SlideShare a Scribd company logo
Automated Vulnerability
Assessment and
Management
whoami!
β€’ Bug Hunter on Internet – disclosed vulnerability @Google, @Facebook,
@Twitter etc.
β€’ I’m Anand Tiwari
β€’ Pentester – WebApp, MobApp & Network
β€’ Working @ Philips Healthcare on Securing Medical Devices.
β€’ 5+ Years of Experience in InfoSec.
β€’ I love Automation for repeated work.
agenda
β€’What is Vulnerability Assessment & Management.
β€’Archery - Open Source VA/VM Tool.
β€’Challenges in VA/VM.
β€’How Archery works ?
β€’Automated Web Application Dynamic Scanning.
β€’Demo time.
β€’Roadmap
β€’How to Contribute ?
β€’Q/A
Source - Google
Vulnerability Assessment.
Vulnerability Management.
Source - Google
Automated Vulnerability Assessment and Management
Challenges in VA/VM
β€’ Multiple scanners.
β€’ Manage huge list of vulnerabilities.
β€’ Analysis and removing false positive.
β€’ Prioritising vulnerabilities.
β€’ Tracking vulnerability mitigation.
β€’ Organizing Periodic scans.
Archery - Open Source VA/VM Tool.
β€’ Open Source Vulnerability Assessment and Management Tool.
β€’ Automate Vulnerability Scanners.
β€’ Vulnerability data Dashboard.
β€’ Helping you on Managing & Prioritising Vulnerabilities.
β€’ Useful for Pentesters & Developers.
β€’ Easy to integrate in CI/CD environment.
β€’ Build in Python using Django.
How Archery works ?
Scanners
Archery	Result	Parsing
Archery	Database
ZAP	Data
Burp	Data
OpenVAS	Data
Dashboard
Web Application Dynamic Authenticated scanning.
Input URL
Cookies db
ZAP Replacer
ZAP Scanner
Selenium Webdriver
Demo
Roadmap
β€’ More open source and commercial tool plugin support.
β€’ API Scanning and management.
β€’ Mobile Vulnerability Management.
β€’ Vulnerability PoC pictures.
β€’ Cloud security scanning.
β€’ Reporting Format.
How to Contribute ?
β€’ Test Archery Tool
β€’ Write scanners plugin or suggest us scanner
support.
β€’ Use / Promote / write about the tool.
β€’ Report issue & feedback @ https://github.com/
archerysec/archerysec/issues
Documentation
β€’ http://www.archerysec.info
β€’ https://archerysec.github.io/archerysec/
β€’ https://archerysec.github.io/archerysecapi/
Contact
β€’ Twitter - https://twitter.com/archerysec
β€’ Facebook - https://www.facebook.com/
ArcherySec/
β€’ GitHub - https://github.com/archerysec/
Automated Vulnerability Assessment and Management

More Related Content

Similar to Automated Vulnerability Assessment and Management (20)

PPTX
DevSecCon Singapore 2018 - Pushing left like a boss by Tanya Janca
DevSecCon
Β 
PPTX
Bug bounties - cΓ©n scΓ©al?
Ciaran McNally
Β 
ODP
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Matt Tesauro
Β 
PPTX
Application security in a hurry webinar
kdinerman
Β 
PPSX
Scaling-up and Automating Web Application Security Tech Talk
Netsparker
Β 
PDF
App testing and publishing
Niall Roche
Β 
PPTX
Risk Mitigation Using Exploratory and Technical Testing | QASymphony Webinar
QASymphony
Β 
PPTX
How to Get the Most Out of Security Tools
Security Innovation
Β 
PDF
Thomas Haver - Mobile Testing.pdf
QA or the Highway
Β 
ODP
Building an Open Source AppSec Pipeline
Matt Tesauro
Β 
PPTX
Manual JavaScript Analysis Is A Bug
Lewis Ardern
Β 
PDF
Malware Detection - A Machine Learning Perspective
Chong-Kuan Chen
Β 
PPT
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
Jason Hong
Β 
PPTX
Application security in a hurry webinar
kdinerman
Β 
PDF
Web testing
QA Club Kiev
Β 
PDF
Web testing
Svitlana Dubyk
Β 
PDF
Strategies for Mobile Web Application Testing
TechWell
Β 
PPT
Quality Spy Overview
AndreasKleffel
Β 
PDF
Visual studio 2015 - Application Insights
Delta-N
Β 
PDF
AppSec in an Agile World
David Lindner
Β 
DevSecCon Singapore 2018 - Pushing left like a boss by Tanya Janca
DevSecCon
Β 
Bug bounties - cΓ©n scΓ©al?
Ciaran McNally
Β 
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Matt Tesauro
Β 
Application security in a hurry webinar
kdinerman
Β 
Scaling-up and Automating Web Application Security Tech Talk
Netsparker
Β 
App testing and publishing
Niall Roche
Β 
Risk Mitigation Using Exploratory and Technical Testing | QASymphony Webinar
QASymphony
Β 
How to Get the Most Out of Security Tools
Security Innovation
Β 
Thomas Haver - Mobile Testing.pdf
QA or the Highway
Β 
Building an Open Source AppSec Pipeline
Matt Tesauro
Β 
Manual JavaScript Analysis Is A Bug
Lewis Ardern
Β 
Malware Detection - A Machine Learning Perspective
Chong-Kuan Chen
Β 
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
Jason Hong
Β 
Application security in a hurry webinar
kdinerman
Β 
Web testing
QA Club Kiev
Β 
Web testing
Svitlana Dubyk
Β 
Strategies for Mobile Web Application Testing
TechWell
Β 
Quality Spy Overview
AndreasKleffel
Β 
Visual studio 2015 - Application Insights
Delta-N
Β 
AppSec in an Agile World
David Lindner
Β 

More from ITEM (20)

PPTX
ВСстированиС искусствСнного ΠΈΠ½Ρ‚Π΅Π»Π»Π΅ΠΊΡ‚Π°: с ΠΊΠ°ΠΊΠΎΠΉ стороны ΠΏΠΎΠ΄ΡΡ‚ΡƒΠΏΠΈΡ‚ΡŒΡΡ?
ITEM
Β 
PPTX
Π‘Π΄Π΅Π»Π°Ρ‚ΡŒ свой ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚, ΠΈΠ»ΠΈ ΡƒΠ±ΠΈΡ‚ΡŒ Π² сСбС пСрфСкциониста
ITEM
Β 
PPTX
Upwork as a service company incubator
ITEM
Β 
PPTX
Как Π³Π»ΠΎΠ±Π°Π»ΡŒΠ½Ρ‹Π΅ Ρ‚Ρ€Π΅Π½Π΄Ρ‹ ΠΈ ΠΈΠ½Π½ΠΎΠ²Π°Ρ†ΠΈΠΈ ΠΏΠΎΠ²Π»ΠΈΡΡŽΡ‚ Π½Π° аутсорсинг Π² Π£ΠΊΡ€Π°ΠΈΠ½Π΅
ITEM
Β 
PDF
Π’Π½Π΅Π΄Ρ€Π΅Π½ΠΈΠ΅ Π»ΠΎΠΊΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… сСрвисов: тСория vs ΠΏΡ€Π°ΠΊΡ‚ΠΈΠΊΠ°
ITEM
Β 
PDF
Как ΠΏΠΎΠ½ΡΡ‚ΡŒ Π² ΠΊΠΎΠ³ΠΎ Π²ΠΊΠ»Π°Π΄Ρ‹Π²Π°Ρ‚ΡŒ дСньги?
ITEM
Β 
PDF
Как аутсорсинговыС ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΈ свои ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚Ρ‹ Ρ€Π°Π·Ρ€Π°Π±Π°Ρ‚Ρ‹Π²Π°Π»ΠΈ ΠΈ Ρ‡Ρ‚ΠΎ ΠΈΠ· этого Π²Ρ‹ΡˆΠ»ΠΎ.
ITEM
Β 
PDF
Π’Π½ΡƒΡ‚Ρ€Π΅Π½Π½ΠΈΠ΅ стартапы. Π”ΠΎΠ»Π³ΠΎ, Π΄ΠΎΡ€ΠΎΠ³ΠΎ, Π½ΠΈΠΊΠΎΠ³Π΄Π°.
ITEM
Β 
PDF
First steps in digitalization and modernization of (huge) non-IT company
ITEM
Β 
PDF
Redesign of management methodologies
ITEM
Β 
PDF
Through Trial and Error: How to Prepare a Trainee to the Wild World of Custom...
ITEM
Β 
PDF
ВСрнистый ΠΏΡƒΡ‚ΡŒ ΠΊ самоорганизации
ITEM
Β 
PDF
Lessons learned scrum mastering distributed teams
ITEM
Β 
PPTX
ΠŸΡ€Π΅Π²Ρ€Π°Ρ‰Π°Ρ риски Π² ΠΏΡ€ΠΎΠ΄Π°ΠΆΠΈ
ITEM
Β 
PPTX
Internet marketing for IT companies
ITEM
Β 
PPTX
Success of foreign investment attraction by outsource/service companies.
ITEM
Β 
PPTX
Outsourcing is a dead-end
ITEM
Β 
PDF
Communication with clients
ITEM
Β 
PDF
Harnessing the creative genius within your organization
ITEM
Β 
PDF
Service Blueprinting Workshop
ITEM
Β 
ВСстированиС искусствСнного ΠΈΠ½Ρ‚Π΅Π»Π»Π΅ΠΊΡ‚Π°: с ΠΊΠ°ΠΊΠΎΠΉ стороны ΠΏΠΎΠ΄ΡΡ‚ΡƒΠΏΠΈΡ‚ΡŒΡΡ?
ITEM
Β 
Π‘Π΄Π΅Π»Π°Ρ‚ΡŒ свой ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚, ΠΈΠ»ΠΈ ΡƒΠ±ΠΈΡ‚ΡŒ Π² сСбС пСрфСкциониста
ITEM
Β 
Upwork as a service company incubator
ITEM
Β 
Как Π³Π»ΠΎΠ±Π°Π»ΡŒΠ½Ρ‹Π΅ Ρ‚Ρ€Π΅Π½Π΄Ρ‹ ΠΈ ΠΈΠ½Π½ΠΎΠ²Π°Ρ†ΠΈΠΈ ΠΏΠΎΠ²Π»ΠΈΡΡŽΡ‚ Π½Π° аутсорсинг Π² Π£ΠΊΡ€Π°ΠΈΠ½Π΅
ITEM
Β 
Π’Π½Π΅Π΄Ρ€Π΅Π½ΠΈΠ΅ Π»ΠΎΠΊΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… сСрвисов: тСория vs ΠΏΡ€Π°ΠΊΡ‚ΠΈΠΊΠ°
ITEM
Β 
Как ΠΏΠΎΠ½ΡΡ‚ΡŒ Π² ΠΊΠΎΠ³ΠΎ Π²ΠΊΠ»Π°Π΄Ρ‹Π²Π°Ρ‚ΡŒ дСньги?
ITEM
Β 
Как аутсорсинговыС ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΠΈ свои ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚Ρ‹ Ρ€Π°Π·Ρ€Π°Π±Π°Ρ‚Ρ‹Π²Π°Π»ΠΈ ΠΈ Ρ‡Ρ‚ΠΎ ΠΈΠ· этого Π²Ρ‹ΡˆΠ»ΠΎ.
ITEM
Β 
Π’Π½ΡƒΡ‚Ρ€Π΅Π½Π½ΠΈΠ΅ стартапы. Π”ΠΎΠ»Π³ΠΎ, Π΄ΠΎΡ€ΠΎΠ³ΠΎ, Π½ΠΈΠΊΠΎΠ³Π΄Π°.
ITEM
Β 
First steps in digitalization and modernization of (huge) non-IT company
ITEM
Β 
Redesign of management methodologies
ITEM
Β 
Through Trial and Error: How to Prepare a Trainee to the Wild World of Custom...
ITEM
Β 
ВСрнистый ΠΏΡƒΡ‚ΡŒ ΠΊ самоорганизации
ITEM
Β 
Lessons learned scrum mastering distributed teams
ITEM
Β 
ΠŸΡ€Π΅Π²Ρ€Π°Ρ‰Π°Ρ риски Π² ΠΏΡ€ΠΎΠ΄Π°ΠΆΠΈ
ITEM
Β 
Internet marketing for IT companies
ITEM
Β 
Success of foreign investment attraction by outsource/service companies.
ITEM
Β 
Outsourcing is a dead-end
ITEM
Β 
Communication with clients
ITEM
Β 
Harnessing the creative genius within your organization
ITEM
Β 
Service Blueprinting Workshop
ITEM
Β 
Ad

Recently uploaded (20)

PPTX
Practical Applications of AI in Local Government
OnBoard
Β 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
Β 
PDF
Java 25 and Beyond - A Roadmap of Innovations
Ana-Maria Mihalceanu
Β 
PDF
My Journey from CAD to BIM: A True Underdog Story
Safe Software
Β 
PDF
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
Β 
PDF
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
Β 
PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
Β 
DOCX
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
Β 
PDF
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
Β 
PDF
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
Β 
PDF
FME as an Orchestration Tool with Principles From Data Gravity
Safe Software
Β 
PDF
99 Bottles of Trust on the Wall β€” Operational Principles for Trust in Cyber C...
treyka
Β 
PDF
DoS Attack vs DDoS Attack_ The Silent Wars of the Internet.pdf
CyberPro Magazine
Β 
PDF
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
Β 
PDF
ArcGIS Utility Network Migration - The Hunter Water Story
Safe Software
Β 
PDF
Dev Dives: Accelerating agentic automation with Autopilot for Everyone
UiPathCommunity
Β 
PPTX
Mastering Authorization: Integrating Authentication and Authorization Data in...
Hitachi, Ltd. OSS Solution Center.
Β 
PDF
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
Β 
PPTX
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
Cristian Garcia G.
Β 
PPTX
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
Β 
Practical Applications of AI in Local Government
OnBoard
Β 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
Β 
Java 25 and Beyond - A Roadmap of Innovations
Ana-Maria Mihalceanu
Β 
My Journey from CAD to BIM: A True Underdog Story
Safe Software
Β 
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
Β 
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
Β 
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
Β 
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
Β 
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
Β 
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
Β 
FME as an Orchestration Tool with Principles From Data Gravity
Safe Software
Β 
99 Bottles of Trust on the Wall β€” Operational Principles for Trust in Cyber C...
treyka
Β 
DoS Attack vs DDoS Attack_ The Silent Wars of the Internet.pdf
CyberPro Magazine
Β 
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
Β 
ArcGIS Utility Network Migration - The Hunter Water Story
Safe Software
Β 
Dev Dives: Accelerating agentic automation with Autopilot for Everyone
UiPathCommunity
Β 
Mastering Authorization: Integrating Authentication and Authorization Data in...
Hitachi, Ltd. OSS Solution Center.
Β 
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
Β 
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
Cristian Garcia G.
Β 
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
Β 
Ad

Automated Vulnerability Assessment and Management

  • 2. whoami! β€’ Bug Hunter on Internet – disclosed vulnerability @Google, @Facebook, @Twitter etc. β€’ I’m Anand Tiwari β€’ Pentester – WebApp, MobApp & Network β€’ Working @ Philips Healthcare on Securing Medical Devices. β€’ 5+ Years of Experience in InfoSec. β€’ I love Automation for repeated work.
  • 3. agenda β€’What is Vulnerability Assessment & Management. β€’Archery - Open Source VA/VM Tool. β€’Challenges in VA/VM. β€’How Archery works ? β€’Automated Web Application Dynamic Scanning. β€’Demo time. β€’Roadmap β€’How to Contribute ? β€’Q/A
  • 7. Challenges in VA/VM β€’ Multiple scanners. β€’ Manage huge list of vulnerabilities. β€’ Analysis and removing false positive. β€’ Prioritising vulnerabilities. β€’ Tracking vulnerability mitigation. β€’ Organizing Periodic scans.
  • 8. Archery - Open Source VA/VM Tool. β€’ Open Source Vulnerability Assessment and Management Tool. β€’ Automate Vulnerability Scanners. β€’ Vulnerability data Dashboard. β€’ Helping you on Managing & Prioritising Vulnerabilities. β€’ Useful for Pentesters & Developers. β€’ Easy to integrate in CI/CD environment. β€’ Build in Python using Django.
  • 9. How Archery works ? Scanners Archery Result Parsing Archery Database ZAP Data Burp Data OpenVAS Data Dashboard
  • 10. Web Application Dynamic Authenticated scanning. Input URL Cookies db ZAP Replacer ZAP Scanner Selenium Webdriver
  • 11. Demo
  • 12. Roadmap β€’ More open source and commercial tool plugin support. β€’ API Scanning and management. β€’ Mobile Vulnerability Management. β€’ Vulnerability PoC pictures. β€’ Cloud security scanning. β€’ Reporting Format.
  • 13. How to Contribute ? β€’ Test Archery Tool β€’ Write scanners plugin or suggest us scanner support. β€’ Use / Promote / write about the tool. β€’ Report issue & feedback @ https://github.com/ archerysec/archerysec/issues
  • 15. Contact β€’ Twitter - https://twitter.com/archerysec β€’ Facebook - https://www.facebook.com/ ArcherySec/ β€’ GitHub - https://github.com/archerysec/