Goal Oriented Pentesting Getting the most value out of Penetration Testing



Similar documents
Hacking SAP BusinessObjects

Penetration Testing - a way for improving our cyber security

Secret Server Qualys Integration Guide

Penetration testing & Ethical Hacking. Security Week 2014

Penetration Testing in Romania

!!!!!!!!!!!!!!!!!!!!!!

Penetration Testing Getting the Most out of Your Assessment. Chris Wilkinson Crowe Horwath LLP September 22, 2010

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Pentesting for fun... and profit! David M. N. Bryan and Rob Havelt

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Passing PCI Compliance How to Address the Application Security Mandates

Real World Web Service Testing For Web Hackers

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Vulnerability Management

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Evolution of Penetration Testing

EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER

Introduction to Penetration Testing Graham Weston

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

The Top Web Application Attacks: Are you vulnerable?

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report

Penetration testing. A step beyond missing patches and weak passwords

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Patch and Vulnerability Management Program

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation

Web Application Security

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Protecting Your Organisation from Targeted Cyber Intrusion

Attack and Penetration Testing 101

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center

External Penetration Assessment and Database Access Review

Web Engineering Web Application Security Issues

Where every interaction matters.

Using Nessus In Web Application Vulnerability Assessments

The Security Gap. Philip Young aka Soldier of

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

IT HEALTHCHECK TOP TIPS WHITEPAPER

Bust a cap in a web app with OWASP ZAP

SANS Top 20 Critical Controls for Effective Cyber Defense

SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva

Penetration Testing. Security Testing

About Effective Penetration Testing Methodology

Newsletter - September T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER

HP WebInspect Tutorial

by Penetration Testing


InfoSec Academy Application & Secure Code Track

Network Security Audit. Vulnerability Assessment (VA)

Kerem Kocaer 2010/04/14

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Footprinting and Reconnaissance Tools

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Penetration Testing. Presented by

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

A Study on the Security aspects of Network System Using Penetration Testing

PCI Security Scan Procedures. Version 1.0 December 2004

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Information Security Services

Pass-the-Hash. Solution Brief

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

Using Free Tools To Test Web Application Security

BLIND SQL INJECTION (UBC)

Cenzic Product Guide. Cloud, Mobile and Web Application Security

Security Testing. How security testing is different Types of security attacks Threat modelling

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Exploiting Transparent User Identification Systems

Open Source Toolkit. Penetration Tester's. Jeremy Faircloth. Third Edition. Fryer, Neil. Technical Editor SYNGRESS. Syngrcss is an imprint of Elsevier

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

PCI Vulnerability Validation Report

Penetration Testing Services. Demonstrate Real-World Risk

Secrets of Vulnerability Scanning: Nessus, Nmap and More. Ron Bowes - Researcher, Tenable Network Security

PCI Requirements Coverage Summary Table

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

THE TOP 4 CONTROLS.

A Decision Maker s Guide to Securing an IT Infrastructure

Digi Device Cloud: Security You Can Trust

CRYPTUS DIPLOMA IN IT SECURITY

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

Virtually Pwned Pentesting VMware. Claudio

Top 20 Critical Security Controls

Designing & Building an Information Security Program. To protect our critical assets

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Penetration Testing Report Client: Business Solutions June 15 th 2015

Transcription:

Goal Oriented Pentesting Getting the most value out of Penetration Testing June 15, 2010

About me Joshua Jabra Abraham Joined Rapid7 in 2006 as a Security Consultant Extensive IT Security and Auditing experience Worked as an enterprise risk assessment analyst for Hasbro Corporation Specializes in Network Pentesting, Web Application Audits and Custom Code Development Open-source code development projects Contributes to BackTrack LiveCD, BeEF, Nikto, Fierce, and PBNJ Past speaking engagements BlackHat, DefCon, ShmooCon, Infosec World, CSI, OWASP Conferences, LinuxWorld, Comdex and BLUG Twitter: http://twitter.com/jabra Blog: http://spl0it.wordpress.com

Breaking through a misconception How many times during a scoping call have you heard the customer say the goal of the assessment is to Hack Us?

Hack Us Is NOT good enough Hack Us is subjective What do you mean by Hack? How do you know when you are done? What is the success criteria for Hacking the customer? How do you measure the Hack?

Agenda The need for a better approach Goal Oriented Overview Defining SMARTER Goals Methods for Success Examples from the Field Summary/Q&A

Background Information The primary objective of all assessments is to demonstrate risk Difference between a risk rating from a vulnerability scanner and a business risk is that a business risk takes into account the value of each asset Vulnerabilities are found by automated tools A threat does not have to be demonstrated in order to constitute a risk.

Background Information Vulnerability Management Identify vulnerabilities (False positives / False negatives) Risk of 10 Vulnerabilities compared to 1000 Assign value to assets and data Penetration Testing Demonstrating Risk Methodology OSSTMM, OWASP etc

The need for a better approach How do you know what is MOST important? Achieve Domain Admin access on 1 st day Access to all data Maybe get lucky and guess right Shouldn t need to guess data X more valuable/important than data Y?

Which Data or Systems would you go after? With Control of The entire network OR.. all windows systems OR.. all *nix systems Evil Attacker - Destructive Evil Attack Financially motivated Consultant - Pentester Malicious System Admin Malicious Employee Malicious Executive

Raising the bar on penetration testing There are several technical methodologies Define what and how to test OWASP, OSSTMM and vulnerabilityassessment.co.uk Industry lacks a common process Outline a method to facilitate the testing process Ensure assessment/project completion

Agenda The need for a better approach Goal Oriented Overview Defining SMARTER Goals Methods for Success Examples from the Field Summary/Q&A

Real-World Pentesting Evil Attackers - Blackhats Financially Motivated Not limited by amount of time and/or resources Pentesters Whitehats Context / Goal Focused (experience, 6th sense, etc) Demonstrate real world risks, but limited by the time of the engagement A snapshot of the network/ application at a point in time

Clear Motivation Emulate a Blackhat, by using Goals as motivation Doesn t decrease the experience / 6 th sense elements Allows the pentestingteam to focus efforts on critical weaknesses

Goal Oriented Pentesting Non-technical methodology in which the process is the central focus Goals are focus points (drivers) for the assessment Provides the best (ROI) for organizations when they conduct a penetration assessment

Goals 101 Goals can be achieved in parallel or a serial process Each goal may have a number requirement for unique paths verified Discussed during scoping call Automated Testing Reconnaissance Port Scanning Vulnerability Scanning Exploitation Central Storage Engine Correlation Reporting View/Modify/Delete Data Manual Testing Context Based Focus Driven Goal Oriented

Agenda The need for a better approach Goal Oriented Overview Defining SMARTER Goals Methods for Success Examples from the Field Summary/Q&A

SMARTER Goals S Specific M Measurable A Attainable R Relevant T Time-Bound E Evaluate R Reevaluate Hack us is NOT sufficient! S.M.A.R.T.E.R. Goals PM technique Saves Time! Customers should demand that consultants use a Goal Oriented Approach

SMARTER Goals (S Specific) What is involved? Sharing of Data (customer and pentest team) Completeness w/ Recon Internal Pentest Access to Oracle database External Pentest Access to the internal network via social engineering

SMARTER Goals (M Measurable) How do you know when a goal is achieved? Focus on systems that can lead to achieving the goal Gain RW privileges AAA table BBB database Gain access to 1+ domain admin accounts

SMARTER Goals (A Attainable) Define goals based on the perspective of the assessment Limit goals to the most important areas Example of a goal that is NOT attainable: Identify all risks within an application

SMARTER Goals (R Relevant) Every goal in a penetration assessment should be focused on either: Achieving access to sensitive data for the business Demonstrating real world risks Example: Gain access to the corporate ERP database containing sensitive information Keep in mind, that not all goals are data-centric Create a DoScondition against the IPS or WAF Deface a website

SMARTER Goals (T Time-Bound) Nearly all assessments are time-bound 1 day, 1 week, 1 month etc Limit the amount of time spent to achieve a goal Example: Gain access to the internal network via wireless (limited 1 day). Time constraints may need to be adjusted Goal is achieved sooner Constraints are limiting progress

SMARTER Goals (E Evaluate) Discuss the status after amount of time. Time bound (x days or x weeks) Nothing is preventing progress (modify goals as needed) Unique methods Sometimes there is a requirement for specific number of unique paths Demonstrate ease of exploitation and attacker s flexibility

SMARTER Goals (R Reevaluate) Discuss the status after goal completion Event bound Access to the database was achieved, but SQLmapand SQLninja failed. How long would it take to create a tool script kiddies could use?

Agenda The need for a better approach Goal Oriented Overview Defining SMARTER Goals Methods for Success Examples from the field Summary/Q&A

Scoping What type of data is most sensitive? What data would put the organization on the frontpage of the New York Times? Data-classifications should be provided to the Pentesting team Goals can be data-centric (but not always!)

Leveraging Unique Paths Success criteria for goals is to achieve them Demonstrating a specific number of unique paths Provides a clear-view that weaknesses exist in many areas Will a pentest find all unique paths? Not necessarily Hit a point of diminishing returns Number of unique paths should be agreed upon with the scope

Agenda The need for a better approach Goal Oriented Overview Defining SMARTER Goals Methods for Success Examples from the field Summary/Q&A

Identify all of the externally accessible IPs Gain access to External Network Penetration Assessment Sample Goals Internal network (remotely) Via network or application based vulnerability Via social engineering Production MSSQL database Achieve and maintain undetected access for 24 hours

External Network Penetration Assessment Customer X Found a system external that contained network diagrams (test.company.com) Diagram of All internal and external systems! Detailed how the network was configured Contained several root passwords for the internal network! Publicly accessible + No authentication needed Used Fierce v2 to find it

Application Assessment Sample Goals Gain access to: A user s account An administrator s account Elevate the privileges of a user s account The application s backend database Achieve and maintain undetected access for 24 hours

Application Assessment Customer X SQLninja and SQLmap failed me. This is pretty sad! How long would it take to develop a PoCto pull data from the database?... Approximately 6 hours. Had a working PoC.

Application Assessment Customer Y

Internal Network Penetration Assessment Sample Goals Gain physical access to the network Gain access to the: Corporate wireless Production MSSQL database Domain controller (within the PCI environment) as an administrator Achieve and maintain undetected access for 24 hours

Internal Network Penetration Assessment Customer X Pass-The-Hash + Token Impersonation ARP Spoofing Unclear-text protocols Weak passwords Unpatched systems Workstation Network was easy PCI Network was well protected

Internal Network Penetration Assessment Customer X Added Admin Account onto PCI Network Domain Controller Inter-Domain Trust

Internal Network Penetration Assessment Customer Y

Agenda The need for a better approach Goal Oriented Overview Defining SMARTER Goals Methods for Success Examples from the field Summary / Q&A

Summary Strategic and Practical Methodology for Improving the ROI of any security assessment Leverages project management ideals Goals are not the only element of testing, only a place to start Whitepaper still in the works It will be released at Rapid7.com

References http://spl0it.wordpress.com/2009/11/16/goaloriented-pentesting-the-new-process-for-penetrationtesting/ http://spl0it.wordpress.com/2009/11/17/goal- oriented-pentesting-%e2%80%93-the-new-process-forpenetration-testing-part-2/ M. Howard and D. LeBlanc. Writing Secure Code. Microsoft Press, 2nd edition, 2002. http://en.wikipedia.org/wiki/smart_criteria

Acknowledgements/Special Thanks! Rafal Los Chris Eng Zach Lanier Mike Bailey Marcus J. Carry Jack Mannino Will Vandevanter Rob Fuller Marcella Carby-Samuels

Comments/Questions? Joshua Jabra Abraham Company: http://www.rapid7.com Blog: http://spl0it.wordpress.com Twitter: http://twitter.com/jabra Jabra_aT_spl0it_d0t_org Jabra_aT_rapid7_d0t_com