Attack and Penetration Testing 101



Similar documents
OWASP OWASP. The OWASP Foundation Selected vulnerabilities in web management consoles of network devices

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Vulnerability Assessment and Penetration Testing

The Top Web Application Attacks: Are you vulnerable?

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

Using Nessus In Web Application Vulnerability Assessments

Penetration Testing with Kali Linux

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Internal Penetration Test

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS

(WAPT) Web Application Penetration Testing

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Web Application Security

Web Application Vulnerability Testing with Nessus

Where every interaction matters.

EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke

Web Application Report

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Application Security Testing. Generic Test Strategy

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Criteria for web application security check. Version

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Hack Proof Your Webapps

Cross Site Scripting in Joomla Acajoom Component

CRYPTUS DIPLOMA IN IT SECURITY

1. Building Testing Environment

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

SAST, DAST and Vulnerability Assessments, = 4

Magento Security and Vulnerabilities. Roman Stepanov

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

What is Web Security? Motivation

Passing PCI Compliance How to Address the Application Security Mandates

SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

Common Criteria Web Application Security Scoring CCWAPSS

Data Breaches and Web Servers: The Giant Sucking Sound

Web Application Attacks And WAF Evasion

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3

Rational AppScan & Ounce Products

Chapter 1 Web Application (In)security 1

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

OWASP Top Ten Tools and Tactics

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Security Awareness For Website Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Check list for web developers

Sitefinity Security and Best Practices

Advanced Web Security, Lab

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Acunetix Website Audit. 5 November, Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build )

Guidelines for Web applications protection with dedicated Web Application Firewall

The Security Development Life Cycle

Application Security Testing

Advanced Web Technology 10) XSS, CSRF and SQL Injection 2


Hosts HARDENING WINDOWS NETWORKS TRAINING

Web application security

05.0 Application Development

CYBERTRON NETWORK SOLUTIONS

Essential IT Security Testing

How To Protect A Web Application From Attack From A Trusted Environment

Workday Mobile Security FAQ

WHITEPAPER. Nessus Exploit Integration

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert

April 11, (Revision 2)

Web Application Penetration Testing

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Sample Report. Security Test Plan. Prepared by Security Innovation

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Security and Vulnerability Testing How critical it is?

Cyber Security Workshop Ethical Web Hacking

WEB APPLICATION HACKING. Part 2: Tools of the Trade (and how to use them)

Secure Web Development Teaching Modules 1. Threat Assessment

WebCruiser Web Vulnerability Scanner User Guide

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

Information Security. Training

Last update: February 23, 2004

Learn Ethical Hacking, Become a Pentester

FortiWeb 5.0, Web Application Firewall Course #251

Transcription:

Attack and Penetration Testing 101 Presented by Paul Petefish PaulPetefish@Solutionary.com July 15, 2009 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Agenda Penetration Testing Overview Network Vulnerabilities Web Application Vulnerabilities Resources/Questions Page 2 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Disclaimer The techniques outlined in this presentation are intended to be performed by authorized individuals only. Attempts to perform unauthorized tests are illegal. Page 3 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

About Me Paul Petefish - Security Consultant in the Solutionary Consulting Services (SCS) group What I do: External Penetration Assessments, Internal Penetration Assessments, Wireless Assessments, Application Security Assessments Page 4 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

What is a Penetration Test? Attack and Penetration Testing is a systematic approach to identifying weaknesses in already deployed targets and exploiting those weaknesses. It is a vulnerability assessment followed by exploiting the vulnerabilities found during the assessment. You are trying to break a system, without breaking the system. Page 5 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Why Conduct a Penetration Test? How do you know you are secure without testing? How do you know if anything works without testing it? Penetration tests evaluate how things actually are, not how they should be. A penetration test can leverage two or three low to medium risk vulnerabilities and turn the result into a critical vulnerability. Compliance (PCI) Page 6 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Network Vulnerabilities Network Vulnerabilities Page 7 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Patch Management Unpatched/Outdated Services Is there exploit code in the wild? Security focus (bid) Metasploit Milw0rm Google Never exploit without consent or knowing the consequences (crashing the service). Page 8 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Attack Scenario Metasploit and MS06-040 Yes, it is that easy. Page 9 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Build Standards/Configuration Harding Administrative Interfaces Look for default passwords on vender site or default password site (one of the most common vulnerabilities in 2008). Try common password combinations (admin:admin, root:root, guest:guest, administrator:administrator, etc..). Do not lockout accounts, do not try the same username with more than two password combinations. Custom application? Beat it up then! Input validation Page 10 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Attack Scenario Weak password on Cisco router (cisco:cisco) Used device as a proxy to attack other hosts Page 11 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Build Standards/Configuration Harding SNMP Service Public community string Sensitive information, potentially root Private community string Root maybe, Cisco device?, definitely Brute force with Hydra, SNscan Read with Look@Lan or Snmpwalk Page 12 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Attack Scenario Netopia Wireless DSL Router Username: Admin Password: Device serial number (gathered from SNMP public) Look@Lan Page 13 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Build Standards/Configuration Harding Services Manually inspect all available services. Connect to every service with appropriate client and test for Default/Weak Passwords Information leakage Input Validation Do your research and know the service. Unnecessary services Directory browsing (/admin, /tools, /jmx-console) Page 14 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Transport Security Unencrypted Services FTP, Telnet, HTTP Weak Encryption Weak SSL ciphers Self issued SSL certificate Page 15 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Web Application Vulnerabilities Web Application Vulnerabilities Page 16 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Input Validation Client Side Validation normally done with JavaScript Simple to test, just plug in and submit Easy to bypass with Web proxy Server Side The Web application checks for input. Check if potentially malicious characters are accepted (()!@#$%^&* ; <>[]{}\?'"). Page 17 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Input Validation Cross-site Scripting (XSS) It is possible to inject code, normally JavaScript, into a Web application. This is bad because you can steal cookies. Cookies contain session IDs, which are equivalent to username/passwords. Deface Website Redirect to a malicious Websites How to test? Page 18 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Attack Scenario Injecting simple JavaScript No client or server side input validation Page 19 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Input Validation SQL Injection You can talk directory to the database without being authenticated (You are actually authenticated as the Web application, so you have the same access it does). The attacker has full access to the application database. Tick attack ("p'g'0", p'g"0) Look for SQL error messages (Syntax errors). Blind SQL injection Instead of a handy error message screaming SQL syntax errors, you have to look for more subtle things, such as content length returned. Page 20 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Attack Scenario Injecting SQL query with Burp Suite proxy Web application returns syntax error Page 21 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Cache Control Browser Caching The Web application should clean up after itself (no-cache, private). Temporary internet files GET Requests Sensitive information should not be passed via GET requests. Use POST instead. Web logs, proxies History Page 22 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Attack Scenario Session ID cached in firewall logs Web application caching sensitive documents Page 23 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Resources Penetration Test Lab VMware with unpatched Windows XP Damn Vulnerable Linux (DVL) Metasploit Exploit framework http://www.metasploit.com Security Focus Vulnerability and exploit archive http://www.securityfocus.com Milw0rm Exploit archive http://www.milw0rm.com Page 24 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Resources Cont. BackTrack Self contained penetration testing live distribution http://www.remote-exploit.org/backtrack.html OWASP Testing Guide Web application testing guide http://www.owasp.org OWASP WebGoat Self contained vulnerable Web application http://www.owasp.org Nessus Vulnerability Scanner http://www.nessus.org Page 25 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2

Questions? Questions? Comments? Page 26 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2