VAPT and Exploits Along With Classificat
VAPT and Exploits Along With Classificat
VAPT and Exploits Along With Classificat
Original Article
Abstract - Vulnerability assessment and penetration testing penetration test to complement the assessment's results.
is a process done at every level in cyber security due to Vulnerability assessments can be performed manually or
various attacks regularly and the problems created by the automatically. Manual assessments are generally
attackers either for their personal or professional reasons. performed by an individual who would use an automated
on the other hand, Exploits are the main asset of tool to collect information that can later be manually
Vulnerabilities. This paper aims to classify the exploits analyzed. However, manual assessments may become
based on their existence. Also, this paper tries to give a more time-consuming as the number of assessment
fair judgment to review Vulnerability Assessment and systems increases. Automatic assessments rely on tools to
Penetration Testing with Exploits. Along with some automatically scan and test the system for any
awareness and prevention techniques. A study on vulnerability. These tools analyze the information they
preventive and defensive measures could be taken from the collect to generate results and reports. This can be
view of any Penetration Tester. Detailed Classification of accomplished through a number of different methods,
Exploits and their existence is the main aspect of this including multiple static analysis techniques, such as
paper. source code analysis and syntax-based fuzzing, dynamic
analysis techniques such as binary instrumentation, and
Keywords - Classification of Exploits, Exploits, real-time tests. Defensive techniques include writing
Penetration Testing, Vulnerability Assessment, Zero-Day secure code, Performing Bound Checks, Runtime
Attacks, Zero-Day Exploits. Instrumentation, and static and dynamic code analysis.
Analysis and Impact of Vulnerability Assessment and Preventive measures that can be taken include:
Penetration Testing, by Yugansh Khera, Deepansh Kumar, • To be proactive. That means installing a good
Sujay, Nidhi. in this research, the authors depicted dangers antivirus and firewall.
to the trustworthiness and privacy of data and assets are • Monitoring your computer and checking that all the
expanded. To remain secure, associations perform VAPT programs on your computer are up-to-date with the
to check the security stance of the framework. As we have latest security patches.
gone through the writing study about VAPT techniques, it • One should also use strong passwords and change
is observed that there are different devices accessible for them often. It's also helpful to create different user
the recently developed weaknesses. This issue can be accounts for each program, so you don't have to
tended to by making instruments so adaptable that new share passwords for everything.
assault marks can be added for weaknesses. To make
VAPT results significant, it should focus on and clarify B. Penetration Testing
weaknesses with CVE numbers which can be purchased Penetration testing is a control system assessment that
from industry-standard references like public weakness mirrors an attack by a malicious individual. The goal of the
information base (NVD), normal weakness scoring test is to identify how vulnerable your systems are to
framework (CVSS), open-source weakness information potential security breaches. Information gathered from this
base (OSVDB), and so on, performing VAPT. Assailants type of assessment can be used to make necessary
are tracking down better approaches to sidestep security adjustments to increase your company's overall security.
instruments, so new weaknesses are developing which
should be tended to. Subsequently, existing apparatuses Penetration tests come in two different varieties:
should be added with instruments to distinguish and external and internal. External tests involve hackers or
evaluate. malicious individuals who attempt to access sensitive
III. PROPOSED WORK information outside of the company’s firewall (i.e.,
A. Remote Attacks customer data, credit card numbers). Internal tests involve
How can remote attacks happen? Remote attacks are people on staff who attempt to break through security
possible for several reasons. For example, a hacker could measures within the company's network (i.e., phishing
use a trojan horse or virus to infiltrate your computer from scams). Both types of tests provide feedback on how
an external. secure a system is but each has its advantages and
disadvantages in terms of effectiveness and cost-
Following is the block representation of steps included effectiveness. An external penetration test might be
in any remote attack. cheaper but less effective than an internal one because it
Footprinting doesn't assess as much of the organization's network
infrastructure as an internal test. Penetration testing is
Network Scanning typically done by a third-party entity that will be permitted
to test the system's security.
Port Scanning
The primary goal of penetration testing is to identify
Version Detection Scan any potential vulnerability on your website or network.
The information gathered from the test can be used to
OS Fingerprinting make adjustments to increase your company's overall
security. Continual assessment can help you protect your
Social Engineering business more effectively and efficiently than if you were
relying solely on one-time assessments. Pen tests are also
Vulnerability Scanning
cost-effective because they're generally much less
Configuring Exploit expensive than hiring a cyber security firm for continual
security checks. If one finds that Vulnerability has been
Attack identified during penetration testing, you have the
opportunity to take steps to fix the problem before
Maintaining Access with Trojans malicious actors exploit it. This enhances your company's
security, but it also demonstrates that you care about
Covering Tracks/Logs safeguarding customer data and information.
Fig. 1 Process of Remote Attack
Following is the explanation of the process included in
In Fig. 1, it is to be explained that once the process of any Penetration Testing done.
Reconnaissance is done, the major work to be done is all
on exploits; first of all, the configuration is done, then the
attack process is done, where the attacker finds a medium
whether remote or physical for the attack to be successful.
This exploits itself holds on to the Trojan too. It may be
hidden inside an image file or anything that lures the
attention of the target and forces the target to access them.
2
Sheetakshi Shukla & Tasneem Bano Rehman / IJCSE, 9(3), 1-4, 2022
The above tree representation is of the Classification Top Examples of Zero-Day attacks.
of the Exploits.
• LinkedIn (June 2021)
• Alibaba(November 2019)
Based on Vulnerabilities, Exploits can be divided into • Facebook(April 2019)
two parts • MarriottInternational(September 2018)
• Yahoo(August 2013)
a) Manual Exploits
Also called Physical Exploits, as the attack is done by As per the analysis, every minute, a new bug or
physical means like being loaded in a pen drive, any image Vulnerability or a loophole is detected by various hackers
or CD, or any video and sent to the target. or the penetration tester, so the possibility of a new exploit
b) Remote Exploits taking birth is directly proportional to the detection of
These exploits have to go through a long process, like Vulnerability. Below is a graphical representation of zero-
gaining the target's IP address, Port Forwarding, launching day attacks that happened over a decade
the Exploit, and then poisoning it on the Web.
3
Sheetakshi Shukla & Tasneem Bano Rehman / IJCSE, 9(3), 1-4, 2022