Penetration Testing. Security Testing



Similar documents
Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

NETWORK PENETRATION TESTING

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

Penetration Testing. What Is a Penetration Testing?

Keywords Vulnerability Scanner, Vulnerability assessment, computer security, host security, network security, detecting security flaws, port scanning.

Penetration Testing Workshop

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

Penetration Testing with Kali Linux

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

CISO's Guide to. Penetration Testing. James. S. Tiller. A Framework to Plan, Manage, and Maximize Benefits. CRC Press. Taylor & Francis Group

PKF Avant Edge. Penetration Testing. Stevie Heong CISSP, CISA, CISM, CGEIT, CCNP

Andreas Dittrich, Philipp Reinecke Testing of Network and System Security. example.

Pentests: Exposing real world attacks

Penetration Testing Tools

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Integrated Threat & Security Management.

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report

Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8

Juniper Networks Secure

Vinny Hoxha Vinny Hoxha 12/08/2009

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

Web Security School Final Exam

Stop that Big Hack Attack Protecting Your Network from Hackers.

Attacks and Defense. Phase 1: Reconnaissance

Installing and Configuring Nessus by Nitesh Dhanjani

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Profiling Campus Network using Network Penetration Testing

Information Security Organizations trends are becoming increasingly reliant upon information technology in

Network Security Audit. Vulnerability Assessment (VA)

Tools for penetration tests 1. Carlo U. Nicola, HT FHNW With extracts from documents of : Google; Wireshark; nmap; Nessus.

Service Definition (Q-D1) Vulnerability Scan (LITE Test) Overview of Service. Functional and non-functional Detail. Q-D1: Service Definition

Penetration Testing Report Client: Business Solutions June 15 th 2015

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

An Introduction to Network Vulnerability Testing

Acunetix Website Audit. 5 November, Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build )

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

IPLocks Vulnerability Assessment: A Database Assessment Solution

SAST, DAST and Vulnerability Assessments, = 4

Usage of Vulnerability Tools

Client logo placeholder XXX REPORT. Page 1 of 37

IDS and Penetration Testing Lab ISA656 (Attacker)

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Cisco IPS Tuning Overview


Conducting a Penetration Test/Vulnerability Analysis to Improve an Organization s Information Security Posture

Vulnerability Scanning & Management

NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Service Definition (Q-D1) Penetration Testing. Overview of Service. Functional and non-functional Detail. Q-D1: Service Definition

Reducing Application Vulnerabilities by Security Engineering

Metasploit The Elixir of Network Security

TECHNICAL NOTE 08/04 IINTRODUCTION TO VULNERABILITY ASSESSMENT TOOLS

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Hosts HARDENING WINDOWS NETWORKS TRAINING

WHITE PAPER. An Introduction to Network- Vulnerability Testing

External Network Penetration Test Report

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Cyber Essentials. Test Specification

PATCH MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

YOUR HIPAA RISK ANALYSIS IN FIVE STEPS

Information Security Office

Vulnerability Assessment and Penetration Testing

Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts.

GUIDE TO IMPROVING INFORMATION SECURITY IDENTIFYING WEAKNESSES & STRENGTHENING SECURITY

Penetration Testing in Romania

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Malicious Network Traffic Analysis

BackTrack 5 tutorial Part I: Information gathering and VA tools

EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER

CIT 380: Securing Computer Systems

The Nexpose Expert System

2015 Vulnerability Statistics Report

Application Security in the Software Development Lifecycle

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

Lab 7: Introduction to Pen Testing (NMAP)

This tutorial has been prepared for beginners to help them understand the basics of Penetration Testing and how to use it in practice.

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Assessing Network Security

Ethical Hacking: The Value of Controlled Penetration Tests

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Passive Vulnerability Detection

Continuous Penetration Testing

Transcription:

Penetration Testing Gleneesha Johnson Advanced Topics in Software Testing Fall 2004 Security Testing Method of risk evaluation Testing security mechanisms to ensure that their functionality is properly implemented Identifying risks in a system and creating tests driven by those risks 1

Security Testing vs. Traditional Testing Traditionally test for specification violations Security bugs typically manifest as side effects Intended functionality Actual functionality Traditional faults Unintended functionality Why Security Test? Any piece of software containing a security flaw can make a secure environment vulnerable to an attack Increasing exploits of vulnerabilities in systems show that there are growing needs to develop more secure software 2

Security Testing Techniques Penetration testing *** Focus of this presentation Formal Methods Use mathematical description of system and specifications to prove it meets security requirements Syntax Testing Feed exceptional input values to the software and observe the security aspects of the resulting behavior Fault Injection Insert faults into the environment to determine response Gligor s testing method Eliminates redundant test cases Penetration Testing Practice of simulating real-world attacks by discovering and exploiting software, system, and network vulnerabilities Normally performed by a specialized team of experts called a tiger team 3

Motivation Allow an organization to assess its security posture Allow vulnerabilities to be addressed before they are exploited Marketing tool Can be used to promote awareness amongst non-technical executives Can be used to test computer emergency response teams and Intrusion Detection Systems Testing Models Zero-knowledge attack performed by testers who have no real information about the target environment designed to provide the most realistic penetration test possible Full-knowledge attack performed with the tester having as much information about the target environment as possible designed to simulate an attacker who has intimate knowledge of the target organization's systems - such as a real employee. 4

Things To Consider What will be done with information after test has been performed Methods used to limit unintentional damage to networks and/or systems Internal vs. External testing team Attack profile of potential threat sources Potential Threat Sources Script Kiddie Has limited or no knowledge of how computer systems work. Rely on pre-written exploits and vulnerability scanners to find and exploit vulnerabilities. Master Cracker Has intimate knowledge of IT technology and system code. They find original vulnerabilities, write customized exploits and spend much of their time learning and finding flaws in new technology. Malicious Insider Doesn t necessarily know much about IT systems but does know a lot about YOUR system. This enables them to attack a system at its most vulnerable point. Naive employee Generally damages IT systems through an inability to correctly operate even the most simplest applications. 5

Methodology Discovery/Reconnaissance Enumeration/Scanning Vulnerability Mapping Exploitation Discovery/Reconnaissance Goal is to obtain as much information as possible about the target organization Helps to build a picture of the target organizations Often considered the most important (yet overlooked) component of zero-knowledge attacks If testing performed with initial information, this step is based (not replaced) on that information 6

Discovery/Reconnaissance Cont. Common Tools Nslookup (Available on Unix and Windows Platforms) Whois (Available via any Internet browser client) ARIN (Available via any Internet browser client) Dig (Available on most Unix platforms and some web sites via a form) Web Based Tools (Hundreds if not thousands of sites offer various recon tools) Target Web Site (The client s web site often reveals too much information) Social Engineering (People are an organizations greatest asset, as well as their greatest risk) Nslookup Microsoft Windows XP [Version 5.1.2600] (C) Copyright 1985-2001 Microsoft Corp. C:\Documents and Settings\Gleneesha Johnson>nslookup Default Server: VTOT.proxy.aol.com Address: 205.188.146.146 > www.hotmail.com Server: VTOT.proxy.aol.com Address: 205.188.146.146 Non-authoritative answer: Name: www.hotmail.com.nsatc.net Addresses: 207.68.171.233, 207.68.172.239, 207.68.173.245 Aliases: www.hotmail.com 7

Whois Enumeration/Scanning Gain as much information as possible about entities found during discovery Goal is to identify potential targets for security holes and vulnerabilities of the target host or network. Identify live (accessible) systems Scan for open ports and services on the target host(s) or network 8

Enumeration/Scanning Cont. Tools Nmap Telnet Hping2 Netcat Telnet 9

TCP Side Note SYN SYN ACK ACK SYN FIN Xmas Tree NULL Scan Types 10

Nmap Vulnerability Mapping/Assessment Goal is to identify all potential avenues of attack Use information from previous phases to map specific system attributes against publicly available sources of vulnerability information Bugtraq Computer Emergency Response Team (CERT) advisories vendor security alerts 11

High Vulnerability Categories Can jeopardize host or network security if exploited Present threat to organizations integrity Medium Usually present a nuisance, but not nearly as serious as high Low Usually commonplace Can t be exploited to directly gain access to network resources Exploitation Goal is to attempt to compromise the network by leveraging the results of the vulnerability analysis, following as many avenues identified as time allows Can be done manually Can be done using automated tools Nessus 12

Nessus Nessus 13

Nessus Problems Testing is based heavily on the experience of the tester The results of a test only provide a snapshot of a system s security at a given time No well defined and tested criterion used to decide when to stop penetration testing 14

Questions? 15