Page cover

Offensive Security

Cyber Security notes, references, and resources.

Main Types of Cyber Security Assessments

Systematically identifying and evaluating vulnerabilities in applications, systems, or networks.

Goal: Create a prioritized inventory list of weaknesses without exploiting them.

Limitation: It does not simulate an attack or verify if the vulnerabilities can be exploited.

Activities Involved:

  • Identifying assets: determine what applications, systems, or networks must be protected and, thus, assessed.

  • Scanning for vulnerabilities: scan for unpatched software, misconfigurations, open ports, outdated libraries, etc, either manually or using tools like Nessus, Qualys, or OpenVAS.

  • Risk Prioritization: based on the impact and likelihood of exploitation, assign a severity level—Critical, High, Medium, or Low.

  • Reporting: deliver a detailed report outlining vulnerabilities, their impact, and suggested remediation.First Tab

Ethical Hacking

Ethical hacking is the authorized use of tools, tactics, and techniques to simulate real-world cyber attacks to identify and validate the exploitability of vulnerabilities to improve the cybersecurity posture of an organization.

  • Scope:

    • It is crucial to risk assessment, auditing, counter fraud, and information system security best practices.

    • It identifies risks and highlights remedial actions, thus reducing ICT costs by resolving vulnerabilities.

  • Limitations:

    • An ethical hacker can only help an organization better understand its security posture; it is up to the organization to place the right safeguards on the network.

    • Organizations need to know what they are looking for and why they are hiring an ethical hacker.

Information Security Attacks: Motives, Goals, & Objectives

Attacks involve an attempt to obtain, edit, remove, destroy, implant, or reveal information without authorized access. It can be conceptualized as a combination of a motive/goal with a method to perform an attack that exploits a vulnerability.

Attacks = Motive (Goal) + Method(TTP) + Vulnerability
  • Motives: disrupt business operations, steal information, manipulate data, create fear & chaos by disrupting critical infrastructure, propagate propaganda/political views, revenge, financial gain, etc.

  • Vulnerabilities include hardware/software misconfiguration, insecure or poor system or network design, inherent technology weaknesses, end-user carelessness, and intentional user actions.

  • Tactics, Techniques, and Procedures (TTPs):

    • Tactics is the strategy an attacker adopts to perform attacks from beginning to end.

    • Techniques: the technical methods attackers use to achieve intermediate results during the attack.

    • Procedures: the systematic approach adopted by threat actors to launch an attack.

Last updated