TryHackMe Vulnerabilities 101 Room
My notes on the THM room Vulnerabilities 101
TryHackMe Vulnerabilities 101 Room
Contents
- Common Vulnerability Scoring System (CVSS)
- Vulnerability Priority Rating (VPR)
- Vulnerability Databases
- Example Process
Common Vulnerability Scoring System (CVSS)
Popular framework for scoring vulnerabilities.
Advantages:
- CVSS has been around for a long time.
- Popular with organisations.
- Free and open source framework to adopt and recommended by organisations such as NIST (National Institute of Standards and Technology).
Disadvantages:
- Never designed to help prioritise vulnerabilities.
- Heavily assesses vulnerabilities on an exploit being available.
- Vulnerabilities rarely change scoring after assessment despite the fact that new developments such as exploits may be found.
Vulnerability Priority Rating (VPR)
- Much more modern framework developed by Tenable.
The framework is considered to be risk-driven.
Advantages:
- More modern framework that is real-world.
- Considers over 150 factors when calculating scores.
- Risk-driven and used by organisations to help prioritise patching vulnerabilities.
- Scorings are dynamic.
Disadvantages:
- Not open-source like some other frameworks.
- Can only be adopted as part of a commercial platform.
- Does not consider the CIA triad to the extent that CVSS does.
Vulnerability Databases
National Vulnerability Database (NVD)
- Lists all publicly categorised vulnerabilities.
CVE - Common Vulnerability and Exposures; have the formatting of
CVE-YEAR-IDNUMBER
, e.g., the famous WannaCry malware is listed as CVE-2017-0144.- Not a great website when searching for vulnerabilities for a specific application or scenario.
Exploit-DB - by OffSec
- Much more useful for hackers as it retains exploits for software and applications stored under the name, author, and version of the software or application.
- Can also use to look for snippets of code (PoCs) that are used to exploit a specific vulnerability.
Terms to know:
- Vulnerability - A vulnerability is defined as a weakness or flaw in the design, implementation, or behaviours of a system or application.
- Exploit - An exploit is something such as an action or behaviour that utilises a vulnerability on a system or application.
- Proof of Concept (PoC) - A PoC is a technique or tool that often demonstrates the exploitation of a vulnerability.
Example Process
- Information Gathering - find out details of the target using OSINT; details such as number of clients, services offered, etc., possible software to attack such as a help desk or support application.
- Enumeration and Scanning - Check for hosts, ports, and services that are open using NMAP.
- Application Testing - Look for version numbers, try login credentials, try to access services, etc.
- Check vulnerability databases for any exploits on the target software/services.
- Use the exploit on the web application (or other service) to attempt to exploit the vulnerability.
- Document all steps and details of the attack. Produce report and demonstrate PoC.
This post is licensed under CC BY 4.0 by the author.