An Understanding with Vulnerability Assessment And Penetration Testing (VAPT)

Sep 9
08:27

2015

Nadeem Akhatar

Nadeem Akhatar

  • Share this article on Facebook
  • Share this article on Twitter
  • Share this article on Linkedin

VAPT is always understand in two parts. First part is VA i.e Vulnerability assessment and second part is penetration testing. VAPT is a process in which the Information Management like networks, Computers and other peripherals are scanned to detect and identify the associated vulnerabilities in the systems.

mediaimage

Presently surveys reflects that more than 82% of the websites having the vulnerabilities and more than 80% IP are having the vulnerabilities which can lead to the leakage or misappropriation of the Information and data base and heavy loses can occur to the companies.

Network Vulnerability Assessment & Penetration Testing (VAPT) is two types of network security testing in which vulnerabilities within a network security system are discovered and further these vulnerabilities are exploited to show the severity of the threat. In simple words,An Understanding with Vulnerability Assessment And Penetration Testing (VAPT) Articles through vulnerability assessment security risks are identified and through Penetration Testing these are exploited to show the potential risk.

There are mainly three categories for VAPT as follows

White Box Testing:  

This is also called Internal Testing It is the testing which performing a test within the network and having the prior knowledge of the network system and architecture.

Black Box Testing:

This is also called as the external testing . It is testing from an external network and there is no any prior knowledge of the internal system, network and architecture.

Gray Box Testing:

This is also called mixed testing because it is the combination of the black box and white box testing. It is testing of the internal or external network with the knowledge of internal system, network and architecture.

WHAT ARE BENEFITS OF VAPT

 

  • Identifies all the loop holes within your network security system
  • Provides you the solution for each threats and loopholes
  • Gives you a clear picture about your organization’s network security system
  • Ensure the complete safety of your business information and data
  • Restricts the unauthorized access to confidential data

PROCESS OF VAPT

 There are several stepto conduct by which Indicium Assessment Private Limited (IAPL) conduct the VAPT

 

  1. INFORMATION GATHERING

This is the first step in which IAPL gather the information of the system or the network for which the testing shall be done like OS version, IP address.This is applicable to all type of testing

 

  1. VULNERABILITY DETECTION

To detect the vulnerability IAPL run some tools on the network like scanner and find out which type and how many vulnerabilities are associated with the network

  1. INFORMATION ANALYSIS AND PENETRATION TESTING

It is used to identify and analyze associated vulnerabilities with the network and information gathered about the IT environment systems. After completion it IAPl is able to make a plan for penetrating into the system and network through the process of Penetration Testing. In the penetration testing process, the target IP, OS or systems are attacked again and again and penetrated using the plan applied in the earlier process.

 

  1. PRIVILEGE ESCALATION

After the completion of penetration into the system, IAPL used the privilege escalation technique is used to escalate and identify | access to achieve higher privileges, such as administrative privilege, root or registry access or to that IT network or environment system.

 

  1. RESULT ANALYSIS AND CLEANUP

At the end IAPL conduct the root cause analysis is performed which leads to a successful compromise to the system leading to penetration testing and providing suitable recommendations in order to make the system secure by plugging the grey areas and weakness in the system.