Showing posts with label Resources. Show all posts
Showing posts with label Resources. Show all posts

Friday, October 8, 2021

Vulnerability Scanning v/s Penetration Testing

 A lot of people confuses the importance of vulnerability scanning with penetration testing. The Vulnerability scanning cannot replace the importance of penetration testing as we all know, and penetration testing, on its own, cannot secure the entire network. In this case both are important at their respective levels, needed in cyber risk analysis, and it is required by standards such as PCI, HIPAA, ISO 27001, etc.

Vulnerability scanning vs Penetration Testing

Basically Penetration testing exploits a vulnerability in your system architecture in other hand vulnerability scanning (or assessment) checks for known vulnerabilities and generates a report on risk exposure. which later provides the Forensic reports for the clients.

Either penetration testing or vulnerability scanning depends mostly on three factors:

  1. Scope
  2. Risk and Criticality of assets
  3. Cost and Time

Penetration Testing

Penetration testing scope is typically targeted and there is always a human factor involved. There is no automated penetration testing – which requires the use of tools, sometimes a lot of tools. But it also requires an extremely experienced person to conduct penetration testing. A good penetration tester always at some point during their testing craft a script, change parameters of an attack or tweak settings of the tools he or she may be using.

It could be at application or network level but specific to a function, department or number of assets.  One can include the whole infrastructure and all applications but that is impractical in the real world because of cost and time. You define your scope on a number of factors that are mainly based on risk and how important is an asset.

Some of the penetration tester Spends a lot of money on low-risk assets which may take a number of days to exploit is not practical. Penetration testing requires high skilled knowledge and that’s why it is costly. Testers often exploit a new vulnerability or discover vulnerabilities that are not known to normal business processes. Penetration testing normally can take from days to a few weeks, it is often conducted once a year and reports are short and to the point. It does have a higher than average chance of causing outages.

Penetration testers are well versed in: 

  • Black hat attack methodologies (e.g., remote access attacks, SQL injection)
  • Internal and external testing (i.e., perspective of someone within the network, perspective of hacker over Internet)
  • Web front-end technologies (e.g.,Javascript, HTML)
  • Web application programming languages (e.g., Python, PHP)
  • Web APIs (e.g., restful, SOAP)
  • Network technologies (e.g, firewalls, switches, IDS)
  • Networking protocols (e.g., TCP/UDP, SSL)
  • Operating systems (e.g., Linux, Windows)
  • Scripting languages (e.g., Python, Perl)
  • Testing tools (e.g., Nessus, Metasploit)
  • In short, penetration testers provide a deep look into the data security of an application and/or an organization.

Vulnerability Scanning

On the other hand, vulnerability scanning is the act of identifying potential vulnerabilities in network devices such as firewalls, routers, switches, servers and applications. It is automated and focuses on finding potential and know vulnerabilities on the network or an application level. It does not exploit the vulnerabilities. Vulnerability scanners only identify potential vulnerabilities; they do not exploit the vulnerabilities. Hence, they are not built to find zero-day exploits. The scope of vulnerability scanning is business-wide, requiring automated tools to manage a high number of assets. It is wider in scope than penetration testing. Products specific knowledge is needed to effectively use the vulnerability scans product. It is usually run by administrators or security personnel with good networking knowledge.

Vulnerability scans can be run frequently on any number of assets to ascertain known vulnerabilities are detected and patched. Thus, you can eliminate more serious vulnerabilities for your valuable resources quickly. An effective way to remediate vulnerabilities is to follow the vulnerability management lifecycle. The cost of a vulnerability scan is low to moderate as compared to penetration testing, and it is a detective control as opposed to preventive like penetration testing.

Vulnerability management can be fed into patch management for effective patching. Patches must be tested on a test system before rolling out to production.

Limitations of a vulnerability scan 

False positives

Businesses must manually check each vulnerability before testing again

Does not confirm that a vulnerability is exploitable

See Also: Picking Your Vulnerability Scanner: The Questions You Should Ask


Which is better? A vulnerability scan or penetration test?

Both tests work together to encourage optimal network and application security. Vulnerability scans are great weekly, monthly, or quarterly insight into your network security (the quick X-ray), while penetration tests are a very thorough way to deeply examine your network security (the periodic detailed MRI). Yes, penetration tests are expensive, but you are paying a professional to examine every nook and cranny of your business the way a real world attacker would, to find a possibility of compromise.

Vulnerability In LibreOffice And OpenOffice Allows For Spoofing Digital Signatures

 LibreOffice, OpenOffice Vulnerability Patched Recently what happens, a severe vulnerability threatening the validity of digital signatures ...