Vulnerability Assessment Report: Assignment-2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

ASSIGNMENT-2

VULNERABILITY ASSESSMENT REPORT

BY: - S VENKATESH REDDY

TARGET: - PAYTM.COM

DATE: - 02/04/2023
Table of Contents

1.Scope
2.Reconnaissance
 2.1 Whois lookup
 2.2 MX toolbox
3.Vulnerability Scanning
 3.1 Basic network scan
 3.2 Malware scan
 3.3 Web application testing
 3.4 Remote Code execution testing
 3.5 Advanced vulnerability scan
4.Conclusion
1.SCOPE
 As a perspective of an attacker Cyber hackers will always find a way to
intrude and try to gain unauthorized access to the systems or into network
to disrupt the business and damage the reputation of the company.
 To do this intrusion first step in which attacker might perform is to check the
backdoors and vulnerabilities present in that particular target.
 Attackers follow a step-by-step model-based approach to gain access to the
system Example (Kill chain model).
 So, the organizations should think of performing one step to check the
liability of their networks/systems and how vulnerable they are to the
internet.
 To perform this one such activity the Blue team (defensive team) of
organization for cyber threats need to do a basic check on one of the open
source tool called Nessus to obtain the results.
 Analyzing the system generated report based on the specific details
requested by administrator and if found any vulnerabilities need to take
further action to mitigate them before the threat actor perform any
malicious activity.
 The scope of this assessment is to prepare an analysis on amazon.com to
perform reconnaissance thinking in attackers’ perspective and fix the
vulnerabilities generated by Nessus.
2. Reconnaissance
 The Process of gathering information about a target system or network in
order to identify vulnerabilities, potential attack vectors, and other critical
information that can be used in a cyber-attack.
 This Process can involve a range of techniques, including passive and active
scanning, network mapping, social engineering, and other methods.
 The scope of reconnaissance in cybersecurity is quite broad and
encompasses a wide range of activities that can be used to gain information
about a target system or network. Some of the key objectives of
reconnaissance include as below
 Identifying potential attack vectors: By conducting reconnaissance, attackers
can identify potential vulnerabilities or weaknesses in a target system or
network that can be exploited to gain unauthorized access or execute a
cyber-attack.
 Mapping network topology: Reconnaissance can also be used to map the
topology of a target network, including identifying hosts, routers, firewalls,
and other network devices. This information can be used to plan a targeted
attack or gain a better understanding of the target's security posture.
 Social engineering: In some cases, reconnaissance may involve social
engineering techniques, such as phishing or pretexting, to trick users into
revealing sensitive information that can be used to launch a cyber-attack.
 By identifying vulnerabilities and potential attack vectors, organizations can
take steps to improve their security posture and protect against cyber-
attacks.
2.1Whois Lookup
 Getting the basic details about the registration of the domain and
authoritative name servers on which amazon is operating.
2.2 Mx toolbox
 This type of reconnaissance can help to find Domain names different name
authoritative servers Ip addresses.
Transcript: -
DMARC Lookup: -

HTTPS Lookup: -
SHODAN.IO/SSL CERTIFICATE:

3. Vulnerability scanning
 In cybersecurity, vulnerability scanning is a proactive technique used by the
blue team to identify vulnerabilities in a system or network before an
attacker can exploit them.
 Vulnerability scanning is a critical component of a comprehensive
cybersecurity strategy as it enables organizations to identify and prioritize
potential vulnerabilities and take appropriate measures to mitigate them
before they are exploited.
 Vulnerability scanning is typically conducted using automated tools that
scan a system or network for known vulnerabilities, such as outdated
software, unsecured ports, and misconfigured systems.
 The results of the vulnerability scan are then analyzed to identify
vulnerabilities that pose the greatest risk to the organization, based on
factors such as the severity of the vulnerability and the criticality of the
affected system.
 The blue team can use the results of the vulnerability scan to prioritize
remediation efforts and implement appropriate security controls to mitigate
the identified vulnerabilities.
 This may include applying patches to software, configuring firewalls and
intrusion detection/prevention systems, and implementing access controls
and other security measures.
 Overall, in simple terms vulnerability scanning is a critical component of the
blue team's cybersecurity strategy. By identifying and mitigating
vulnerabilities, organizations can significantly reduce their risk of a
successful cyber-attack and better protect their system

3.1 Advanced Network Scan


 Following attached is the report when scanned on Nessus for the basic
network scan on Host side vulnerabilities.
 Report analysis:
1. Medium Vulnerabilities – 3
2. Information – 30
 Detailed understanding can be found in the below report about the risk
factor and mitigation to avoid the particular vulnerability
 CVE is also mentioned under each vulnerability to asses the blue team to
handle which vulnerability as a priority and take action against.
 Detailed description about vulnerability for administrator to analyze the
issue/attack.
 One of important action need to be addressed is on SSL certificate
vulnerability to avoid opening door to attacker on unencrypted data to
transfer over the internet.
4. CONCLUSION
 Various types of tests have been done on amazon public IP Addresses
including basic scan to advanced vulnerability scan to find vulnerabilities
and analyse further step of actions.
 CVSS score has been present for each vulnerability which are having
different plugins and to assess blue team to decide the priority vulnerability
need to be dealt.
 Risk factor and potential solution is being attached for each individual
vulnerability scan.
 This report will provide organizations one of the helping hand to analyse
their internal networks and using public IP how attacker can able to exploit
and perform reconnaissance.

You might also like