19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

322<br />

Part VI: Ethical Hacking Aftermath<br />

Table 16-1 Prioritizing Vulnerabilities<br />

High<br />

Impact<br />

Medium<br />

Impact<br />

Low<br />

Impact<br />

High Likelihood Medium Likelihood Low Likelihood<br />

Sensitive information<br />

stored on<br />

an unencrypted<br />

laptop<br />

Unencrypted<br />

e-mails containing<br />

sensitive<br />

information<br />

being sent<br />

Outdated virus<br />

signatures on a<br />

standalone PC<br />

dedicated to<br />

Internet browsing<br />

Tape backups taken<br />

offsite that are not<br />

encrypted and/or<br />

password protected<br />

Missing Windows patch<br />

on internal server that<br />

can be exploited using<br />

Metasploit<br />

Cleaning crew personnel<br />

gaining unauthorized<br />

network access<br />

No admin password<br />

on a SQL<br />

Server system<br />

No passwords<br />

required on several<br />

Windows<br />

administrator<br />

accounts<br />

Weak SSL<br />

encryption being<br />

exploited on<br />

e-commerce site<br />

The vulnerability prioritization shown in Table 16-1 is based on the qualitative<br />

method of assessing security risks. In other words, it’s subjective, based<br />

on your knowledge of the systems and vulnerabilities. You can also consider<br />

any risk ratings you get from your security tools — just don’t rely solely on<br />

them, because a vendor can’t provide ultimate rankings of vulnerabilities.<br />

Creating Reports<br />

You may need to organize your vulnerability information into a formal document<br />

for management or for your client. This is not always the case, but it’s<br />

often the professional thing to do and shows that you take your work seriously.<br />

Ferret out the critical findings and document them so that other parties can<br />

understand them.<br />

Graphs and charts are a plus. Screen captures of your findings — especially<br />

when it’s difficult to save the data to a file — can add a nice touch to your<br />

reports and show tangible evidence that the problem exists.<br />

Document the vulnerabilities in a concise, nontechnical manner. Every report<br />

should contain the following information:<br />

✓ Date(s) the testing was performed<br />

✓ Tests that were performed

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!