Mastering OWASP Risk Rating

Whaddup y'all..



Besides the well-known CVSS, there’s actually an alternative risk assessment method, especially for web pentests, called the OWASP Risk Rating. As the name suggests, this method is provided by the OWASP organization.

Luckily, someone made a calculator so you don’t have to manually calculate the score. But it still uses pretty formal language, which can be confusing sometimes. I’ve made a simpler explanation for each factor, hope it helps you understand better!🔥

1. Likelihood Factors

The first step is to estimate how likely it is that an attacker will find and exploit the vulnerability. There are two sub-factors: the threat agent factor and the vulnerability factor.

a) Threat Agent Factors

b) Vulnerability Factors


2. Impact Factors

After a successful attack, the next step is to estimate the technical and business impacts of the vulnerability. There are two sub-factors: the technical impact factor and the business impact factor.

a) Technical Impact Factors


b) Business Impact Factors

In The Wild Reality

As a pentester, we usually just fill out a form with three factors: threat agent, vulnerability, and technical impact. For the business impact factor, it requires a deep understanding of what’s important for the company’s operations. If necessary, the pentester and the company should collaborate to fill out the business impact factor together.

Reference

Comments

Popular posts from this blog

TP-Link AC600 Archer T2U Plus Driver for Kali Linux on Macbook (Apple Silicon)

Deepfake + Virtual Webcam Setup on Apple Silicon Mac