Success Rates for Client Side Vulnerabilities

by Jonathan Risto
Sept. 1, 2017 0 comments SANS Institute Pen Testing & Audits clients and endpoints

The user is the weakest link in the computer security chain. From clicking on links that they shouldn to having weak passwords, it generally comes down to the end user doing something they shouldn . If the user runs a piece of malware or opens an infected file, will it always lead to a compromise? This paper plans to test if client-side exploits will always function or if there are additional factors to consider when dealing with these vulnerabilities and associated exploits. Is the Common Vulnerability Scoring System (CVSS) score enough to determine if a particular vulnerability is more critical than another and should be remediated sooner than another? This testing will be accomplished through the use of freely available exploitation software (e.g. Social Engineering Toolkit, Metasploit) in a closed testing environment.

https://www.sans.org/reading-room/whitepapers/clients/success-rates-client-side-vulnerabilities-3...