Searching For Vulnerabilities - #CyberSecurity
Ichsan Budiman Putra, MOS, MTCNA
MOS | MTCNA | NSE 3 | Fullstack Web Developer | Cyber Security Learner | Cyber Security Awareness Content Creator on Tiktok "ichsanbudimanp" | Personal Article/Blog Writer
Hello everyone? from the articles before we discussed about Introduction to Basic of Cyber Security, so now let's dive deeper to understand cyber security. In this article we will talk explaination about "Searching for Vulnerabilities"
---before I continue I want to thank first for anyone who has subscribed to my newsletter,?I will try to provide the best material and presentation for cybersecurity learning in my newsletter I hope you guys can enjoy it---
Searching For Vulnerabilities
Quoted from?https://www.ncsc.gov.uk ?vulnerability is a weakness in an IT system that an attacker can exploit to produce a successful attack. They can occur through flaws, features, or user error, and an attacker will attempt to exploit any of them, often combining one or more, to achieve their ultimate goal.
and as shown in the poster above, searching for vulnerabilities is process can be performed by organizations or individuals responsible for system security, such as network administrators, software developers, or security researchers. Finding security vulnerabilities in a system is an important process in maintaining system security, as it can help organizations or individuals to find and fix security gaps before they are attacked by irresponsible attackers.?
A Security vulnerability is a weakness or loophole in a security system that can be exploited by unauthorized parties to access or damage information that is supposed to be protected. Security gaps can appear in various forms, such as bugs in software, errors in network configuration, weaknesses in passwords, and so on.
Security loopholes can be very dangerous because they can give unauthorized access to attackers to perform various adverse actions, such as stealing important information, changing or deleting data, damaging the system, or disseminating malware. In addition, security gaps can also be used as a gateway for more complex attacks, such as Advanced Persistent Threat (APT) or ransomware attacks. The act of exploiting a vulnerability is called an attack. The purpose of an attack is to gain access to a system,the data it stores, orto certain resources.
Searching for security vulnerabilities is the process of looking for weaknesses or loopholes in security systems that can be exploited by attackers to access or damage information that is supposed to be protected. This process can be performed by organizations or individuals responsible for system security, such as network administrators, software developers, or security researchers.
The first step in finding security gaps is to conduct a risk evaluation to identify the most vulnerable areas in the system. After that, security researchers can use various techniques, such as penetration testing, vulnerability scanning, or code review, to look for possible security gaps in the system.?
Security researchers can also use special tools or software that can help in finding security gaps automatically. However, this technique cannot always find all security gaps, so it is important for security researchers to use manual or creative techniques in searching for more complex security gaps.
Once a security flaw is found, the next step is to provide a report or notification to the system owner to take corrective action. This can be done by providing a detailed report of the security flaw along with remedial steps that can be done, or by conducting a live demonstration of how the security flaw can be exploited by attackers.
Security vulnerabilities can be divided into two types, namely hardware and software vulnerabilities. here is a detailed description of security vulnerabilities in hardware and software:?
A hardware vulnerability occurs when there is a weakness in the hardware used in the system. This can occur when hardware components are not properly designed or have manufacturing defects that cause security gaps in the system. Some examples of hardware vulnerabilities that can be exploited by attackers include:
One other example is RAM memory which consists of capacitors placed very close to each other. Because of such a location, changes that occur in one capacitor can affect adjacent capacitors. From this design flaw, an exploit called Rowhammer was created. This exploit allows retrieving data from nearby address memory cells, even if they have been protected, by repeatedly overwriting memory at the same address.?
However, vulnerabilities in hardware typically only occur in specific device models and are generally not exploited through random intrusion attempts. Although attacks on hardware occur more often in highly targeted attacks, standard protection from malware and physical security is quite sufficientfor ordinary users.
In some cases, hardware vulnerabilities may require physical repair or replacement of components to address the security gaps found. However, in some cases, software fixes or system settings may be enough to fix hardware-related security gaps.
2. Software Vulnerabilities A software vulnerability occurs when there is a weakness in the software or application used in the system. This can occur due to errors in the design or implementation of the software, or because the software is not updated regularly with the latest security patches. Some examples of software vulnerabilities that can be exploited by attackers include:
领英推荐
In 2015, a major vulnerability known as SYNful Knock was discovered on Cisco IOS. This vulnerability allows attackers to take control of enterprise routers such as the old 1841, 2811, and 3825 routers from Cisco. After successfully controlling the router, the attacker can monitor all network communications and attack other network devices. This vulnerability occurs when a changed version of IOS is installed on the router. Therefore, it is important to verify the integrity of the downloaded IOS image and ensure that the equipment can only be accessed by physically authorized personnel.
Software updates are performed to ensure that the software remains up-to-date and cannot be exploited by attackers. Some companies set up special teams to search for and fix software vulnerabilities before they can be exploited by attackers, while third-party security researchers also search for software vulnerabilities. An example is Project Zero from Google, which specifically researches and fixes software vulnerabilities.
To address software vulnerabilities, companies or individuals must continually update and manage their software with the latest security patches and conduct regular security testing to identify new vulnerabilities. In addition, it is important to implement good software security practices such as the use of encryption, strong authentication, and separation of user access rights to reduce the risk of vulnerabilities that could be exploited by attackers.
Most software security vulnerabilities fall into one ofthe following categories:
Almost all access control and security practices can be bypassed if an attacker has physical access to the target equipment. For example, no matter how you setfile permissions,the operating system cannot prevent someone from ignoring the operating system and reading data directly from the disk. To protectthe machine and the data on it, physical access must be restricted and encryption techniques must be used to protectthe data from being stolen ortampered with.
hardware and software vulnerabilities are two types of security vulnerabilities that organizations orindividuals need to be aware of in maintaining the security oftheir systems. By recognizing and fixing these vulnerabilities,they can prevent adverse attacks and keep their systems safe from security threats.
In an increasingly technological world,the discovery of security vulnerabilities is essentialto keep systems safe from emerging threats. Therefore, performing a vulnerability search by identifying security gaps in hardware and software becomes a must. By taking appropriate measures and regularly updating system security, an organization or individual can minimize the risk of adverse security attacks. In this case, prevention efforts are betterthan overcoming the adverse effects that may occurif security gaps are not detected quickly.
Mini E-book :
References :
1. International Journal of Information and Computer Security
2. www.cisco.com
3. www.cssia.org
4. www.lms.onnocenter.or.id
5. www.britannica.com
6. www.ncsc.gov.uk
Posted on 2023-03-05
Author : Ichsan Budiman Putra