Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014



Similar documents
Penetration Testing in Romania

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Penetration Testing - a way for improving our cyber security

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Application Security Testing

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Introduction to Penetration Testing Graham Weston

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

Pentests more than just using the proper tools

Information Security Services

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Evolution of Penetration Testing

An approach to Web Application Penetration Testing. By: Whiskah

Pentests more than just using the proper tools

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

ISSECO Syllabus Public Version v1.0

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Feeling Vulnerable? Jamie S. Herman, C CISO, CISM, CISSP Balazs Bucsay, OSCE, OSCP, GIAC, GPEN

(WAPT) Web Application Penetration Testing

About Effective Penetration Testing Methodology

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Passing PCI Compliance How to Address the Application Security Mandates

Web Application Penetration Testing

SAST, DAST and Vulnerability Assessments, = 4

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Penetration testing & Ethical Hacking. Security Week 2014

State of Web Application Security

Hands-On Ethical Hacking and Network Defense - Second Edition Chapter 1. After reading this chapter and completing the exercises, you will be able to:

Columbia University Web Security Standards and Practices. Objective and Scope

Criteria for web application security check. Version

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Web Application Security

Vinny Hoxha Vinny Hoxha 12/08/2009

Learning objectives for today s session

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Bust a cap in a web app with OWASP ZAP

Where every interaction matters.

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Cyber R &D Research Roundtable

Web attacks and security: SQL injection and cross-site scripting (XSS)

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

HP WebInspect Tutorial

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Overview of the Penetration Test Implementation and Service. Peter Kanters

Top Security Challenges Facing Credit Unions Today. Chris Gates Lares Consulting

Adobe Systems Incorporated

Course Descriptions November 2014

Magento Security and Vulnerabilities. Roman Stepanov

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

WEB APPLICATION VULNERABILITY STATISTICS (2013)

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Reducing Application Vulnerabilities by Security Engineering

Strategic Information Security. Attacking and Defending Web Services

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Expert Services Group (Security Testing) Nilesh Dasharathi Sadaf Kazi Aztecsoft Limited

Certified Ethical Hacker (CEH)

New Zealand Company Six full time technical staff Offices in Auckland and Wellington

Penetration Testing Scope Factors

Application Code Development Standards

The Top Web Application Attacks: Are you vulnerable?

Penetration Testing Services. Demonstrate Real-World Risk

The Security Development Life Cycle

Pentesting for fun... and profit! David M. N. Bryan and Rob Havelt

MANAGED SECURITY TESTING

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Web Engineering Web Application Security Issues

Network Security Audit. Vulnerability Assessment (VA)

FedRAMP Penetration Test Guidance. Version 1.0.1

Web application testing

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

Application Security Testing. Generic Test Strategy

Cybersecurity and internal audit. August 15, 2014

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Web App Security Audit Services

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Evaluation of Penetration Testing Software. Research

Web Application security testing: who tests the test?

Penetration Testing and Its Methodologies

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus

Transcription:

Security Testing Vulnerability Assessment vs Penetration Testing Gabriel Mihai Tanase, Director KPMG Romania 29 October 2014

Agenda What is? Vulnerability Assessment Penetration Testing Acting as Conclusion 2

What is? Vulnerability Assessment A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system Penetration Testing A penetration test is a method of evaluating the computer security of a computer system or network by simulating an attack from malicious outsiders and malicious insiders Definitions by Wikipedia 3

Vulnerability Assessment 4

Vulnerability Assessment Automated tool that finds vulnerabilities in the running application by interacting with it Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response against a database of signatures False positives, false negatives Must be fine tuned to produce good results 5

Example: Vulnerability Assessment 6

Penetration Testing 7

Penetration Testing Related terms: Penetration testing Pentesting Ethical hacking Tiger Teaming Red Teaming (RO: teste de penetrare, teste de intruziune) Penetration testing is: authorized adversary-based ethical (for defensive purposes) 8

Penetration Testing types According to attacker s location: Test type External pentest Internal pentest Simulated threats Hackers, corporate espionage, terrorists, organized crime Malicious employee, collaborator, consultant, visitor According to attacker s initial information: Black box test Gray box test White box test Hackers, organized crime, terrorists, visitors Consultants, corporate espionage, business partner, regular employees Malicious system administrators, developers, consultants According to the attacks performed: - pure technical - social engineering - denial of service - source code review. 9

Penetration Testing - Objectives and Targets External penetration test: Test the security of internet banking / mobile banking apps Evaluate the security of internet facing applications Perform fraudulent transactions in online shops Access personal data in online medical applications Gain physical access to company building and install rogue access point Internal penetration test: Obtain access to database server containing customer information Gain control of Active Directory Obtain administrative access to ERP application Gain access to company assets (sensitive files, project plans, intellectual property) 10

Penetration Testing - By example Threats Vulnerabilities Assets Risks Vulnerable? Exploitable? External attacker - hacker - industrial espionage - organized crime Internal attacker - malicious employee - collaborator - consultant - visitor Insufficient input validation Insecure session configuration Application logic flaws Insecure server configuration Internet Banking application SQL injection OS command execution Authentication bypass Cross Site Scripting Directory browsing H H H M M Password autocomplete L 11

Example (1): Application logic flaw 12

Example (2): Gaining root access 13

Acting as Conclusion 14

Automated vs. Manual Vulnerability Assessment: Automated testing: Configure scanner Run scanner & wait for results Validate findings where possible Deliver report to client Penetration Testing: Manual testing: Use tools as helpers only Validate findings by exploitation (no false positives) Dig for sensitive data, escalate privileges, gain access to other systems Model and simulate real threats: simulate attacker s way of thinking, consider attacker s resources, knowledge, culture, motivation Several manual tests for exploitation of specific vulnerabilities Strict control, logging, quick feedback Interpret the findings according to business impact 15

Limitations Vulnerability Assessment Discover potential vulnerabilities on large number of servers. Penetration Testing Test a real life scenario: what is a hacker looking for? All software vulnerabilities Known Vulnerabilities Timeframe Budget Resources Personnel awareness 16

Standards, Certifications and Knowledge Security testing standards: OSSTMM - Open Source Security Testing Methodology Manual NIST 800-42 - The National Institute of Standards and Technology Special Publication OWASP - The Open Web Application Security Project Certifications: Knowledge: Offensive Security OSCE, OSCP, OSWP ISECOM OPST SANS GPEN, GWAPT EC-Council LPT, CEH CHECK Team Leader, Team Member CREST Registered Tester, Certified Tester System administration Network administration Software development Quality assurance / software testing 17

Gabriel Mihai Tanase, KPMG Director mtanase@kpmg.com Thank you! Questions?