Gray Space Defense


"Taking your network defense on offense!"

Services - Vulnerability Assessment

What is a vulnerability asssessment?

A vulnerability scan is a program that scans all devices connected to a network. First, the scan looks for devices that are on or awake and responsive. Once the program has a list of devices, it will start interrogating each device to learn the operating system, kernel version, media access control (MAC) address, and other information. This information allows for easy identification and non-repudiation when connecting the results to a device. Next, it will run network vulnerability tests (NVTs) to find vulnerabilities that hackers can use to exploit the machines. The vulnerabilities can come in the form of bad configurations when setting up the operating system or out of date software that has a known Common Vulnerability and Exposure (CVE). As of October 26, 2017, there are over 92,000 CVEs since 1999. The number increases daily and as the cyber security profession grows, the amount of new vulnerabilities being found will expand exponentially.

Who needs a vulnerability assessment?

Everyone and all businesses could use a vulnerability assessment. Small business or home networks will benefit the msot, especially if an IT team does not exist or their IT team is stretched thin. The assessment will quickly identify vulnerabilities that should be mitigated to prevent possible exploits. Assessments are so important, the federal government conducts routine scans on its networks. It is vastly important to know which machines are vulnerable and what those vulnerabilities are to not only mitigate the vulnerability, but to apply risk management. Once a vulnerability becomes public, it usually takes bad actors 72 hours to weaponize the vulnaerability and use it. When it comes to vulnerabilities, there are only two ways learn about them which are threat intelligence and vulnerability scans. Even if your business has a great patch management program, a vulnerability assessment can still find the devices that may have poor configurations that leaves devices open to attacks.

Please click on the pictures to view examples of a scan and the information it provides.