1 NZ PAPER LINUX AND WEB APPLICATION SECURITY Penetration Testing Scope Factors April 20, 2013 Zeeshan Khan NZPAPER.BLOGSPOT.COM
2 Abstract: This paper contains the key points of penetration testing. All the points defined here must be treated properly. The maximum security in areas defined here can minimize the greater security. Keywords: Penetration Testing, Security
3 Introduction This article discusses the various factors which are investigated during the pen-testing process. We will try to point out how we can make the said points maximum possible secured, so that an attacker may get minimum possible information about our system. We will mostly, discuss this paper in a website perspective. Web Application Discovery This is, when an attacker finds useful information about our website. For example: we don't want others to know our sub domain named as mail.example.com, as it shows a separate scope of testing for the attacker, or if we keep the same location as example.com/mail, we should make an entry in Robots.txt file immediately at the time when we create a sensitive directory like above. More precisely, avoid possible access to all the areas of your website to which you don't want to grant access to others. Or the most applicable way is to configure the server for URL redirection which avoids seeing the actual URL locations of sensitive directories. This way, we can possibly avoid black hackers from seeing website sensitive areas. Open Port with default services Generally speaking, a service running on a port is accessible by IP:Port format. We can check it by entering in our browser. The more you have Open Ports on your system, the more your system will be penetrated by attackers. As each port has a service running on it, so it is better to change or spoof the service identification banner to avoid exposing the exact type and version of the service software currently in use. No ports should be left with unattended installations, or unattended services, or the services you don't use and update regularly. Search Engines Pen-testers reveal lots of information about your website with the use of Search Engines. They do it by using special Search Engine Advanced Operators like Google Commands. The attackers, can reveal information about your sensitive files, directories, server misconfiguration, URL structure, cached pages and so on. You have to understand every of these areas and make sure to protect possible Search Engine Discovery of the facts listed above. Known Web Apps on the server The attackers investigate all the known Web Apps (CMS) on a server, so that they can attack easily any discovered CMS with known flaws. They can exploit for low level vulnerabilities to high level risks. By hiding banners of these CMS, we can avoid each possible CMS from discovering by attackers.
4 The above is a list of possible, but important factors which are greatly pen-tested by attackers. These are the factors investigated by real pen-testers to break into target systems. With a little effort, it is possible to avoid maximum information disclosure in every of the above areas of the system. Conclusion Identifying the scope of pen-testing enables you to know the key areas of pen-testing process. Carefully point out the components being treated, and take appropriate actions, which ensures maximum security. The more you assess the scope of pen-testing well, the higher you are able to eliminate potential vulnerabilities.
References 1. steve-shead.com. Standard Penetration Testing Checklist. Steve- Shead.com. 2009. http://www.steveshead.com/blog/2009/04/24/standard-penetration-testing-checklist/ 2. Basu, Eric. What Is A Penetration Test And Why Would I Need One For My Company? Forbes.com. 2013. http://www.forbes.com/sites/ericbasu/2013/10/13/what-is-apenetration-test-and-why-would-i-need-one-for-my-company/ 3. Basu, coresecurity.com. Conducting Penetration Testing. Coresecurity.com. http://www.coresecurity.com/conductingpenetration-testing-0 4. Rasch, Mark. Legal Issues in Penetration Testing. Securitycurrent.com. 2013. http://www.securitycurrent.com/en/writers/mark-rasch/legal-issuesin-penetration-testing 5