Vulnerability Assessment Checklist

Vulnerability Assessment Checklist

A vulnerability assessment is a process that identifies and assigns severity levels to security vulnerabilities in Web applications that a malicious actor can potentially exploit. The assessment is conducted manually and augmented by commercial or open source vulnerability scanning tool to guarantee maximum coverage.

This essential checklist is your playbook when it comes to comprehensively testing a Web application for security flaws:

Before the assessment

        Conduct test preparation meetings.  Present the full demo of the application and clear the scope of the upcoming penetration test. With a team discuss the test environment setup.

        Construct a threat model.  Plan and Concentrate on Targeted areas so as to find the more number of high vulnerabilities within the short time frame.

        Carry out developer interviews. Obtain in-depth knowledge of the application.

        Verify test environment details. Confirm the URL(s), VPN access, credentials, etc.

Automated dynamic scanning

        Choose automated scanning method.  Select an appropriate commercial or best open source security scanning tool, depending on the application framework, that ensures maximum coverage (e.g., vooki, yaazhini,.).

        Scan the application. Scan and find the maximum vulnerabilities with this testing tool.

Manual testing

        Conduct injection and XSS testing. Check for the presence of injection flaws like XML, LDAP injections, JSON, and SQL. Test for cross-site scripting (XSS) through all input points for the application. Determine whether the forms are submitted securely, without tamper.

        Administer authentication and authorization tests. Inspect for inadequate authentication methods, improper access control definitions, and broken login processes.

        Audit session management. Review for secure session IDs/cookies. Search for instances of cross-site request forgery (CSRF).

        Investigate sensitive information exposure. Confirm that no sensitive information is revealed due to improper storage of NPI data, broken error handling, insecure direct object references, and comments in source code.

        Examine secure configuration. Guarantee that security configurations aren’t defined and deployed with default settings.

        Run transport layer security testing. Ensure that there aren’t any broken encryption algorithms and that ciphers are used to secure the communication channels.

        Carry out application spidering. Explore the application for unconventional ways to bypass security controls.

During testing

        Triage results. Verify scan results manually to separate true positives from false positives.

        Collect evidence. Take appropriate screenshots, or otherwise record the steps, to reproduce an exploit and accurately create a proof of concept.

After testing

        Complete report writing. Use a standard template to create a report of all the findings as per their risk rating.

        Conduct stakeholder communication. Allow testers to help various stakeholders to understand and justify the risk associated with each of the findings.

As you can see, a holistic application security program includes a combination of various secure processes and practices.

Once the project is scoped out, your team needs to know which areas within the application have high-severity vulnerabilities.

So how can you get the project rolling?  Kick off your next vulnerability assessment with a threat model and lead your team to victory over security vulnerabilities.


    • Related Articles

    • Top Mistakes when Performing a Web Vulnerability Assessment

      Last year, according to security vendor Secunia, statistics says the no of vulnerabilities detected in commercial software’s found over 15500 in total 3870 Products. Unfortunately, many vulnerabilities remain open for many weeks, or even years as ...
    • Web Application Vulnerability Scanner

      Hello Ladies & Gentleman, Here we came with the new topic `Web Application Vulnerabilities` and how do we scan it using the tool. So without any delay lets get to the topic What is Web Application Vulnerability ? The vulnerability is a weakness which ...
    • RESTAPI Vulnerability Scanner

      Hi, This post is regarding VOOKI – RESTAPI Vulnerability Scanner. Before you learn about RESTAPI Vulnerability Scanner. You need to learn few things please read below. First, we learn about what is Web Service? WEB SERVICE: A web service is a ...
    • Network Vulnerability Scanning

      Vulnerability scanning is an inspection of the potential points of exploit on a computer or network to identify security holes. A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and ...
    • How to improve Web Application Security

      Web application security is one major element in web app development that that often gets overlooked. It’s understandable. Business websites and applications need to be as accessible yet robust as possible, but this presents a huge range of security ...