CyberintelSys VAPT Approach Paper
CyberintelSys VAPT Approach Paper
www.cyberintelsys.com
[email protected]
Executive Summary
1. The requirement to secure today’s network services is no longer focused on securing the
perimeter alone. ‘Defence in depth’ is the challenge organizations are facing. Additionally, the
frequency and level of sophistication of attacks has grown spectacularly over the last couple of
years, whilst at the same time, the level of skills and knowledge required to carry out these attacks
has decreased.
2. In order to keep up with the risk of attacks, organisations need to utilise professional
expertise to secure their infrastructure and applications. Cyberintelsys offers services that help
mitigating the risk of security breaches:
3. Cyberintelsys’s work plan is aligned to your needs and operates proactively to identify
threats in all external or internal access points and suggest clear remediation options. Our
approach can be summarised as follows:
• We establish the scope, so that you can control the effects of any possible test in time and
space. We also agree upfront on escalation and incident management procedures in case
tests yield a noticeable operational effect.
• We document the type of attacks, the applications, the data and the potential weaknesses
you are most concerned about. Our experience has shown that every company has its
unique risk profile that drives the type, scope and level of hostility of our tests.
• We determine and scan for the systems, network components, and wireless connection
points visible from the attack points. Our experience has shown that this type of discovery
generally leads to surprises that confirm the need of attack and penetration testing.
• We conduct a wide range of vulnerability scans and simulated attacks using various
methodologies and tools. All tests are bound by the agreed time-table and scope and by
the Cyberintelsys policy and service agreement. This ensures that the tests don’t miss
anything and yet do not harm your normal operations.
A combination of Internet based and inside-the-DMZ tests ensure complete coverage and allows
you to understand the vulnerability level in case of faulty configuration or maintenance later on.
2. Our ability to act as advisor and partner to help you resolve vulnerabilities in a vendor-agnostic
(but knowledgeable) way.
3. We deliver reports that are to-the-point, that answer the 'so-what?' questions and provide clear
guidance on how to solve the issues at hand.
4. All penetration tests are performed by Cyberintelsys professionals to limit your exposure and
disclosure.
5. Our professionals arrive at their conclusions by using the same tools and techniques as rogue
hackers, and by following a pragmatic and project-oriented approach to ensure predictability and
consistency.
6. Selected hosts or networks are targeted carefully, to protect the integrity of critical systems,
data and applications and keep any side-effect on other hosts to an absolute minimum.
2. We shall undertake the VAPT as a professional and comprehensive solution and could include:
• Assist the client to prepare for the VAPT
• The development of VAPT plans
• The conduct of the VAPT and the analysis, documentation, and reporting of the results
• Post-assessment follow-on activities.
Our Methodology
10. 1. The Cyberintelsys methodology for engagement is completely based upon the
customer’s requirement and can be tailor-made to meet the client’s expectation. Prior
to the beginning of the assessment, we will work with the client to develop a detailed
and mutually agreeable assessment plan. The following methodology will be leveraged:
We shall perform the vulnerability assessment and attempt exploitation of the client’s application
in a controlled environment. We shall attempt to identify and exploit vulnerabilities present in the
applications under scope as per the methodology brought out in the subsequent paragraphs.
(a) Understanding: This includes gathering information associated with the
application and the related infrastructure from different sources. We shall understand the
following
• Business Logic
• Application
• Associated Threats
(b) Assessment: The application is assessed using automated tools and manual
techniques in order to identify Vulnerabilities present. This assessment shall include
automated and manual tools along with black box testing of the application.
We shall perform the vulnerability assessment and attempt exploitation of the client’s IT
infrastructure in a controlled environment. We shall attempt to identify and exploit vulnerabilities
present in the infrastructure under scope as per the methodology brought out in the subsequent
paragraphs.
Collection: We shall collect actively and/or passively the information regarding the
client’s infrastructure. This shall include public sources as well as through discussions with
the client.
Evaluation: The information collected would be assessed and vulnerabilities identified
using commercially available tools.
Exploit:The identified vulnerabilities would be exploited. This stage requires active
involvement of the client to allow / disallow the exploitation of the vulnerabilities. Care
would be taken so as to ensure no disruption to the client’s business.
Analysis:This involves bringing together the intellectual property of Cyberintelsys
Consultants experience, the commercial and non-commercial tool results, and the manual
techniques. The discovered vulnerabilities are correlated so as to provide the client with a
deep insight into the attack surface. Root cause analysis would also be undertaken to
discover the reason for the existence of the vulnerability.
Reporting: All discovered vulnerabilities are reported in a comprehensive technical
report. The report shall include a root cause categorisation and proposed remediation
plans.
Quality Control
Quality control is integral to our project management methodology, and as such our activities and
deliverables will be closely followed and reviewed to confirm that they comply with our
professional delivery standards
Issue management
Cyberintelsys has a process in place to identify issues and resolve them before they hurt the
project. Our approach to issue management includes processes that will be used to identify,
control, and resolve issues throughout the engagement.
Stakeholder communications
Our clients will have constant access to our management in order to be able to escalate any issues.
Client Stake Holder Serves/Applications as the project sponsor and highest point
of escalation for strategic and tactical direction of the project
Cyberintelsys Project Manager Monitors and provides feedback regarding project direction,
project management effectiveness and project status.
Makes strategic-level decisions and resolves issues in a timely
manner.
Provides quality assurance oversight and assists in risk
management.
Manages Technical resources and provides local on-site
testing.
Client Project Manager Responsible for working with the Cyberintelsys Project
Manager to confirm that people and resources are available
for the project team to conduct the work
Attends all status meetings and help in issue resolution
Cyberintelsys Remote Provides advanced technical testing capability for all security
Consultants assessments
We appreciate the importance of providing our clients with a comprehensive and inclusive report
as part of a successful engagement. The link between the IT risks and the associated business risk
would be clearly articulated in our reports. We have in depth capabilities to provide our clients
with tailor made reports as per the client requirement. All our reports shall consist of the following:
Overall risk classification: Each vulnerability or risk identified would be labelled as a finding
and categorized as a High-Risk, Medium-Risk, or Low-Risk. In addition, each supplemental
testing note is labelled as an Issue. These terms are defined below:
Medium
• These findings identify conditions that do not immediately or directly result in the
compromise or unauthorized access of a network, system, application or information,
but do provide a capability or information that could, in combination with other
• These findings identify conditions that do not immediately or directly result in the
compromise of a network, system, application, or information, but do provide
Low Risk information that could be used in combination with other information to gain insight
into how to compromise or gain unauthorized access to a network, system, application
or information. Low risk findings may also demonstrate an incomplete approach to or
application of security measures within the environment.
In addition, each issue identified is described with the finding, the impact of the issue, how easy it
would be for an attacker to exploit the issue and a recommendation. Each security issue is rated
based on a number of factors, each of these are described in the following sections.
Issue Finding: The issue finding describes what configuration setting we identified that
potentially poses a security threat. In addition to the finding details, any relevant background
information is also described.
Issue ease. Each identified issue shall be correlated to the knowledge, skill and physical
access that would be required of an attacker in order to exploit it. The ease will describe if open
source or commercially available tools are required for an attacker to exploit an issue. Additionally,
the ease will note where an extended period of time is required to exploit the issue, such as
cracking weak encryption ciphers.