Introduction to Penetration Testing Graham Weston



Similar documents
Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Penetration Testing Services. Demonstrate Real-World Risk

Newsletter - September T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Pentests more than just using the proper tools

Penetration Testing in Romania

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Application Security Testing

Pentests more than just using the proper tools

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Penetration Testing Workshop

The Top Web Application Attacks: Are you vulnerable?

FORBIDDEN - Ethical Hacking Workshop Duration

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Web App Security Audit Services

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Penetration Testing. University of Sunderland CSEM02 Harry R Erwin, PhD

Web Maniac Hacking Trust. Aditya K Sood [adi_ks [at] secniche.org] SecNiche Security

Metasploit The Elixir of Network Security

Footprinting and Reconnaissance Tools

About Effective Penetration Testing Methodology

Web application security: automated scanning versus manual penetration testing.

Penetration Test Report

Hackers are here. Where are you?

Loophole+ with Ethical Hacking and Penetration Testing

Digital Pathways. Penetration Testing

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

SAST, DAST and Vulnerability Assessments, = 4

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

HTExploit: Bypassing htaccess Restrictions

Network Security Audit. Vulnerability Assessment (VA)

Web Engineering Web Application Security Issues

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Penetration Testing and Its Methodologies

Vulnerability and Threat Management and Prevention

CRYPTUS DIPLOMA IN IT SECURITY

Rational AppScan & Ounce Products

Guide to Penetration Testing

The Roles of Software Testing & QA in Security Testing

Put into test the security of an environment and qualify its resistance to a certain level of attack.

IT Risk Management: Guide to Software Risk Assessments and Audits

Introduction: 1. Daily 360 Website Scanning for Malware

Hackers are here. Where are you?

Real World Web Service Testing For Web Hackers

Penetration Testing. Presented by: Elham Hojati Advisor: Dr. Akbar Namin July 2014

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

New Zealand Company Six full time technical staff Offices in Auckland and Wellington

Hacking Techniques & Intrusion Detection

SCOPING QUESTIONNAIRE FOR PENETRATION TESTING

Vulnerability management lifecycle: defining vulnerability management

Penetration Testing Getting the Most out of Your Assessment. Chris Wilkinson Crowe Horwath LLP September 22, 2010

PENETRATION TESTING GUIDE. 1

Where every interaction matters.

Information Security Services

An approach to Web Application Penetration Testing. By: Whiskah

Attack and Penetration Testing 101

EC-Council Certified Security Analyst (ECSA)

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

ARE YOU RUNING LINUX RIGHT?

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

How To Test For Security On A Network Without Being Hacked

Manual Penetration Testing for ContractPal

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Table of Contents. Application Vulnerability Trends Report Introduction. 99% of Tested Applications Have Vulnerabilities

Information Security Organizations trends are becoming increasingly reliant upon information technology in

PKF Avant Edge. Penetration Testing. Stevie Heong CISSP, CISA, CISM, CGEIT, CCNP

Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Bust a cap in a web app with OWASP ZAP

Expert Services Group (Security Testing) Nilesh Dasharathi Sadaf Kazi Aztecsoft Limited

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

PCI DSS Overview and Solutions. Anwar McEntee

Presented by Evan Sylvester, CISSP

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Web attacks and security: SQL injection and cross-site scripting (XSS)

Transcription:

Introduction to Penetration Testing Graham Weston March 2014

Agenda Introduction and background Why do penetration testing? Aims and objectives Approaches Types of penetration test What can be penetration tested? How to do a penetration test Penetration test workflow Tools, standards and techniques

What is a Penetration Test? Wikipedia says: A Penetration Test, or the short form pentest, is an attack on a computer system with the intention of finding security weaknesses, potentially gaining access to it, its functionality and data

What is a Hacker? Wikipedia says: A hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge.

So, what s the difference? Their motives; both have overlapping skill sets. The penetration tester (white hat): Works with the knowledge and consent of the system owner Should not cause lasting damage to the target system Has constructive goals (to find security issues that can be fixed) Obliged to responsibly disclose their findings The hacker (black hat): Works to avoid detection by the system owner Actively works to conceal their capability (0-day exploits etc.) Has a range of nefarious motives: Credibility in the underground community Cause damage/disruption Steal for material gain

Health Warning The tools and techniques discussed here are powerful: They should only be used under controlled conditions (and with the express consent of the owner of the system under test) Professional penetration testers are bound by strict codes of practise and ethics The distinction between penetration testing and hacking is entirely contextual In short, don t try this at home!

Why Do Penetration Testing?

Why do Penetration Testing? To better understand and quantify the risks posed to a system by external attackers. For example, what would happen if: A corporate web site was defaced or taken down? The passwords and customer details to your webbased banking service were published on the Internet? An attacker could gain access to the control systems of a major factory/power station/water plant? A pentest gives a measure of confidence that the most significant risks to a system have been adequately mitigated.

Types of Penetration Test Pentests can be categorised in to several main types: Physical (gaining physical access to facilities) Hardware (what can be done if an attacker has physical access to the system under test) Network (where an attacker has access to a network connected to the system under test) Web (focussing specifically on the web front-end to the system under test) In practise, a pentest may span several of these areas.

What do I get from a Pen Test? Ideally: Independent verification that the system under test resists a range of common attacks and exploits. Practically: Information about the weaknesses identified in the system under test.

What don t I get from a Pen Test? Generally, a pentest focuses on finding a way to successfully attack and exploit the system under test at the time of testing. It s not an exhaustive audit of the system security. Pentests only identify vulnerabilities that are known about at the time of the test. Attack techniques are constantly evolving and improving. A vulnerability assessment is a more detailed, extensive audit of the security of a system.

How to Do a Penetration Test

A practical approach: Scenario: You are set a the challenge of carrying out a physical penetration test on an office building. Your goal is to breach the security of the building and locate items of interest inside. How would you do it?

A practical approach: Dress up as an aircon engineer? Carry a toolbag? Wear an ID badge?

A practical approach: Make a plan Gather information How many doors are there? Where are they? Are the doors locked? Can the locks be defeated? Is it possible to get in any other way? A window, ventilation duct? When is best to go in? How best to avoid being noticed? Once inside, how to identify what is of interest? Execute plan Report on weaknesses in physical security identified

Penetration Test Workflow Plan Gather info Discovery Exploitation Cleanup Report This practical, physical example maps on to a generic workflow that is widely applicable

Pen Test Workflow - Plan Plan Gather info Discovery Exploitation Cleanup Report Planning: Define scope and requirements for test Plan test approach White box Black box Hybrid (grey box) Identify suitable tools COTS, open-source, bespoke

Pen Test Workflow Gather Info Plan Gather info Discovery Exploitation Cleanup Report Information gathering: Identify components of target system COTS components Identify versions Look for publically disclosed vulnerabilities and exploits Bespoke components Inspection of source code and configuration information in white box scenario

Pen Test Workflow Discovery Plan Gather info Discovery Exploitation Cleanup Report Discovery: Practical investigation of target system Initial checks: TCP ports open? Services running? Default/weak user credentials? Information leakage Automated tools/industry standard checks (OWASP etc.)

Pen Test Workflow Exploitation Plan Gather info Discovery Exploitation Cleanup Report Exploitation: Using information gained in discovery phase, is it possible to exploit the system? Common attacks: COTS tools (metaspolit, CANVAS and other frameworks) Exploits in public domain (CVE database) SQL injection, XSS, session hijacking etc. Identify areas for further investigation

Pen Test Workflow Cleanup Plan Gather info Discovery Exploitation Cleanup Report Cleanup: Document findings Make recommendations; identify risks not fully mitigated in scope of current task Reverse any changes made to target system

Pen Test Workflow Cleanup Plan Gather info Discovery Exploitation Cleanup Report Report: Release formal documentation Identify next steps/way forward Closure with client

Tools, Standards and Techniques

Physical Engagements Effectively implementing the building scenario discussed earlier. Techniques: Social engineering Identifying and defeating access controls Remote attacks Tools: Specialised hardware Uniform and ID badges

Network Engagements Client Network Server app under test Service (e.g. RDP) Server Pen tester

Automated Tools The good news: Commercial and open-source tools take away much of the hands-on complexity, using GUIs to drive the process In many cases, it is possible to deliver quick wins without coding, scripting, or having a detailed understanding of the underlying technologies High-level tools produce a visualisation of the target network allowing you to deploy exploits and navigate it graphically The bad news: They are not a panacea; automated tools will only find well-known, existing vulnerabilities Finding really valuable vulnerabilities is a more labour-intensive process, dependent on a skilled pen-tester

Popular Standards OWASP (Open Web Application Security Project) www.owasp.org OSSTMM (Open Source Security Testing Methodology Manual) www.osstmm.org NIST (National Institute of Standards and Technology) csrc.nist.gov/publications/nistpubs/800-115/sp800-115.pdf PTES (Penetration Testing Execution Standard) www.pentest-standard.org

Conclusions

Conclusions The fundamental concepts for a pentest are common across a range of activities, ranging from a building to a web-app The best approach for each engagement should be tailored using a combination of external standards, knowledge of the target system and tester experience. There are standards, such as OWASP, which provide a good (but not exhaustive) approach. Commercial and open-source tools offer a range of useful functionality: Automating common and labour intensive tasks Managing the workflow Visualising the target network Deploying exploits in a point-and-click paradigm

Questions?