January 2016 Issue No: 2.0. Application Guidance CCP Penetration Tester Role, Practitioner Level



Similar documents
Application Guidance CCP Penetration Tester Role, Practitioner Level

April 2015 Issue No: 1.0. Application Guidance - CCP Penetration Tester Role, Senior Level

April 2015 Issue No:1.0. Application Guidance - CCP Security and Information Risk Advisor Role, Practitioner Level


(d-5273) CCIE Security v3.0 Written Exam Topics

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Implementing Cisco IOS Network Security

Networking: EC Council Network Security Administrator NSA

The Trivial Cisco IP Phones Compromise

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

ICTTEN8195B Evaluate and apply network security

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Enterprise Security Critical Standards Summary

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Cyber Essentials. Test Specification

Linux Network Security

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Tim Bovles WILEY. Wiley Publishing, Inc.

Network Security Fundamentals

Securing Cisco Network Devices (SND)

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

February 2015 Issue No: 5.2. CESG Certification for IA Professionals

How To Protect A Web Application From Attack From A Trusted Environment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Penetration Testing Report Client: Business Solutions June 15 th 2015

IINS Implementing Cisco Network Security 3.0 (IINS)

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Network Access Security. Lesson 10

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Topics in Network Security

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

What is Web Security? Motivation

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

Developing Network Security Strategies

Computer Networks. Secure Systems

A Decision Maker s Guide to Securing an IT Infrastructure

CYBERTRON NETWORK SOLUTIONS

Guidance End User Devices Security Guidance: Apple OS X 10.9

CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Learn Ethical Hacking, Become a Pentester

Description: Objective: Attending students will learn:

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

Penetration Testing with Kali Linux

Cisco Configuring Commonly Used IP ACLs

Recommended IP Telephony Architecture

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

April 11, (Revision 2)

INFORMATION SECURITY TRAINING CATALOG (2015)

Web App Security Audit Services

Exam Questions SY0-401

SonicWALL PCI 1.1 Implementation Guide

CESG Certification of Cyber Security Training Courses

CS5008: Internet Computing

BYOD Guidance: BlackBerry Secure Work Space

Cisco Packet Tracer 6.3 Frequently Asked Questions

Course Title: Penetration Testing: Security Analysis

Introduction on Low level Network tools

Introduction to Endpoint Security

Vulnerability Assessment and Penetration Testing

Certified Ethical Hacker Exam Version Comparison. Version Comparison

McAfee Certified Assessment Specialist Network

NETWORK SECURITY (W/LAB) Course Syllabus

Codes of Connection for Devices Connected to Newcastle University ICT Network

1. LAB SNIFFING LAB ID: 10

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

End User Devices Security Guidance: Apple ios 8

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

SENSITIVE AUSTRALIAN SPORTS COMMISSION ATHLETE MANAGEMENT SYSTEM (AMS) SMARTBASE SECURITY TEST PLAN. Final. Version 1.0

SSL VPN Technology White Paper

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Guidance Regarding Skype and Other P2P VoIP Solutions

IBM. Vulnerability scanning and best practices

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

General Network Security

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard

Information Security Services

Build Your Own Security Lab

Security. TestOut Modules

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

CEH Version8 Course Outline

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.

Cisco Networking Professional-6Months Project Based Training

End User Devices Security Guidance: Apple OS X 10.10

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Network Security and Firewall 1

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance

Securing Networks with PIX and ASA

BlackBerry 10.3 Work and Personal Corporate

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security ( )

Transcription:

January 2016 Issue No: 2.0 Application Guidance CCP Penetration Tester Role, Practitioner Level

Tester Role, Practitioner Level Issue No: 2.0 January 2016 The copyright of this document is reserved and vested in the Crown. Document History Version Date Comment 1.0 August 2014 First issue 2.0 January 2016 Second issue

Purpose & Intended Readership This document is intended as a guide on how to structure evidence when applying for certification as a CESG Certified Professional (CCP) Penetration Tester at Practitioner level and includes suggestions of what you need to learn and know before applying. It complements the CESG Certification for IA Professionals (reference [a]]) and the Guidance to CESG Certification for IA Professionals publication (reference [b]). Executive Summary CESG has developed a framework for certifying IA Professionals who meet competency and skill requirements for specified IA roles. The purpose of certification is to enable better matching between requirements for IA Professionals and the competence and skills of those undertaking common IA roles. The framework was developed in consultation with Government departments, academia, industry, the certification bodies and members of the CESG Listed Adviser Scheme (CLAS). The framework includes a set of IA role definitions and a certification process. This document provides guidance for applicants for certification as a CCP Penetration Tester at Practitioner level. Feedback CESG welcomes feedback and encourage readers to inform CESG of their experiences, good or bad, in respect to this document. Please email: enquiries@cesg.gov.uk Page 1

Contents: Overall Requirements for the Penetration Tester Role, Practitioner Level... 3 Penetration Testing... 3 Practitioner Penetration Tester Role Headline Statement SFIA Responsibility Level 3... 4 Applying for CCP Scheme Certification... 4 Qualifications... 4 Knowledge Requirements for the Penetration Tester Role... 4 Knowledge... 6 Engagement, Legislation and Risk.. 6 Core Technical Knowledge... 8 Information Gathering... 10 Networking... 10 Microsoft Windows Security Assessment... 12 UNIX Security Assessment... 13 Databases... 15 Web Technologies... 15 Physical Access and Security... 17 Web Application Security Assessment... 18 Skills... 19 Experience... 25 The Certification Process next steps... 26 Practitioner Penetration Tester APMG Certification Process... 27 Practitioner Penetration Tester BCS Certification Process... 28 Practitioner Penetration Tester IISP Certification Process... 29 The CCP Scheme Certification Learning Cycle... 30 References... 31 Glossary... 32 Page 2

Overall Requirements for the Penetration Tester Role, Practitioner Level Key Principles This document is intended as a guide on how to structure evidence when applying for certification as a CESG Certified Professional (CCP) Penetration Tester at Practitioner level and includes suggestions of what you need to learn and know before applying. It complements the CESG Certification for IA Professionals and the Guidance to CESG Certification for IA Professionals documents (references [a] and [b])). Learning comes through acquiring skills and knowledge (from training, experience and seeing how others work) and putting these into practice. Some Penetration Testers will have carried out other roles previously, eg, Systems Administration or working in a Security or Network Operations Centre. Most, but not all, Practitioner Penetration Tester candidates will need at least 6-12 months of penetration testing experience before applying. This document outlines the basic skills and experience you need. You are encouraged to follow the advice in each section when completing your written submission of evidence. Penetration Testing Penetration testing is an independent assessment of the different elements that comprise an information system or product, with the goal of finding and documenting the vulnerabilities present. The resulting report is considered with threat reports and other information sources in order to derive a risk assessment that can be used to drive security improvements. The role of a penetration tester is to: ensure that any testing activity is lawful, compliant with all relevant regulations and within the agreed scope conduct technical security tests against the information system or product, with the aim of identifying vulnerabilities communicate the results of the tests at a level tailored to the audience provide technical consultancy and recommendations to customers as to how any reported vulnerabilities could be mitigated Page 3

Practitioner Penetration Tester Role Headline Statement SFIA Responsibility Level 3 Applies knowledge and contributes to the successful delivery of penetration testing services Applying for CCP Scheme Certification Qualifications The mandatory qualifications listed here www.cesg.gov.uk/awarenesstraining/certifiedprofessionals/pages/index.aspx are recognised by CESG as demonstrating compliance with the knowledge requirements associated with this role and documented below. An applicant for this role must therefore hold at least one of the listed mandatory qualifications required for the role level, which must be valid when the assessment is made by the Certification Body (CB) (ie, the qualification must not have expired) Knowledge Requirements for the Penetration Tester Role The knowledge requirements for the Penetration Testing roles are detailed below. Although a single set of knowledge requirements applies to all four levels, the depth of understanding and experience an applicant will be required to demonstrate will differ with respect to the role claimed. The mandatory technical qualifications, where listed, will demonstrate full compliance with the knowledge requirements of each level. You should also check the website of the (CB) you wish to use, for any additional requirements it may have. If you consider that there are gaps in your skills, knowledge and experience, agree a plan with your manager to address these, eg, through placements, projects, training, coaching - before you apply for CCP certification The following statement should be applied for assessment of candidates for certification as a Practitioner Penetration Tester. Practitioner Penetration Tester - A candidate will have a basic understanding of the concepts and technology detailed in the knowledge requirements. He/she You will be able to apply appropriate tools and techniques whilst working under general direction and supervision, and will require regular assistance with the interpretation of findings. Your depth of technical knowledge and level of experience will represent significant areas of further development Your written submission must show that you: meet the Role Headline Statement for the Penetration Tester role ( Applies knowledge and contributes to the successful delivery of penetration testing services see above) Page 4

work under general supervision and on discrete tasks when performing penetration tests demonstrate an analytical and systematic approach to penetration testing, and are able to apply your own initiative and discretion understand and are able to apply appropriate tools and techniques during a penetration test, and work in accordance with relevant legislation and standards perform penetration tests in a variety of environments work as part of a larger team and assist senior colleagues in delivering successful penetration tests demonstrate effective communication skills with colleagues, and when providing input to written reports and presentations have regular working level-contact with customers actively develop your understanding of penetration testing, and understand how penetration testing is to be applied and delivered to a customer demonstrate the required skill levels from the Institute of Information Security Professionals (IISP) Skills Framework1 demonstrate all of the attributes of responsibility (autonomy, influence, complexity and business skills) from the Skills Framework for the Information Age (SFIA) 2 at level 3. Alternatively you can show evidence of least level 2 for the IISP J skills Good penetration testing combines technical, business and people skills to provide easily understood information about system security vulnerabilities for the people who need to take action on the advice you give. You need to understand the business objectives, strategy and risk appetite, as well as the system and applications you work on. You need people skills to ensure that you explain your findings and secure all the information you need, for example when considering security incidents. You also need to ensure that all your testing operates within the appropriate legal frameworks. 1 The IISP Skills Framework is copyright The Institute of Information Security Professionals. All rights reserved. The Institute of Information Security Professionals IISP M.Inst.ISP and various IISP graphic logos are trademarks owned by the Institute of Information Security Professionals and may be used only with express permission of the Institute. 2 SFIA Foundation at www.sfia.org.uk Page 5

In no priority order, you need: Skills: Negotiating Influencing Information-gathering Communication able to talk to specialists and non-specialists alike Vulnerability assessment and management Business writing (all the information needed for a decision, on 1 side of A4) Presentation Stakeholder management And familiarity with the following: Knowledge Penetration testing methodologies Penetration testing standards and policies The CESG Certification for IA Professionals and Guidance to CESG Certification for IA Professionals documents Technical IA controls Engagement, Legislation and Risk Engagement Life-Cycle - understands: the penetration testing life-cycle, from the initial client contact, to the delivery of the final report and subsequent consultancy work the structure of a penetration test, including all relevant processes and procedures the different types of penetration test, such as infrastructure and application, white and black-box penetration testing methodologies and follows these when required. These include methodologies defined by the tester s employer, together with recognised standards, such as CHECK and can articulate the benefits a penetration test will bring to a client and can accurately convey the results of the penetration testing in a verbal de-brief and written report Page 6

Scoping - understands: client requirements and can produce an accurate and adequately resourced penetration testing proposal technical, logistical, financial and other constraints, and is able to take these into account without compromising the effectiveness of the penetration test Legal Matters - understands the legislation pertaining to penetration testing and can give examples of compliance/non-compliance. This legislation includes: Computer Misuse Act 1990 Data Protection Act 1998 Human Rights Act 1998 Police and Justice Act 2006 Police and Criminal Evidence Act 1984 Regulation of Investigatory Powers Act 2000: also understands the impact this legislation has on the penetration testing process and the ethical issues associated with penetration testing non-disclosure agreements and complies with their requirements Understanding and Mitigating Risk - understands: the risks associated with a penetration test and how these can be mitigated the importance of availability and how the risk of a denial of service can be reduced the importance of client confidentiality Record Keeping and Reporting - understands: the reporting requirements mandated by internal and external standards the importance of keeping accurate and structured records during a penetration test, including the output of tools the security requirements associated with record keeping, both during the penetration test and following the delivery of the final report and can write a report from the information gathered during a penetration test how to categorise vulnerabilities with respect to recognised methodologies, e.g. CVE, BID, CVSS Page 7

Platform Preparation: is able to prepare for a penetration test with regard to the required hardware and software ensures all necessary hardware is available, including laptops, switches, media-converters and wireless devices ensures all operating system and testing tools are relevant and up-to-date takes steps to avoid data cross-contamination, for example. by sanitising a hard disk prior to deployment or taking an image from a master build Core Technical Knowledge IP Protocols - understands: IPv4 and IPv6 and their associated security attributes common IP/Ethernet protocols and their associated security attributes, including: TCP; UDP; ICMP; ARP; DHCP; DNS; CDP; HSRP; VRRP; VTP; STP and TACACS+ the security implications of using clear-text protocols, such as Telnet and FTP File System Permissions and System Processes - understands: and can demonstrate the manipulation of file system permission on UNIXlike and Windows operating systems how insecure file system permissions can be exploited to escalate privileges and/or gain further access to a host and can find interesting files on an operating system, e.g. those with insecure or unusual permissions, or containing user account passwords and can identify running processes on UNIX-like and Windows operating systems and exploit vulnerabilities to escalate privileges Cryptography - understands: cryptography and its use in a networked environment common encrypted protocols and software applications, such as SSH, SSL, IPSEC and PGP wireless protocols that support cryptographic functions, including: WEP; WPA; WPA2; TKIP; EAP; LEAP; PEAP their associated security attributes and how they can be attacked the differences between symmetric and asymmetric cryptography and can give examples of each common cryptographic algorithms, such as DES, 3DES, RSA and AES, including their security attributes and how they can be attacked Page 8

common hash functions, such as MD5 and SHA1, including their security attributes and how they can be attacked Message Authentication Codes (MACs) and Hashed MACs (HMACs) Pivoting - understands: the concept of pivoting through compromised devices and can demonstrate pivoting through a number of devices in order to gain access to targets on a distant subnet Using Tools and Interpreting Output - can: use a variety of tools during a penetration test, selecting the most appropriate tool to meet a particular requirement interpret and understand the output of tools, including those used for port scanning, vulnerability scanning, enumeration, exploitation and traffic capture Packet Generation - understands: the different types of packets that are likely to be encountered during a penetration test and can generate arbitrary packets, including TCP, UDP, ICMP and ARP, modifying packet parameters as required, e.g. source and destination IP addresses, source and destination ports, and TTL ARP spoofing and can demonstrate this technique in a safe and reliable way Service Identification can: identify the network services offered by a host state the purpose of an identified network service, and determine its type and version Fingerprinting understands active and passive operating system fingerprinting techniques and can demonstrate their use during a penetration test. Traffic Filtering and Access Control - understands: network traffic filtering and where this may occur in a network the devices and technology that implement traffic filtering, such as firewalls, and can advise on their configuration and can demonstrate methods by which traffic filters can be bypassed network access control systems, such as 802.1x and MAC address filtering, and can demonstrate how these technologies can be bypassed Page 9

Patch Levels - can obtain operating system patch levels on UNIX-like and Windows operating systems. Information Gathering Domain Registration - understands the format of a WHOIS record and can obtain such a record to derive information about an IP address and/or domain. DNS - understands: the Domain Name Service (DNS) including queries and responses, zone transfers, and the structure and purpose of records, including: SOA, NS, MX, A, CNAME; PTR, TXT and HINFO and can demonstrate how a DNS server can be queried to obtain the information detailed in these records and can demonstrate how a DNS server can be queried to reveal other information that might reveal target systems or indicate the presence of security vulnerabilities Web Site Analysis - can interrogate a website to obtain information about a target network, such as the name and contact details of the network administrator. Search Engines, News Groups and Mailing Lists - can use search engines, news groups, mailing lists and other services to obtain information about a target network, such as the name and contact details of the network administrator. Information Leakage - can obtain information about a target network from information leaked in email headers, HTML meta tags and other locations, such as an internal network IP addresses. Banner Grabbing - can enumerate services, their software types and versions, using banner grabbing techniques. SNMP can retrieve information from SNMP services and understands the MIB structure pertaining to the identification of security vulnerabilities. Networking Network Architecture understands: network architectures and logical network diagrams the security benefits of tiered architectures, DMZs and air-gaps the security implications of shared media and can exploit its vulnerabilities during a penetration test Network Routing understands: network routing and its associated protocols, including: RIP, OSPF, IGRP, EIGRP, BGP, EGP, IGMP the security attributes of these protocols Page 10

Network Mapping - can: demonstrate the mapping of a network using a range of tools, such as traceroute, tcptraceroute and ping, and by querying active services, such as DNS and SNMP servers present the map as a logical network diagram, detailing all discovered subnets and interfaces, including routers, switches, hosts and other devices accurately identify all hosts on a target network that meet a defined set of criteria, e.g. to identify all FTP servers or CISCO routers Management Protocols - understands: Traffic Analysis: and can demonstrate the use of protocols often used for the remote management of devices, including: Telnet, SSH, HTTP/HTTPS, SNMP, TFTP, NTP the security attributes of these protocols and can demonstrate how these services can be exploited to gain access to a device or derive further information about the target network, e.g. SNMP service enumeration or the exploitation of a vulnerable Cisco HTTP server can intercept and monitor network traffic, capturing it to disk in a format required by analysis tools understands and can demonstrate how network traffic can be analysed to recover user account credentials and detect vulnerabilities that may lead to the compromise of a target device Configuration Analysis: understands configuration files of Cisco routers and switches, and can advise on how their security can be approved (most common features, such as access-lists and enabled services) can interpret the configuration files of other network devices, including those produced by a variety of vendors (most common features, such as access-lists and enabled services) Routers and Switches - understands and can demonstrate the exploitation of vulnerabilities in routers and switches, including the use of the following protocols: Telnet, HTTP/HTTPS, TFTP SNMP. VoIP - understands VoIP services, such as SIP, and can identify and fingerprint devices offering these services. Page 11

Microsoft Windows Security Assessment Reconnaissance can: Enumeration can: identify Windows hosts on a target network identify domains, domain controllers, domain members and workgroups enumerate accessible Windows shares perform user and group enumeration on target systems and domains, using protocols including: NetBIOS, LDAP, and SNMP obtain other information, such as password policies Active Directory understands: Active Directory Group Policy Local Security Policy user accounts and can manipulate these accounts to gain further access to a target system, e.g. by escalating privileges from a domain user to a domain admin Passwords understands: password policies, including complexity requirements and lock-out how to avoid causing a denial of service by locking-out accounts Windows password hashing algorithms and their associated security attributes how passwords are stored and protected, and can demonstrate how they can be recovered and can demonstrate off-line password cracking using dictionary and brute-force attacks, including the use of rainbow tables and can demonstrate the recovery of password hashes when given physical access to a Windows host Remote Vulnerabilities - understands and can demonstrate the remote exploitation of Windows operating system and third-party software application vulnerabilities. Local Vulnerabilities - understands and can demonstrate: the local exploitation of Windows operating system and third-party software application vulnerabilities local privilege escalation techniques, e.g. through the manipulation of insecure file system permissions Page 12

Post Exploitation - understands and can demonstrate common post-exploitation activities, including: password recovery, including cached credentials; lateral movement and domain compromise; the checking of operating system and third party software application patch levels. Desktop Lockdown - understands the concept of desktop lockdown and can demonstrate how a user can break-out of a locked down environment. Patch Management - understands common patch and software management techniques and applications, including WSUS and Alteris. UNIX Security Assessment Reconnaissance - can identify UNIX hosts on a target network. Enumeration: can perform user enumeration on target system using a variety of techniques including remote login protocols, SMTP, finger and SNMP can perform file system enumeration on a target system using a variety of techniques including remote login protocols, FTP, HTTP, NFS and TFTP is aware of legacy user enumeration techniques such as rusers and rwho can enumerate RPC services and identify those with known security vulnerabilities Passwords - understands: users, groups and password policies, including complexity requirements and lock-out how to avoid causing a denial of service by locking-out accounts the format of the passwd, shadow, group and gshadow files UNIX password hashing algorithms and their associated security attributes how passwords are stored and protected, and can demonstrate how they can be recovered and can demonstrate off-line password cracking using dictionary and brute-force attacks and can demonstrate the recovery of password hashes when given physical access to a UNIX host Remote Vulnerabilities - understands and can demonstrate the remote exploitation of Solaris and Linux operating system vulnerabilities (several key remote vulnerabilities are detailed individually within this section). Page 13

Local Vulnerabilities - understands and can demonstrate: the local exploitation of Solaris and Linux operating system vulnerabilities local privilege escalation techniques, e.g. through the manipulation of insecure file system permissions Post Exploitation - understands and can demonstrate common post-exploitation activities, including: password recovery, lateral movement, the checking of operating system and third party software application patch levels. FTP/TFTP - understands: NFS understands: FTP and can demonstrate how a poorly configured FTP server can be exploited, e.g. the downloading of arbitrary files, the uploading and overwriting of files, and the modification of file system permissions TFTP and can demonstrate how a poorly configured TFTP server can be exploited, e.g. the downloading of arbitrary files, the uploading over-writing of files NFS and its associated security attributes, and can demonstrate how exports can be identified and can demonstrate how a poorly configured NFS service can lead to the compromise of a server, allow a user to escalate privileges and/or gain further access to a host, e.g. through the creation of SUID-root files, the modification of files and file system permissions, and UID/GID manipulation Berkeley r-services understands: SSH understands: X understands: the Berkeley r-services and their associated security attributes, and can demonstrate how trust relationships can lead to the compromise of a server, allow a user to escalate privileges and/or gain further access to a host, e.g. through the use, creation or modification of.rhosts and/or /etc/hosts.equiv files SSH and its associated security attributes, including the different versions of the protocol, version fingerprinting and how the service can be used to provide a number of remote access services and can demonstrate how trust relationships can lead to the compromise of a server, allow a user to escalate privileges and/or gain further access to a host, e.g. through the use, creation or modification of ~/.ssh/authorized_keys files its associated security attributes, and can demonstrate how insecure sessions can be exploited, e.g. by obtaining screen shots, capturing keystrokes and injecting commands into open terminals. Page 14

Databases Microsoft SQL Server - understands and can demonstrate: Oracle: the remote exploitation of Microsoft SQL Server how access can be gained to a Microsoft SQL server through the use of default accounts credentials and insecure passwords how to identify and extract useful information stored within a database (e.g. user account names and passwords, recovering passwords where possible) following the compromise of Microsoft SQL server how to use stored procedures to execute system commands, escalate privileges, read/write from/to the file system, and/or gain further access to a host understands and can demonstrate the remote exploitation of an Oracle database understands the security attributes of the Oracle TNS Listner service understands and can demonstrate how access can be gained to an Oracle database server through the use of default accounts credentials and insecure passwords can identify and extract useful information stored within a database (e.g. user account names and passwords, recovering passwords where possible) can demonstrate how the software version and patch status can be obtained from an Oracle database following the compromise of an Oracle database server, can use stored procedures to execute system commands, escalate privileges, read/write from/to the file system, and/or gain further access to a host Other Database Servers: Web Technologies Web servers: understands and can demonstrate the remote exploitation of other common database servers, such as MySQL and PostgreSQL understands and can demonstrate how access can be gained to such a database server through the use of default accounts credentials and insecure passwords can identify and extract useful information stored within a database (e.g. user account names and passwords, recovering passwords where possible) can identify web servers on a target network and can remotely determine their type and version Page 15

understands and can demonstrate the remote exploitation of web servers understands the purpose, operation, limitation and security attributes of web proxy servers Protocols and Methods - understands: and can demonstrate the use of web protocols, including: HTTP, HTTPS, SOAP and can demonstrate how the insecure implementation of software developed using these languages can be exploited all HTTP methods and response codes Reconnaissance - understands: the purpose of web site and application reconnaissance and can discover the structure of a web site and application Languages - understands: common web mark-up and programming languages, including:.net, ASP, Perl, PHP, JSP, JavaScript and can demonstrate how the insecure implementation of software developed using these languages can be exploited (candidate may select two languages) APIs understands and can demonstrate: the use of web-based APIs to remotely access remote services how the insecure implementation of web-based APIs can be exploited Information Gathering can gather information: from a web site and application mark-up or programming language, including: hidden form fields; database connection strings; user account credentials; developer comments; external and/or authenticated-only URLs about a web site and application from the error messages it generates Authentication - understands common authentication and access-control mechanism vulnerabilities, and can give examples of common vulnerabilities and implementation best practice. Input Validation - understands the importance of input validation and how it can be implemented, eg, white-lists, black-lists and regular expressions. Fuzzing - understands: fuzzing and its use in web application testing the generation of fuzzing strings and their potential effects, including the dangers they may introduce Page 16

XSS - understands cross-site-scripting (XSS) and can demonstrate the launching of a successful XSS attack. Injection - understands injection vulnerabilities, including: code injection, SQL injection, XML injection. Blind SQL Injection - understands blind SQL injection vulnerabilities. Sessions - understands how sessions are managed and can give examples of common vulnerabilities and implementation best practice. Cryptography - understands: how cryptography can be used to protect data in transit and data at rest, both on the server and client side the concepts of SSL and can determine whether a SSL-enabled web server has been configured in compliance with best practice (ie, it supports recommended ciphers and key lengths) Code Review - understands the techniques for identifying vulnerabilities in source code. Physical Access and Security Locks - understands how locks can be used to restrict access to computer hardware. Tamper Seals - understands how tamper seals can be used to deter access to computer hardware. Platform Integrity - understands platform integrity technologies, e.g. TPM. Boot Sequence - understands the BIOS boot sequence and can obtain privileged access to an operating system by exploiting vulnerabilities in a boot sequence configuration, eg, booting from removable media or enabling PXE boot. Disk Encryption: understands the security implications of unencrypted storage devices, such as hard disks can demonstrate how data can be recovered from unencrypted storage devices, and how such data can be manipulated to introduce vulnerabilities into an operating system. Recovery Functionality - understands the security attributes of operating system recovery functionality, eg, Windows Recovery Console and Safe Mode. Multi-Factor Authentication - understands multi-factor authentication systems, such as tokens and SMS. Page 17

Web Application Security Assessment The knowledge requirements for Web Application Security Assessment apply to those who demonstrate this particular technical specialism within the wider Penetration Tester role. It is acknowledged that such a specialism may result in a Penetration Tester having a lesser understanding of the knowledge requirements detailed in the sections on Networking, Microsoft Windows Security Assessment and Unix Security Assessment. This is captured by the providers of the mandatory qualifications detailed within the role definition and need not be further explored by the Certification Body. The knowledge requirements for Web Application Security Assessment are defined in the OWASP Testing Guide v4. See http://www.owasp.org/ for further information and to obtain a copy of this guide. To avoid duplication, these requirements have not been repeated in this document; however, the mandatory sections to be included and the associated knowledge requirements are detailed below: Information Gathering Configuration & Deploy Management Testing Identity Management Testing Authentication Testing Authorisation Testing Session Management Testing Data Validation Testing Error Handling Cryptography Logging Business Logic Testing Denial of Service Web Service Testing Client Site Testing Page 18

Skills When presenting your skills evidence, use the STAR format: Situation, Task, Action, Result Use a narrative form, eg,... I produced...my decision was... You must meet the required levels at all 4 core skills - (A2 Policy and Standards, D2 Security Testing, E3 Vulnerability Assessment, I3 Applied Research) You must meet 75% of the remaining skills A single piece of work may be used for several skills, but a variety of examples gives better evidence of being able to work in more than one situation The following table provides suggestions for starting points in evidence. SKILL A2 Policy & Standards, Level 1 - Core Skill Understands the need for policy and standards to achieve Information Security (IS) A6 Legal & Regulatory Environment, Level 1 Is aware of major pieces of legislation relevant to Information Security and of regulatory bodies relevant to the sector in which they work Technical Skills EVIDENCE OF SKILL Give examples of: - your experience of IS policies and standards. How does penetration testing fit within your company s information security policy? Give examples from different work environments of how you: - ensured that your work didn t contravene relevant statue/regulations and how you explained this to your customer(s). For example, the Computer Misuse Act prohibits breaking into a system but the contract you were employed on might require or permit this. Page 19

SKILL A7 Third Party Management 3 Level 1 Is aware of the need for organisations to manage the information security of third parties B1 Risk Assessment, Level 1 Demonstrates awareness of the causes of information risk and their implications B2 Risk Management, Level 1 Demonstrates awareness of techniques to manage information risk C1 Security Architecture, Level 1 Is aware of the concept of architecture to reduce information risk C2 Secure Development, Level 1 Is aware of the benefits of addressing security during system development EVIDENCE OF SKILL Give examples of how you: - advised a customer s supplier about the vulnerabilities in their information systems. Give examples of how you: - Identified vulnerabilities and risks in a number of different systems. Give examples of how: - IT systems risk and vulnerabilities are managed and advice you have given to mitigate these. Describe how you have advised on modifications to IA architecture to mitigate potential information risk. What was the outcome? Explain how security and secure development of products and systems are improved by penetration testing. 3 Skill only required if information systems or services are provided by a third party Page 20

SKILL D1 IA Methodologies Level 1 Is aware of the existence of methodologies, processes and standards for providing Information Assurance D2 Security Testing, Level 1 - Core Skill Is aware of the role of testing to support IA E1 Secure Operations Management, Level 1 Is aware of the need for secure management of information systems E2 Secure Ops & Service Delivery, Level 1 Is aware of the need for information systems and services to be operated securely E3 Vulnerability Assessment, Level 2 - Core Skill Obtains and acts on vulnerability information in accordance with Security Operating Procedures EVIDENCE OF SKILL How is appropriate and proportionate penetration testing carried out in your organisation? Give examples over a range of environments of: different ways in which you have tested the security of systems. Which frameworks did you use? Explain what level of security was achieved and what system vulnerabilities remained. What was the outcome of your work? Give examples of tests you have carried out to detect vulnerabilities how did you do this? What changes to corporate security processes or systems could you recommend to mitigate vulnerabilities? Give examples of how you have influenced a customer to mitigate security risks. Give examples from different work environments of occasions when you identified vulnerabilities in a system or application. What tools and methodologies did you use and how did you make colleagues and/or customers aware of the vulnerabilities? What did you do to mitigate the vulnerabilities and what was the outcome? Page 21

SKILL F1 Incident Management, Level 1 Is aware of the benefits of managing security incidents F2 Investigation, Level 1 Is aware of basic principles of investigations F3 Forensics, Level 1 Is aware of the capability of forensics to support investigations G1 Audit and Review, Level 1 Understands basic techniques for testing compliance with security criteria (policies, standards, legal and regulatory requirements) H1 Business Continuity Planning and H2 Business Continuity Management, Level 1 Understands how Business Continuity Planning & Management contributes to information security I3 Applied Research, Level 1 Core Skill Understands the fundamental concepts of EVIDENCE OF SKILL Provide examples of how security incidents are managed in the organisation(s) you work in. How does this improve cyber security? Give examples of how information is collected in order to investigate a security incident. What sources can be used and why? What information can be recovered through the use of forensic tools? Give examples of auditing a system to test for vulnerabilities. How did this improve the scope of the vulnerability testing? How did you communicate the results to information risk owners and what was the outcome of this? Describe how you incorporated business continuity management into your vulnerability testing and your advice on vulnerability mitigations. Give examples from different work environments of: - how you have used your research as part of penetration testing. How did that research support the overall security assessment process? Page 22

applied research but does not yet have the knowledge needed to apply this skill in an operational context - areas you have found where further research is needed. How could that research be used to enhance levels of security? - research you have used when considering how vulnerability testing tools or techniques could be improved PEOPLE SKILLS J skills (instead of SFIA level 3 see p4) SKILL EVIDENCE OF SKILL J1 - Teamwork and Leadership - Level 2 Give examples of sharing information and knowledge with others to promote team objectives. Is encouraging and supportive and provides a lead within the local area. Task-based team working J2 - Delivering Level 2 Give examples of tasks which you delivered to deadlines. Responsibility for an element of delivery against one or more business objectives, balancing priorities to achieve this J3 Managing Customer Relationships Describe ways in which you have worked with customers to agree solutions. Level 2 Negotiates with customers to improve the service to them and to manage their expectations J4 - Corporate Behaviour Level 2 Give examples of proposals you have made to mitigate security vulnerabilities. Understands the aims of own and related areas across an organisation J5 Change and Innovation Level 2 What changes have you introduced what did you do, what techniques did you use and why? Generates creative ideas and demonstrates sensitivity in implementing local change How did you consider the impact on other people and processes? Page 23

SKILL J6 - Analysis and Decision Making Level 2 Makes effective decisions in consultation with others and/or solves complex problems in immediate area J7 Communication and Knowledge Sharing Level 2 Encourages and contributes to discussion. Is proactive in sharing information in own work area EVIDENCE OF SKILL Give examples of recommendations and solutions you have suggested. What was the outcome in these cases? Give examples of how you have adapted your communication to suit different media, including face to face, over the phone, emails, presentations and meetings: eg, - contributing to reports - stand up briefings What outcomes have you achieved? Page 24

Experience Agree a plan with your manager to ensure that you cover the necessary ground, as suggested below. Your evidence should show that you have: assisted in, or carried out penetration testing under supervision or in a team, in a variety of environments and ensured that the testing was consistent with risk appetite and tolerance, as well as conforming to all legal requirements and regulations Or have experience in a technical/information security role (such as a System Administrator) or SOC/NOC analyst You must show that you do penetration testing and that your testing follows a systematic and appropriately analytic process have some experience of using penetration testing tools and techniques effectively communicate the outcomes and implications of penetration tests to colleagues and/or customers and ensure that they understand them can recognise when a decision must be escalated because of implications beyond your level of responsibility or experience are developing your understanding of penetration testing and associated research Page 25

The Certification Process next steps For completeness the certification processes for the different CBs follow. 1. If you are considering applying for the Senior or Principal level, you will need to show wider experience of more complex systems and satisfy the requirement for higher skill levels and the appropriate technical qualification (s). Supervisory experience to show evidence of coaching and developing other Penetration Testers would also be helpful for the Senior level and consultancy experience would be appropriate for the Principal level. 2. If you are applying for the Lead level, you will need to show that you influence and direct the penetration testing function at an organisational or inter-organisational level and satisfy the requirement for higher skill levels. For example, you directly and regularly brief or advise a Directors Board in this regard. There are 3 CBs: the APM Group (www.apmg-ia.com ), BCS, the Chartered Institute for IT (www.bcs.org ) and the IISP, RHUL and CREST Consortium (www.iisp.org ). Certification lasts for 3 years and requires evidence of continuing professional development throughout the period of certification. Page 26

End of certification proces s Interview Certification decis ion APMG CREST Practitioner Security Analyst OR G CH Q Practitioner Penetration Tes ter Apply online Practitioner Penetration Tester APMG Certification Process Technical evaluation Written submission Personal evaluation AMPG Certification Process Page 27

End of Certification Process BCS interview certification decision assessment written submission CREST Practitioner Security Analyst OR GCHQ Practitioner Penetration Tester PLUS CISMP apply online Practitioner Penetration Tester BCS Certification Process BCS Certification Process Page 28

End of Certification Process Recommendation IISP CREST Practitioner Security Analyst & certification OR decision interview GCHQ Practitioner Penetration Tester apply online Practitioner Penetration Tester IISP Certification Process assessment written submission IISP Certification Process Page 29

The CCP Scheme Certification Learning Cycle If more learning is needed, make a time-bounded plan to achieve it Page 30

References [a] CESG Certification for IA Professionals. Available from http://www.cesg.gov.uk/awarenesstraining/certifiedprofessionals/pages/index.aspx [b] Guidance to CESG Certification for IA Professionals. Available from http://www.cesg.gov.uk/awarenesstraining/certifiedprofessionals/pages/index.aspx Page 31

Glossary AES API ARP BGP BIOS CDP CHECK CNAME CVSS DES DHCP DMZ DNS EAP EGP EIGRP FTP GID HINFO HMACs HSRP HTML HTTP HTTPS ICMP IGMP IGRP IPSEC LEAP LDAP MACs Advanced Encryption Standard Application Programming Interface Address Resolution Protocol Border Gateway Protocol Basic Input Output System Cisco Discovery Protocol IT Health Check Service Canonical Name Record Common Vulnerability Scoring System Data Encryption Standard Dynamic Host Configuration Protocol Demilitarized Zone (firewall configuration) Domain Name System Extensible Authentication Protocol Exterior Gateway Protocol Enhanced Interior Gateway Routing Protocol File Transfer Protocol Group Identifier Host Information Hashed MACs Hot Standby Router Protocol Hyper Text Mark Up Language Hypertext Transfer Protocol communications protocol for secure communication over a computer network Internet Control Message Protocol Internet Group Management Protocol Interior Gateway Routing Protocol Internet Protocol Security Programming language Lightweight Directory Access Protocol Message Authentication Codes Page 32

MD5 MIB MX NetBIOS NFS NS NTP OSPF OWASP PEAP PGP PTR PXE RIP RPC RSA SHA1 SIP SMTP SNMP SOA SOAP SQL SSH SSL STP SUID TACACS TCP TFTP TKIP TPM TTL TXT Message Digest algorithm cryptographic hash function Management Information Base Mail Exchanges Network Basic Input/Output System Network File System Name Server (implements a name service protocol) Network Time Protocol Open Shortest Path First Open Web Application Security Project Protected Extensible Authentication Protocol Pretty Good Privacy Pointer record Preboot execution environment Routing Information Protocol Remote Procedure Call public key cryptosystem (named after its authors) Secure Hash Algorithm cryptographic hash function Session Initiation Protocol Simple Mail Transfer Protocol Simple Network Management Protocol Service Oriented Architecture Simple Object Access Protocol Structured Query Language Secure Shell Secure Sockets Layer Straight through Processing Set Owner User ID up Terminal Access Controller Access-Control System Plus Transmission Control Protocol Trivial File Transfer Protocol Temporal Key Integrity Protocol Trusted Platform Module Transistor-Transistor Logic Text file Page 33

UDP UID URL VOIP VRRP VTP WEP WPA WSUS XML User Datagram Protocol User Identifier Uniform Resource Locator Voice Over Internet Protocol Virtual Router Redundancy Protocol VLAN (Virtual Local Area Networks) Trunking Protocol Wired Equivalent Privacy Wifi-protected access Windows Server Update Services Extensible Mark Up Language Page 34

CESG Provides advice and assistance on information security in support of UK Government. Unless otherwise stated, all material published on this website has been produced by CESG and is considered general guidance only. It is not intended to cover all scenarios or to be tailored to particular organisations or individuals. It is not a substitute for seeking appropriate tailored advice.

CESG Enquiries Hubble Road Cheltenham Gloucestershire GL51 0EX Tel: +44 (0)1242 709141 Email: enquiries@cesg.gsi.gov.uk Crown Copyright 2015.