Vulnerability Assessment Report: Assignment-2
Vulnerability Assessment Report: Assignment-2
Vulnerability Assessment Report: Assignment-2
TARGET: - PAYTM.COM
DATE: - 02/04/2023
Table of Contents
1.Scope
2.Reconnaissance
2.1 Whois lookup
2.2 MX toolbox
3.Vulnerability Scanning
3.1 Basic network scan
3.2 Malware scan
3.3 Web application testing
3.4 Remote Code execution testing
3.5 Advanced vulnerability scan
4.Conclusion
1.SCOPE
As a perspective of an attacker Cyber hackers will always find a way to
intrude and try to gain unauthorized access to the systems or into network
to disrupt the business and damage the reputation of the company.
To do this intrusion first step in which attacker might perform is to check the
backdoors and vulnerabilities present in that particular target.
Attackers follow a step-by-step model-based approach to gain access to the
system Example (Kill chain model).
So, the organizations should think of performing one step to check the
liability of their networks/systems and how vulnerable they are to the
internet.
To perform this one such activity the Blue team (defensive team) of
organization for cyber threats need to do a basic check on one of the open
source tool called Nessus to obtain the results.
Analyzing the system generated report based on the specific details
requested by administrator and if found any vulnerabilities need to take
further action to mitigate them before the threat actor perform any
malicious activity.
The scope of this assessment is to prepare an analysis on amazon.com to
perform reconnaissance thinking in attackers’ perspective and fix the
vulnerabilities generated by Nessus.
2. Reconnaissance
The Process of gathering information about a target system or network in
order to identify vulnerabilities, potential attack vectors, and other critical
information that can be used in a cyber-attack.
This Process can involve a range of techniques, including passive and active
scanning, network mapping, social engineering, and other methods.
The scope of reconnaissance in cybersecurity is quite broad and
encompasses a wide range of activities that can be used to gain information
about a target system or network. Some of the key objectives of
reconnaissance include as below
Identifying potential attack vectors: By conducting reconnaissance, attackers
can identify potential vulnerabilities or weaknesses in a target system or
network that can be exploited to gain unauthorized access or execute a
cyber-attack.
Mapping network topology: Reconnaissance can also be used to map the
topology of a target network, including identifying hosts, routers, firewalls,
and other network devices. This information can be used to plan a targeted
attack or gain a better understanding of the target's security posture.
Social engineering: In some cases, reconnaissance may involve social
engineering techniques, such as phishing or pretexting, to trick users into
revealing sensitive information that can be used to launch a cyber-attack.
By identifying vulnerabilities and potential attack vectors, organizations can
take steps to improve their security posture and protect against cyber-
attacks.
2.1Whois Lookup
Getting the basic details about the registration of the domain and
authoritative name servers on which amazon is operating.
2.2 Mx toolbox
This type of reconnaissance can help to find Domain names different name
authoritative servers Ip addresses.
Transcript: -
DMARC Lookup: -
HTTPS Lookup: -
SHODAN.IO/SSL CERTIFICATE:
3. Vulnerability scanning
In cybersecurity, vulnerability scanning is a proactive technique used by the
blue team to identify vulnerabilities in a system or network before an
attacker can exploit them.
Vulnerability scanning is a critical component of a comprehensive
cybersecurity strategy as it enables organizations to identify and prioritize
potential vulnerabilities and take appropriate measures to mitigate them
before they are exploited.
Vulnerability scanning is typically conducted using automated tools that
scan a system or network for known vulnerabilities, such as outdated
software, unsecured ports, and misconfigured systems.
The results of the vulnerability scan are then analyzed to identify
vulnerabilities that pose the greatest risk to the organization, based on
factors such as the severity of the vulnerability and the criticality of the
affected system.
The blue team can use the results of the vulnerability scan to prioritize
remediation efforts and implement appropriate security controls to mitigate
the identified vulnerabilities.
This may include applying patches to software, configuring firewalls and
intrusion detection/prevention systems, and implementing access controls
and other security measures.
Overall, in simple terms vulnerability scanning is a critical component of the
blue team's cybersecurity strategy. By identifying and mitigating
vulnerabilities, organizations can significantly reduce their risk of a
successful cyber-attack and better protect their system