Offensive Security
Cyber Security notes, references, and resources.
Main Types of Cyber Security Assessments
Systematically identifying and evaluating vulnerabilities in applications, systems, or networks.
Goal: Create a prioritized inventory list of weaknesses without exploiting them.
Limitation: It does not simulate an attack or verify if the vulnerabilities can be exploited.
Activities Involved:
Identifying assets: determine what applications, systems, or networks must be protected and, thus, assessed.
Scanning for vulnerabilities: scan for unpatched software, misconfigurations, open ports, outdated libraries, etc, either manually or using tools like Nessus, Qualys, or OpenVAS.
Risk Prioritization: based on the impact and likelihood of exploitation, assign a severity level—Critical, High, Medium, or Low.
Reporting: deliver a detailed report outlining vulnerabilities, their impact, and suggested remediation.First Tab
Ethical Hacking
Ethical hacking is the authorized use of tools, tactics, and techniques to simulate real-world cyber attacks to identify and validate the exploitability of vulnerabilities to improve the cybersecurity posture of an organization.
Scope:
It is crucial to risk assessment, auditing, counter fraud, and information system security best practices.
It identifies risks and highlights remedial actions, thus reducing ICT costs by resolving vulnerabilities.
Limitations:
An ethical hacker can only help an organization better understand its security posture; it is up to the organization to place the right safeguards on the network.
Organizations need to know what they are looking for and why they are hiring an ethical hacker.
Information Security Attacks: Motives, Goals, & Objectives
Attacks involve an attempt to obtain, edit, remove, destroy, implant, or reveal information without authorized access. It can be conceptualized as a combination of a motive/goal with a method to perform an attack that exploits a vulnerability.
Motives: disrupt business operations, steal information, manipulate data, create fear & chaos by disrupting critical infrastructure, propagate propaganda/political views, revenge, financial gain, etc.
Vulnerabilities include hardware/software misconfiguration, insecure or poor system or network design, inherent technology weaknesses, end-user carelessness, and intentional user actions.
Tactics, Techniques, and Procedures (TTPs):
Tactics is the strategy an attacker adopts to perform attacks from beginning to end.
Techniques: the technical methods attackers use to achieve intermediate results during the attack.
Procedures: the systematic approach adopted by threat actors to launch an attack.
Last updated