VA

Vulnerability Assessment

A

Vulnerability means Security gap. 

B

Vulnerability Analysis or Vulnerability Assessment  is the process of discovering security gaps or vulnerabilities. Many false positives sometimes termed as potential vulnerabilities.

C

To perform VA, set of softwares are required.

D

VA apps are dependent upon the Vulnerability Database almost equivalent to Anti-Virus Signatures.

E

Vulnerability Database fetches the details from CVE -Common Vulnerability Exposure.

F

*The advancement of the VA in the domain of Artificial Intelligence (AI) and Machine-Learning (ML) – Autonomous or Self-initiating the VA scan engines has already emerged.

G

AI and ML integrated in the VA engine cannot override human intelligence. Although some people think it will happen in the near future.

H

Reports are very intuitive as it is built by many large organisations. Separate reports for Executives, IT Security, Stake Holders, CIOs, CISO, Score Cards so on and so forth. 

I

Vulnerability Assessments (VA) can only show the remediation what is already present in their database mostly CVEs. However, lot of big VA companies claim they have Vulnerability Researchers.

J

VA determines at a scale about the vulnerabilities
i. Servers
ii. Networks
iii. Web apps
iv. Mobile apps
v. Internet of Things (IoT)

K

Unauthenticated or VA without the credentials will only discover what is visible to the external.

L

Authenticated Vulnerability Assessment with credentials are widely used in the enterprise (especially with AD/ LDAP domain creds/app creds). It will just point out where the location of the version of the vulnerability.

M

VA will never be able to custom draw the network topology. Not to be confused with the Network Monitoring and Management Systems. Knowing the Topology is essential before gaining access. 

N

VAs do not build the custom packets to evade the security layers like Web Application Firewall (WAF), firewall, intrusion prevention/detection systems (IPS/IDS) so on & so forth.

O

The intent is to fix the existing vulnerabilities of the infrastructure by what is present in the Vulnerability Database.

P

VA apps will never understand the hackers methodology or discover the attack vectors.

Q

Compliance requirement for ISO 27001 – Information Security Management Systems ISMS.

R

Vulnerability Assessment is far ahead than the Security Audits. Continuous Vulnerability Assessment is essential. 

S

Do not have the ability to custom code payloads and/or exploits to find out whether it is false-positive or false-negative.

T

VA cannot assess the Insider Threats.

U

VA cannot perform Social Engineering tests such as the Phishing/Vishing assessments.

PT

penetration testing

A

Penetration Testers perform security assessments to find the vulnerabilities.

B

Penetration Testing is the process of exploiting vulnerabilities to prove the vulnerability is a genuine one or not. It means whether the found vulnerability is false-positive or false-negative.

C

Pen Test is always manual. We automate it with our scripts to ease the process.

D

Pen Testing or PT solely depends on the security practitioners expertise.

E

Pen Testers even find Zero days and publish it to CVEs.

F

Although there are many automated tools for PenTesting. Nothing has ever come close to the PenTesters expertise and the different attack vectors.

G

AI and ML in the VA engine or our scripts baked with AI/ML will complement it to do only repetitive tasks or the datasets that we feed into it.

H

Reports are manual and it is custom mapped by PenTesters if there are any CVEs or CVSS IDs. Else they will just mention it as a newly discovered and its impact.

I

Always a Proof-of-Concept (PoC) with screenshots, logs and the logs. It can be reiterated to demonstrate the genuineness of the vulnerability.

J

PT goes very deep than any traditional vulnerability scanners can reach. PenTesting can be done for any things and everything but it solely depends on the pentester knowledge. PenTesting even for Zero days and undiscovered vulnerabilities by the VA apps so that it will be updated in the CVE database. 

K

External PenTesting goes far ahead as we discover lot of other things which VA cannot

L

White Hat Pen Testing or IT Security Assessment is again equivalent but not the same as it requires a PenTesters with the credentials and their expertise to prove whether it is a false-positive or false negative with the screenshots, Proof of Concept and logs.

M

PT will always have the ability to understand the Defense-in-Depth (DiD) and draw a network topology. We usually do it in the Reconnaissance, Scanning phase.

N

PenTesters will evaluate and create a custom packets and create a path bypassing or evading all the security mechanisms or defense-in-depth strategies.

O

The intent is to safeguard the entire organisation by simulating multiple attack vectors before malicious hackers do.

P

PenTesting is performed to analyze from the malicious hackers perspective.

Q

Compliance requirement for CCPA, GDPR, HIPAA, PCI-DSS. Good to have even for ISO 27001

R

Pen Testing goes an extra mile than any Vulnerability Assessment apps could ever reach. The depth of the vulnerability.

S

Pen Testing is usually performed manually. We develop payloads and exploits. We even write custom scripts.

T

PT can perform insider threats assessment too.

U

PT performs Social Engineering such as Phishing and Vishing assessments.

Get your 15 minutes

FREE CONSULTATION

krishnag