Rating Scale

Score Range

None

0.0

Low

0.1 – 3.9

Medium

4.0 – 6.9

High

7.0 – 8.9

Critical

9.0 – 10.0

Advantages of CVSS

  • CVSS has been widely used and established for a long time.

  • It is popular in organizations for vulnerability assessment.

  • CVSS is free to use and recommended by standards like NIST.

Disadvantages of CVSS

  • It was not designed to prioritize vulnerabilities, only to assign severity scores.

  • CVSS heavily relies on the presence of exploits, though only about 20% of vulnerabilities have known exploits.

  • Vulnerability scores rarely change, even if new factors, like exploits, are discovered later.

VPR

Vulnerability Priority Rating (VPR) is a modern, risk-driven framework for vulnerability management developed by Tenable. Unlike CVSS, VPR focuses on the specific risk a vulnerability poses to an organization, rather than its overall impact. VPR only considers vulnerabilities relevant to the organization, meaning if a company doesn't use the affected software, the vulnerability is not prioritized. Additionally, VPR scores are dynamic and can change over time as vulnerabilities age.

VPR uses a similar scoring range to CVSS but does not have a "None/Informational" category, and the same vulnerability may receive different scores in VPR compared to CVSS.

VPR Qualitative Severity Rating Scale

Score Range

Low

0.1 – 3.9

Medium

4.0 – 6.9

High

7.0 – 8.9

Critical

9.0 – 10.0

Advantages of VPR

  • VPR is a modern, real-world framework.

  • It considers over 150 factors when calculating risk.

  • It is risk-driven, helping organizations prioritize vulnerability patching.

  • VPR scores are dynamic, adjusting as vulnerabilities age.

Disadvantages of VPR

  • VPR is not open-source and requires a commercial platform.

  • It places less emphasis on the CIA triad (Confidentiality, Integrity, Availability) compared to CVSS.

Vulnerability DB

In cybersecurity, you'll encounter various applications and services, each with unique designs and potential vulnerabilities. Fortunately, there are online resources that track vulnerabilities for different software and systems. Two key databases for this purpose are:

  1. Exploit-DB [https://exploit-db.com]

Before using these databases, it's important to understand key terms:

  • Vulnerability: A weakness in the design, implementation, or behavior of a system or application.

  • Exploit: An action that leverages a vulnerability to compromise a system.

  • Proof of Concept (PoC): A tool or technique that demonstrates the exploitation of a vulnerability.

NVD (National Vulnerability Database) []

🪄
https://nvd.nist.gov/
Vulnerabilities 101TryHackMe
Logo