Security Testing: Step by Step System Audit with Rational Tools. First Presented for:



Similar documents
If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Course Title: Penetration Testing: Security Analysis

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

CRYPTUS DIPLOMA IN IT SECURITY

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Alteon Browser-Smart Load Balancing

THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6

Certified Ethical Hacker Exam Version Comparison. Version Comparison

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

ICANWK406A Install, configure and test network security

Security Testing in Critical Systems

Networking: EC Council Network Security Administrator NSA

Certified Ethical Hacker (CEH)

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Crowbar: New generation web application brute force attack tool

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

T14 SECURITY TESTING: ARE YOU A DEER IN THE HEADLIGHTS? Ryan English SPI Dynamics Inc BIO PRESENTATION. Thursday, May 18, :30PM

INFORMATION SECURITY TRAINING CATALOG (2015)

Understanding Security Testing

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Who is Watching You? Video Conferencing Security

CISCO IOS NETWORK SECURITY (IINS)

Consensus Policy Resource Community. Lab Security Policy

CH ENSA EC-Council Network Security Administrator Detailed Course Outline


Payment Card Industry Self-Assessment Questionnaire

Java Web Application Security

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

No. Time Source Destination Protocol Info HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1.

SANS Top 20 Critical Controls for Effective Cyber Defense

Introduction to Cyber Security / Information Security

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Network Security: Introduction

CYBERTRON NETWORK SOLUTIONS

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

CEH Version8 Course Outline

New IBM Security Scanning Software Protects Businesses From Hackers

DNS Pinning and Web Proxies

ABB s approach concerning IS Security for Automation Systems

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Defending Against Data Beaches: Internal Controls for Cybersecurity

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Perspective on secure network for control systems in SPring-8

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

INFORMATION SECURITY FOR YOUR AGENCY

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Detailed Description about course module wise:

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

IT Networking and Security

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Cisco Advanced Services for Network Security

Information Security Attack Tree Modeling for Enhancing Student Learning

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Network Security Administrator

CIS 4204 Ethical Hacking Fall, 2014

Hackers are here. Where are you?

INFORMATION TECHNOLOGY ENGINEER V

Securing the Service Desk in the Cloud

Application Security Testing

NETWORK PENETRATION TESTING

Penetration Testing Service. By Comsec Information Security Consulting

EC-Council Certified Security Analyst (ECSA)

The Top Web Application Attacks: Are you vulnerable?

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

Network and Host-based Vulnerability Assessment

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Network Security: A Practical Approach. Jan L. Harrington

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Security Considerations White Paper for Cisco Smart Storage 1

Ethical Hacking Course Layout

Professional Penetration Testing Techniques and Vulnerability Assessment ...

SonicWALL PCI 1.1 Self-Assessment Questionnaire

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

LINUX / INFORMATION SECURITY

Innovative Defense Strategies for Securing SCADA & Control Systems

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Demystifying Penetration Testing

Transcription:

Security Testing: Step by Step System Audit with Rational Tools First Presented for: The Rational User's Conference Orlando, FL 2002 with: Chris Walters Scott Barber Chief Technology Officer PerfTestPlus, Inc. Security Audit Page 1

Agenda Threat Analysis Security Arenas & Policies Arsenal of Tools Security Audits - Security Test Plan - Systems Lockdown - Internal Testing - External Testing - Reporting Security Audit Page 2

Statistics of Breaches Threat Analysis 90% Detected computer security breach 80% Acknowledged financial loss due to breach 44% Will or able to quantify losses totaling $455,848,000 55% Reported denial of service (DOS) attacks Security Audit Page 3

Threat Analysis Cont. Examples - NIMDA Virus - Code Red - Remote Denial Of Service - AOL Instant Messenger Buffer Overflow Examples Security Audit Page 4

Security Arenas Access Control Systems Telecommunications & Networks Security Management Application & System Development Cryptography Architecture & Models Operations Security Law, Investigation, & Ethics Business Continuity & Disaster Recovery Physical Security Security Audit Page 5

Security Policy Risk Management - Incident Response - Point of Contact Disaster Recovery - Personal Data Backup Security Training - Social Engineering - Best Practices The Site Security Policies Procedure Handbook http://www.ietf.org/rfc/rfc2196.txt?number=2196 The SANS Security Policy Project http://www.sans.org/newlook/resources/policies/policies.htm Security Audit Page 6

Arsenal of Tools Tools that assist in providing security - Firewalls - AntiVirus - Network Topology Security Audit Page 7

Arsenal of Tools Cont. Tools that assist in auditing security - Rational TestStudio - Nessus - Internet Security Scanner Security Audit Page 8

Security Audits Security Test Plan Systems Lockdown Internal Testing External Testing Reporting Security Audit Page 9

Security Test Plan Gathering Data Hardware Architecture -Firewalls, Routers, Gateways, Switches -Web Servers -Database Servers Software Architecture -Client/Server -Web Based User Model -SysAdmin -DBA -General User Security Audit Page 10

Hardening Systems - Windows - Solaris - Linux Viruses etc. - Trojan Horses - Worms - Macros - Viruses Security Lockdown Security Audit Page 11

Firewalls - DMZ - Open Ports - Bypassing System Lockdown Security Audit Page 12

Internal Penetration Test Port Sniffing #include <VU.h> string host = "www.rational.com"; int port, bytes; { push [Timeout_val=10, Think_avg=0, Connect_retries=0]; IP Aliasing in TestStudio for (port=20; port < 81; port++) { display (itoa(port)); sut = sock_connect("sut", host + ":" + itoa(port)); bytes; } } if (sut > 0) { set Server_connection = sut; sock_send ""; bytes = sock_isinput(); sock_nrecv ["sut~" + itoa(port)] } Security Audit Page 13

DEMO Hacking from the Inside Security Audit Page 14

External Penetration Test Packet Sniffing - Network Recording between servers ClearText Transmissions - Record possible unencrypted data traffic (Distributed) Denial Of Service Attack - Simulate using Virtual Testers with no delays in multiple locations Buffer Overflow - Playback with larger that allowed fields for POST data submissions Security Audit Page 15

External Penetration Test Cont. Brute Force Cracking - Playback with DataPools of usernames and passwords #include <VU.h> string host = "www.rational.com";{ push [Timeout_val=10, Think_avg=0, Connect_retries=0]; do { rational_com = http_request [Brute F~001] "www.rational.com:80", HTTP_CONN_DIRECT, "POST /login/loginprocess.jsp HTTP/1.1\r\n" "Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, applicat" "ion/vnd.ms-powerpoint, application/vnd.ms-excel, application/msword, */*\r\n" "Accept-Language: en-us\r\n" "Accept-Encoding: gzip, deflate\r\n" "User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)\r\n" "Host: www.rational.com\r\n" "Connection: Keep-Alive\r\n\r\n"; Security Audit Page 16

DEMO Breaking in with Robot Security Audit Page 17

Wireless Security WAP & ECC - Audit security at the gateway and beyond with TestStudio Emulators & TestStudio - Audit security between device and gateway 802.11 & WEP - Audit security using TestStudio just like on a wired network Security Audit Page 18

Reporting the Results Defect reporting - Incorporate ClearQuest Coverage reporting - Incorporate RequisitePro Custom reporting using TestStudio - Incorporate Manual test - Created using Crystal Reports and SoDA Security Audit Page 19

Common Security Holes Vulnerable CGI Programs Global File Shares Weak Passwords Default SNMP Settings Microsoft IIS Holes Social Engineering Vulnerable Security Audit Page 20

Other Resources Websites Books - www.sans.org - Maximum Security - www.happyhacker.org - Practical UNIX & Internet - www.antionline.com Security - www.securityfocus.com - Web Security & - csrc.nist.gov Commerce - www.antionline.com - - And many more! Building Internet Firewalls RFC Documents - - And many more! www.ietf.org/rfc.html Training Periodicals Security Audit Page 21

Conclusion If you are connected, you are at risk Security policies are required Incident response forms are a must Security audits are the only way to test your security Security Audit Page 22

Rational User Conferenc 2002 Questions? Security Audit Page 23

Contact Info Scott Barber Chief Technology Officer PerfTestPlus, Inc E-mail: sbarber@perftestplus.com Web Site: Security Audit Page 24