Hello GreenHackerz..
I hope you all enjoy & learn to be with Us..
Today I'm going to write something about Vulnerability, Vulnerability Assessment & Vulnerability Assessment Tools.. Hope you like it..
So Let's Start..
Vulnerability
In computer security, a vulnerability
is a weakness which allows an attacker to reduce a system's information assurance.
Vulnerability is the intersection of three elements :
Vulnerability is the intersection of three elements :
(1) A system
susceptibility or flaw
(2) Attacker access to the flaw
(3) Attacker capability to
exploit the flaw
To be vulnerable, an attacker must have at least one
applicable tool or technique that can connect to a system weakness. In this
frame, vulnerability is also known as the attack surface.
Vulnerability Assessment
A vulnerability assessment
is the process of identifying, quantifying, and prioritizing (or ranking) the
vulnerabilities in a system.
Web Vulnerability Assessment Essentials:
Your First Step to a Highly Secure Web Site
If an
organization isn't taking a systematic and proactive approach to web security, and
to running a web application vulnerability assessment in particular, then that organization
isn't defended against the most rapidly increasing class of attacks. Webbased attacks
can lead to lost revenue, the theft of customers' personally identifiable financial
information, and falling out of regulatory compliance with a multitude of government
and industry mandates: the Payment Card Industry Data Security Standard (PCI)
for merchants, HIPAA for health care organizations, or Sarbanes- Oxley for
publicly traded companies. In fact, the research firm Gartner estimates that 75
percent of attacks on web security today are aimed straight at the application
layer.
Just
What Is a Web Application Vulnerability Assessment?
A web
application vulnerability assessment is the way you go about identifying the mistakes
in application logic, configurations, and software coding that jeopardize the availability
(things like poor input validation errors that can make it possible for an attacker
to inflict costly system and application crashes, or worse), confidentiality (SQL
Injection attacks, among many other types of attacks that make it possible for attackers
to gain access to confidential information), and integrity of your data (certain
attacks make it possible for attackers to change pricing information, forexample).
Web application
vulnerability scanners are very good at what they do: identifying technical
programming mistakes and oversights that create holes in web security. These
are coding errors, such as not checking input strings, or failure to properly filter
database queries, that let attackers slip on in, access confidential
information, and even crash your applications. Vulnerability scanners automate
the process of finding these types of web security issues; they can tirelessly
crawl through an application performing a vulnerability assessment, throwing
countless variables into input fields in a matter of hours, a process that
could take a person weeks to domanually.
How
to Conducting Your Vulnerability Assessment?
To Conduct Web Vulnerability Assessment you must
use Acunetix Web Vulnerability Scanner.
You can Download Acunetix Web Vulnerability Scanner from HERE
Acunetix Web Vulnerability Scanner
Introduction :-
- Acunetix web vulnerability scanner is a tool designed to discover security holes in your web applications that an attacker would likely abuse to gain illicit access to your systems and data. It looks for multiple vulnerabilities including SQL injection, cross site scripting, and weak passwords.
- The application can be used to perform scanning for web and application vulnerabilities and to perform penetration testing against the identified issues. Mitigation suggestions are then provided for each weakness and can be used to increase the security of the web server or application being tested.
Graphical Interfaces :
- The Scan Wizard allows you to quickly set-up an automated crawl and scan of your website. An automated scan provides a comprehensive and deep understanding of the level website security by simply reviewing the individual alerts returned.
- NOTE: DO NOT SCAN A WEBSITE WITHOUT PROPER AUTHORISATION! The web server logs will show the scans and any attacks made by Acunetix WVS. If you are not the sole administrator of the website please make sure to warn other administrators before performing a scan. Some scans might cause a website to crash requiring a restart of the website.
Select
Target(s) to Scan:
- Scan single website - Scans a single website. Enter a URL, e.g. http://testphp.acunetix.com, https://.testaspnet.acunetix.com.
- Scan using saved crawling results - If you previously performed a crawl on a website and saved the results, you can analyze these results directly without having to crawl the site again. Specify the ‘Saved crawler results’ file by clicking on the folder button.
- Scan List of Websites - Scans a list of target websites specified in a plain text file (one target per line). Every target in the file is to be specified in the format <URL> or <URL:port> if the web server is listening on a non default port. The maximum number of websites Acunetix WVS can scan at 1 time is between 20 and 30 sites; depending on the size of the websites.
- Scan Range of Computers - This will scan a specific range of IP's (e.g. 192.168.0.10-192.168.0.200) for target sites which are open on the specified ports (Default 80, 81 and 443).
(3) Click
'Next' to continue.
Confirm
Targets and Technologies Detected:
- Acunetix WVS will automatically probe the target website(s) for basic details such as operating system, web server, web server technologies and whether a custom error page is used (For more details on Custom Error Pages refer to page 26 of this manual).
- The web vulnerability scanner will optimize the scan for the selected technologies and use these details to reduce the number of tests performed which are not applicable (e.g. Acunetix WVS will not probe IIS tests on a UNIX system). This will reduce scanning time.
- Click on the relevant field and change the settings from the provided check boxes if you would like to add or remove scans for specific technologies
Confirm
Targets and Technologies Detected:
Scanning
Profile:
The Scanning Profile will determine which
tests are to be carried out against the target site. For example, if you only
want to test your website(s) for SQL injection, select the profile
sql_injection and no additional tests would be performed.
Pros:
- Quick scanning
- Specify custom error pages
- Combines many tools into one application
- High detection rate of vulnerabilities
- Does not overrate minor vulnerabilities
Cons:
- Reporting is not robust
- Target identifier appeared to be buggy
- Could use some interface tweaks
Hope you all like this... @@@@




