Hacking for your Security - Penetration Testing



Similar documents
Introduction to Penetration Testing Graham Weston

Man-in-the-Middle Attacks against the chiptan comfort Online Banking System

Monetizing Mobile. How Broadcasters Can Generate Revenue With Mobile Apps jācapps

Penetration Testing - a way for improving our cyber security

A Common Process Model for Incident Response and Digital Forensics

TLP WHITE. Denial of service attacks: what you need to know

Vulnerability Management

Non-personal communication

lesson 1 An Overview of the Computer System

Pentests more than just using the proper tools

Pentests more than just using the proper tools

THE MORAY COUNCIL. Guidance on data security breach management DRAFT. Information Assurance Group. Evidence Element 9 appendix 31

Job Description. Director of Fundraising and Marketing

MARKETING Market research market strategy target market market mix Market Research

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Guide to Penetration Testing

No time for heroes: creating effective high performing leadership teams. By Professor Peter Hawkins - Leadership Team Breakfast Seminar

New Zealand Company Six full time technical staff Offices in Auckland and Wellington

AUTOMOBILE LIABILITY & PHYSICAL DAMAGE COVERAGE AGREEMENT PART A GENERAL

Penetration Testing in Romania

GENERATING VALUE WITH CONTINUOUS SECURITY TESTING

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Buying a Franchise. Copyright 2009 Virginia SBDC Network All rights reserved

Securing Critical Information Assets: A Business Case for Managed Security Services

The Business Plan and You

Guidance on data security breach management

If a Client and a Freelancer enter an independent contractor relationship, then this Freelancer Agreement ( Freelancer Agreement ) will apply.

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Four Top Emagined Security Services

Why Your Business Needs a Website: Ten Reasons. Contact Us: Info@intensiveonlinemarketers.com

BUYING OR SELLING A BUSINESS: A CHECKLIST FOR SUCCESSFULLY NEGOTIATING PRICE

Penetration Testing and Its Methodologies

What is Penetration Testing?

Who owns non-personal data? Legal aspects and challenges related to the creation of new industrial data rights

Cybersecurity Strategic Consulting

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

Glossary of Accounting Terms

Preventive Approach for Web Applications Security Testing OWASP 10/30/2009. The OWASP Foundation

Business Models of Innovation Closed Innovation and Open Innovation (Topic 7 (c))

Introduction to PCI DSS

IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 MIKE.ZUSMAN@CARVESYSTEMS.COM

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Guidance on data security breach management

How To Teach A Sales Management Course

Dual DVI USB KVM Switch

Penetration Testing for iphone Applications Part 1

Web application security: automated scanning versus manual penetration testing.

NEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS

INTRODUCTION TO PENETRATION TESTING

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

SAP FI - Automatic Payment Program (Configuration and Run)

CBEST FAQ February 2015

6 Myths About Copyrights That Put Your Church At Risk ChristianCopyrightSolutions.com The information contained herein is for

Terms and Conditions for Visma Solutions ISV Partner Programs and usage of API of Netvisor, Severa, Maventa and Navita solutions

IAM APPROVED EXAMINATION VENUES

HIPAA: Privacy/Info Security

The Trading Profit and Loss Account

Digital Pathways. Penetration Testing

An approach to Web Application Penetration Testing. By: Whiskah

WHY WRITE A BUSINESS PLAN?

Creating and Maintaining a Professional Practice

Latvian National Project Management Association (LNPMA) and its major directions of operation during 10 years

CPS122 Lecture: State and Activity Diagrams in UML

CYBER SECURITY: A REPORT FROM THE TRENCHES 2015 AGC NATIONAL & CHAPTER LEADERSHIP CONFERENCE MIKE.ZUSMAN@CARVESYSTEMS.COM

Dipl.-Ing. Frank Ganssloser, CEO AVAT Automation

Creative Industries Workshop Key IPR Issues

Information Security Services

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

3 Marketing Security Risks. How to combat the threats to the security of your Marketing Database

Business Plan template

Keren Elazari Hackers: The Internet s Immune System

20 th Year of Publication. A monthly publication from South Indian Bank.

BARRY F. LORENZETTI MISSION STATEMENT A MESSAGE FROM THE PRESIDENT

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

Transcription:

claus.overbeck@redteam-pentesting.de http://www.redteam-pentesting.de November 6th, 2009 Entrepreneurial Marketing, RWTH Aachen, WIN

Agenda 1 RedTeam Pentesting, Dates and Facts 2 3 4

RedTeam Pentesting, Dates and Facts Founded in 2004 Specialisation exclusively on penetration tests 8 penetration testers

Laptop: a portable microcomputer having its main components (as processor, keyboard, and display screen) integrated into a single unit capable of battery-powered operation (merriam-webster.com - Merriam Webster Online) Laptop: A computer designed to allow employees to easily store vast amounts of customer data in the backseat of a taxicab (The Devil s Infosec Dictionary)

Laptop: a portable microcomputer having its main components (as processor, keyboard, and display screen) integrated into a single unit capable of battery-powered operation (merriam-webster.com - Merriam Webster Online) Laptop: A computer designed to allow employees to easily store vast amounts of customer data in the backseat of a taxicab (The Devil s Infosec Dictionary)

? Attacking a network or product with the owner s consent Question: How deeply can a real attacker penetrate the security? Same methods as the bad guys Conducted from the attacker s perspective Individualised search of security vulnerabilities by experts Detailed documentation from the beginning

RWTH Research Group RedTeam Founded December 2004 at the RWTH Aachen University Research group at the chair of Dependable Distributed Systems (Prof. Felix Freiling) All participants in the group already have many years of experience in IT security Research question: How to conduct efficient penetration tests resulting in the highest benefit for the client

RWTH Research Group RedTeam The research group is informally called Red Team: a term describing the opposing force in military simulations First pentests of chairs at the RWTH (free of charge) Many are shocked how vulnerable they are

RWTH Research Group RedTeam The methodology used in the pentests is positively received The word spreads that RedTeam identifies security weaknesses of practical relevance in a short time Parallel research of security vulnerabilities generates the first press coverage: ITAN

RWTH Research Group RedTeam The interest in RedTeam s work remains high Prospective customers are willing to pay for the service In the middle of 2005: the chair moves to the University of Mannheim RedTeam has two choices: either quit or start a company

RedTeam Pentesting The problem: an adequate legal form Risk of liability Founding a company takes time RedTeam does not have Nomis Development GmbH lets RedTeam work as an independent divison Needs an official name, RedTeam is too generic The new name: RedTeam Pentesting

Financing The next issue: How to finance the new company RedTeam Pentesting s advantage: no need to finance anything in advance No machines No producer goods No suppliers (Almost) no external service providers Pentests belong to the service sector Most valuable assets of the company: Its employees Intellectual work

Financing Biggest costs at the beginning: Fixed costs for rent, telephone, internet... Travel costs Later: Salaries. Good people in IT security are rare Financing of the first months is covered from payed work during the time at the RWTH No need for Venture Capital, EU Fundings etc. No dependencies, no expectations, no regulations

Technology Centre Aachen In late 2005, the first offices at the TZA are rented Focus on technology-oriented companies Inexpensive rent Availability of small offices Flexible (even with unusual demands) Direct access by autobahn Already existing infrastructure: Reception Cafeteria Conference rooms Site security in the evening/night

RedTeam Pentesting GmbH The trademark RedTeam Pentesting gets more and more established RedTeam Pentesting starts its own company in parallel to its day-to-day business RedTeam Pentesting GmbH is in the course of formation as of December 2006 Fully established as of January 1st, 2007

RedTeam Pentesting GmbH Today Working worldwide Medium to large companies and international corporations Small companies with special security interests Branches of trade: industry, banks and insurance companies, trading business, operators of data centers, public administration... Press coverage in online and print media, radio and TV Expanded to bigger offices at the TZA

What is Marketing? Who is your customer? What does she want/need? Design your product/service to your customer s needs. Communicate the value of your product/service to your customer.

RedTeam Pentesting Seriousness Specialisation exclusively on penetration tests Teamwork Discretion Transfer of know-how

Thank you for listening. Questions?