Skip to content

Latest commit

 

History

History
38 lines (21 loc) · 3.17 KB

vulnerability-analysis.md

File metadata and controls

38 lines (21 loc) · 3.17 KB

Vulnerability Analysis

Let's first get a general idea of what a vulnerability is

A vulnerability in cybersecurity is defined as a weakness or flaw in the design, implementation or behaviours of a system or application

This definition isn't a perfect one, in fact, the definition varies from source to source. NIST defines a vulnerability as a “weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source”. However, the general idea remains the same.

Vulnerabilities in general can be categorized into 5 broad types with respect to their sources/causes:

TypeDescription
Operating SystemFound within Operating Systems (OSs) and often result in privilege escalation.
Configuration/MisconfigurationStem from an incorrectly configured application or service. Examples include a website exposing customer details, and even left-out default credentials that should've been changed
Application LogicStem from poor application design. For example, a website with shitty encryption for authentication
Human-FactorVulnerabilities that leverage human behaviour. For example, phishing emails are designed to trick humans into believing they are legitimate.

Yes, I ripped this table straight from TryHackMe's Vulnerabilities 101 room, and I recommend you visit that room since it's a literal treasure trove. I'll be using certain sections from it to explain many things, but it'll be a short explanation rather than a verbose one like the one in said room.

On the big shiny public forums and "vulnerability scoring" websites, each vulnerability has a quantitative qualifier attached to it. There are several methods of going about this "scoring" business but here are some popular ones:

  • Common Vulnerability Scoring System (CVSS)
  • Vulnerability Priority Rating (VPR)
  • Tripwire Vulnerability Scoring System
  • IP360 Scoring

The last two are a bit uncommon, but it's good to know them. Here's a dumb way to refer to each of these system's scoring:

Score/RatingReaction/Inference/IDK just understand what you will :P
Low-Medium"Meh"; Low-money bounties; "Meh, Let's just fix this when we feel like it"
High"Nice!"; Medium money bounties; "Okay, better fix this quick"
Critical"OOOOO"; Money's rainin' boys; "AAAAAA, FIX THIS ASAP!!"

There are a lot of vendors that enlist/sell exploits online so it's a good idea to be familiar with them if you can:

TODO: add more on this...