Understanding Security Testing



Similar documents
Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Demystifying Penetration Testing

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

CYBERTRON NETWORK SOLUTIONS

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Certified Ethical Hacker Exam Version Comparison. Version Comparison

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Penetration Testing Report Client: Business Solutions June 15 th 2015

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Detailed Description about course module wise:

CEH Version8 Course Outline

Payment Card Industry (PCI) Data Security Standard

Web App Security Audit Services

Penetration Testing. Presented by

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

An Introduction to Network Vulnerability Testing

Windows Remote Access

A Decision Maker s Guide to Securing an IT Infrastructure

8. Firewall Design & Implementation

Using a Firewall General Configuration Guide

Client logo placeholder XXX REPORT. Page 1 of 37

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

SonicWALL PCI 1.1 Implementation Guide

Chapter 9 Firewalls and Intrusion Prevention Systems

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing An Update

Passing PCI Compliance How to Address the Application Security Mandates

CompTIA Security+ (Exam SY0-410)

Network and Host-based Vulnerability Assessment

Architecture Overview

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

NETWORK PENETRATION TESTING

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Payment Card Industry (PCI) Data Security Standard

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Vulnerability Assessment and Penetration Testing

Information Security Services

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

USM IT Security Council Guide for Security Event Logging. Version 1.1

ICANWK406A Install, configure and test network security

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

March

The Trivial Cisco IP Phones Compromise

IBM. Vulnerability scanning and best practices

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Network Security Audit. Vulnerability Assessment (VA)

Reducing Application Vulnerabilities by Security Engineering

Developing Network Security Strategies

Chapter 9 Monitoring System Performance

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

PCI Security Scan Procedures. Version 1.0 December 2004

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

WHITE PAPER. An Introduction to Network- Vulnerability Testing

Penetration Testing with Kali Linux

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Simple Steps to Securing Your SSL VPN

Cisco Advanced Services for Network Security

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

Enterprise Computing Solutions

Achieving PCI-Compliance through Cyberoam

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

Network Access Security. Lesson 10

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Remote Access Security

[CEH]: Ethical Hacking and Countermeasures

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

IBM Managed Security Services Vulnerability Scanning:

Lab Configuring Access Policies and DMZ Settings

CRYPTUS DIPLOMA IN IT SECURITY

Payment Card Industry Self-Assessment Questionnaire

74% 96 Action Items. Compliance

Cisco Certified Security Professional (CCSP)

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Firewall Environments. Name

Network Instruments white paper

Codes of Connection for Devices Connected to Newcastle University ICT Network

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report

Automate PCI Compliance Monitoring, Investigation & Reporting

Chapter 1 The Principles of Auditing 1

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Network Incident Report

Networking: EC Council Network Security Administrator NSA

Transcription:

Understanding Security Testing Choosing between vulnerability assessments and penetration testing need not be confusing or onerous. Arian Eigen Heald, M.A., Ms.IA., CNE, CISA, CISSP I. Introduction Many organizations desire to assess the efficacy of their information technology security implementations. Publicly held companies are required by the SEC to have an independent exam completed on a periodic basis. Articles and reviews refer to vulnerability assessment, vulnerability testing, attack and pen, and penetration testing, at times interchangeably. This overview attempts to step the reader through how vulnerability assessments and penetration testing is done, as well as the different and similar aspects of these processes. This can help decision-makers assess which form of testing is the most useful. Starting from some excellent descriptions from Demystifying Penetration Testing, 1 I have developed a further explanation of both test processes. I have found it useful to be able to specify to organizations that ask about testing the exact nature of what is performed. II. Similarities Common to Both Processes: Defining what areas will be tested: Wireless Networks DMZ environments Data Centers Portals Extranets VPN Termination points Remote Access points Dial-In access Desktop PCs Toolsets 1 http://www.infosecwriters.com/text_resources/pdf/pen_test2.pdf by Debasis Mohanty

Location of testing: internal or external or both Report of Testing Results Recommendations for Remediation Availability of follow up support III. Differences Between Vulnerability Assessments and Vulnerability Scanning It is a common misconception that vulnerability scanning is the same as a vulnerability assessment. Vulnerability scanning is usually someone with a software package that is preconfigured to provide reports on whatever is scanned. Given the immense heterogeneity of most corporate networks, one piece of software will never find all the issues in the Testing Trees below. Moreover, the landscape of vulnerabilities and flaws in operating systems, databases, routers, firewalls, IDSs and applications changes daily. To trust in the capabilities of one tool is to be blind to anything that the tool is not configured or updated, to find. This is not to say that tools are not part of a Security Auditor s toolkit. Performing security testing is augmented by software, and time-intensive tasks can be shortened with the right tools. There is no software substitution, however, for experience. Vulnerability assessments and penetration testing cannot be fully automated without loss of confidence in the comprehensiveness of the results. There are simply too many aspects of a network to test with one tool. Security testing is time-intensive, and requires experience in technology and expertise about security on the part of the performing Auditor. IV. Vulnerability Assessments The focus for a vulnerability assessment is preventative in nature. By performing a full assessment, an Auditor can provide a client with a complete understanding of the nature and risks of their corporate environment. Penetration testing, on the other hand, simulates a true attack, with varying degrees of destructiveness. It is more realistic, but may not identify all the vulnerabilities in a corporate network, just the ones that could be found and then exploited. In the course of an assessment, the Security Auditor tests for the level of vulnerabilities in networks, servers, routers, databases and critical applications. The desktop environment

can also be tested. Intrusion Detection Systems and firewalls should be completely tested for appropriate responses. The Scope of the Vulnerability Assessment Includes: Information Gathering Network Surveying / Network Mapping Port Scanning and Service Identification Testing Firewall Rules Automated Vulnerability Scanning Identifying known vulnerabilities Identifying web-based application flaws Password Complexity testing Intrusion Detection System testing Testing Tree Assessment of the physical security of the client s network Network mapping Port Scanning Identification of unknown (to client) servers, applications or appliances on the client network (such as rogue wireless access points, rogue modems, ICQ servers, Peer to Peer clients, Instant Messaging clients, web servers and other services installed by default) Database vulnerability testing Server operating system testing Evaluation of router and switch environment VPN assessment and testing Wireless assessment and testing Assessment of desktop security environment A. Physical Security The Auditor commonly assesses the physical security of all networked components. _ Discovery of wiring closets/phone lines/router locations/wireless access points _ Data Center access testing _ Alarm system testing _ Overall building access B. Information Gathering The Security Auditor gathers information about the client s network via various automated tools.

_ Firewall / Routers / IDS discovery _ Local Network / Subnet discovery _ External IP Addresses Range(s) _ Network Topology Mapping _ DNS, DHCP and Domain server locations _ Identification of critical application servers, mainframes and printers. C. Port Scans and Service Mapping The Auditor scans the various client networks using common tools. _ Identification and location of default or rogue web servers that are broadcasting from printers, routers, switches, mainframes, desktops and servers. _ Identification of services installed by default on network appliances, such as telnet or ftp. D. Rogue Review Utilizing common network analyzers and other hardware components, the Auditor reviews network traffic. _ Identification of unauthorized applications, such as P2P and Instant Messaging clients _ Identification of rogue wireless access points _ Identification of unauthorized modems on desktops or servers _ Testing authorized modems to confirm secure configurations. E. Firewall Rule Testing Using applications and software tools, the Auditor will confirm the configuration of the firewall. _ Inappropriate rule sets or conflicting rule sets will be identified _ Appropriate placement of vulnerable systems behind firewalls _ Discovery of any administrative backdoors or tunnels F. Vulnerability Scanning The Auditor has an extensive selection of various tools with which to test servers, routers, switches, mainframes and databases. _All server and mainframe operating systems will be scanned for known vulnerabilities _Databases will be scanned for known vulnerabilities _Confirm that system patching is consistent and appropriate _Identify any default username/password combinations have been disabled or deleted. _Identification of any inappropriate services or default configurations installed on routers _Identify default shares on servers _Identify any unsecured network printers

G. Password Testing Using various open-source and commercial tools, the Auditor will examine and assess password effectiveness on servers, mainframes and routers _Use of default passwords or no passwords identified _Complexity of user and administrative passwords confirmed H. Web-Based Application Assessment Applications that face the web for the client s customers are tested by the Auditor, including the operating system platform, web server platform and any database functionality. _ Identification of any poorly configured web servers, including unaddressed defaults _ Identification of any vulnerability in types of code used in web applications _ Testing for SQL Injection, Cross-site Scripting and inappropriate input validation or sanitizing. _ Testing for appropriate system rights for transactions that require writing to a database I. Intrusion Detection System Effectiveness Employing various non-destructive attack tools, the Security Auditor can assess the effectiveness of the locations and configuration of the client IDS. _ Confirmation that the IDS is logically deployed to capture all appropriate traffic _ Confirmation that IDS is tuned differently in different environments, i.e., DMZ vs. internal networks vs. external to the firewall _ Confirmation that the timely notification of network personnel takes place for both internal and external attacks _ Confirmation that the IDS is tuned to recognize the newest attacks as well as attacks appropriate to the operating environment. _ Confirmation of timely and accurate response by client network personnel to identify the source of an attack and address it. J. Desktop Security Spyware, virus and worm attacks remain a significant source of vulnerability to corporate networks. The Auditor can review a standard build and existing PCs of employees. _ Review of rights given to users to change their configurations _ Patch management _ Efficacy of antivirus software deployment _ Spyware assessment: rate of infection

K. Virtual Private Network Effectiveness Significant numbers of corporations allow users, network personnel and senior management to access the corporate network from outside the network boundary using various VPN clients. The Auditor will assess the effectiveness of the VPN access points and client management. _ Access point footprinting _ Identification of any default configurations _ Assessment of controls over operating systems accessing the internal network. _ Review of RADIUS or other authentication systems tied into remote access. V. Penetration Testing The Security Auditor not only assesses the client environment to identify vulnerabilities in the network, databases, servers or applications, but also attempts to exploit found vulnerabilities in order to gain access to critical client data. According to the NIST Special Publication 800-42: Penetration testing is security testing in which evaluators attempt to circumvent the security features of a system based on their understanding of the system design and implementation. The purpose of penetration testing is to identify methods of gaining access to a system by using common tools and techniques developed by hackers. This testing is highly recommended for complex or critical systems (e.g., most organizations networks). 2 The Scope of Penetration Testing Includes: Location of testing: internally and/or externally. Vulnerabilities are identified and then tested for proof of concept (POF) Destructive attacks like DOS and Buffer Overflow attacks are used depending upon the client s willingness to accept the risk. Information Gathering Network Surveying / Network Mapping Port Scanning and Service Identification Evading Firewall Rules Physical access to network Automated Vulnerability Scanning Exploiting Services for Known Vulnerabilities Exploiting Web-Based Authorization 2 NIST Special Publication 800-42: DRAFT Guideline on Network Security Testing

Brute Force Password Cracking Denial of Services (DoS) Testing Elevation of Privileges Types of Penetration Testing: 3 Black Box Security Auditor has no previous knowledge of the network to be tested. Only the company name, office location or the IP address is known Social Engineering: attempts by an Auditor to convince employees to volunteer information such as passwords or access devices that will allow the Auditor to access inappropriate areas of the network. Simulates real world hacking and attacks by a hacker who has no knowledge of client s environment (e.g., production operating systems, applications running, device types and network topology, etc.). White Box Security Auditor is provided with significant knowledge of the remote network. Type of network devices (i.e. Cisco gear, TCP/IP), Web Server details (i.e., Apache/Win2k, Netscape, etc), Operating System types (i.e., Windows/Solaris/RedHat, etc), Database platforms (i.e., Oracle or MS SQL, MySQL, DB2, etc), Load balancers (i.e. Alteon, Cisco), Firewalls (i.e. PIX, Checkpoint NG). etc Simulates an attack by an internal hacker who has a detailed knowledge of the client s network environment. Non-Destructive Identifies possible vulnerabilities Analyzes and confirms findings Maps the vulnerabilities with proper exploits Exploits the remote system with proper care to avoid disruption. Proof of concept provided No Denial of Service (DoS) attack is tried Full Attack Identifies possible vulnerabilities Analyzes and confirms the findings Maps the vulnerabilities with proper exploits 3 http://www.infosecwriters.com/text_resources/pdf/pen_test2.pdf page 5

All attacks, including Denial of Service (DoS) and buffer overflows, are used. Attack Tree Footprinting the network Port Scanning and Service Identification Identifying and Exploiting Known Vulnerabilities Evading Firewall Rules Automated Vulnerability Scanning VPN Testing Denial of Service Testing Brute Force Password Cracking Web-Based Application attacks Physical access to data center and client PCs Results Testing (Proof of Concept) A. Information Gathering The Auditor attempts to gather maximum information on the Internet-facing remote host(s) and the internal network with no information supplied from the client. _ Zone Transfer Information _ Domain Registration Information _ Email addresses _ IP Address Ranges _ Logical Network topology of routers, switches, servers, printers, etc. _Search Engine information ( Google Hacking ) (can supply access to administrator IDs, internal server configuration or problems, and hidden shares on a web server) B. Footprinting _ Server OS types _ Web server types and versions _ Applications running on servers _ Firewall / Routers / IDS Discovery _ Local Network / Subnet Discovery _ IP Address Ranges _ Domain Mapping _ ISP information _Open Shares C. Port Scanning & Service Identification

Port scanning can be an invasive probing of system ports on the transport and network level. This module enumerates live systems and/or accessible (via the Internet or the internal network) applications. _ Open, closed or filtered ports _ Service Identifications _ Default configurations D. Testing Firewall Rules In this phase, firewalking techniques are used to attempt to bypass firewall rules. This type of testing can identify possible tunnels or backdoors through the firewall. Internal testing would confirm that firewall rules cannot be bypassed. _ Mapping of firewall configuration rules _ Partial Access to devices behind the firewall _ List of vulnerabilities associated with remote services _ List of possible denial of service vulnerabilities _ Identifying outbound or inbound unauthorized access. The focus of this module is identifying and verifying the weaknesses, misconfigurations and vulnerabilities associated with the firewall deployment and ruleset. Some scanning can be done using various automated tools or scripts to make the process faster. E. Exploiting Services for Known Vulnerabilities The weaknesses found in various network devices and services are tested using openly available tools and customized exploits. _ Gaining access to server systems _ User IDs and passwords _ Administrator or superuser access to database systems _ Retrieving hidden or confidential information _ Domain hijacking _ Open Relays on mail servers F. Web-Based Application Hacking Web application flaws are exploited to gain access to restricted information or take over the server operating system Web-based applications are exploited by using Cross-Site Scripting, SQL injection or Man-in-the-middle (MITM) attacks. _ Access to restricted or confidential information _ Control over web configuration

_ Can also lead to gaining access and control of other servers (such as internal databases that are tied to web applications) G. Brute Force Password Cracking Password cracking is the process of validating password strength through the use of automated attack tools that expose the application of weak cryptographic algorithms, incorrect implementation of cryptographic algorithms, blank passwords, or weak passwords due to human factors. These tools can be applied against network appliances (routers) web-based applications and/or servers facing the Internet. _ Access to network devices _ List of authentication PINs or passwords H. Denial of Service (DoS) Testing Denial of Service (DoS) happens when applications or services running over networked systems stop responding to network requests from authenticated network users or other devices. _ Disruption of service delivery to client users and customers of client _ Identification of other possible DoS vulnerabilities associated with client systems. _ Sabotage of related client network devices I. Virtual Private Network Testing The main objective of this testing series is to discover any vulnerability in a VPN implementation that an attacker may be able to exploit. This is usually considered a zeroknowledge test where only the IP address of the VPN server is known. 4 Expected Results _ Reconnaissance: determining open ports and VPN identification (IPSEC, SSL, PPTP) _ Assessment of PSK protocol mode for focused attacks _ Exploitation of any default user accounts J. Testing and Confirming Results The Security Auditor may gain more powerful privileges over the client s systems and network devices. In order to confirm access, the Auditor will provide Proof of Concept, which is a document or action that demonstrates the level of privilege achieved during testing. 4 Steps taken from http://www.securityfocus.com/infocus/1821

_ Screenshots of administrator / super user rights _ Screenshots of confidential data directories _ Screenshots of server operation and settings _ Screenshots of Domain or systemic access of other servers in the same environment _ Deposits a small text file confirming full access to a secured area. _ Create a POC user in various domains and systems to confirm full access. _Download configuration files from routers or switches and edit with small character set to confirm access. _ Download of database tables for documentation. K. Physical Access to the Network ( Social Engineering ) The Auditor will test physical access to servers, PCs, wiring closets, PBX systems and portable devices. Utilizing social techniques, the Auditor may access and attempt to acquire critical network data, such as: _Backup tapes of critical data _Usernames and passwords from administrator s personal PC _Local Administrator (to the PC) ID and password _Confidential documents _Router configuration files _Wireless access via rogue access point _Full Data Center access to servers VI. Summary Finally, the client should expect to receive a closing presentation of the results of the security testing performed. The presentation should include: Briefing on the type of tests performed. A graph displaying the types of vulnerabilities found by type of network device. Quantifying the vulnerabilities and showing the high, low and medium risks in a tabular format Annualized cost of remediation vs. leaving systems at risk Overview of testing results A risk assessment of the overall security of a client s IT environment. In the case of penetration testing, the testing agency should provide a Proof of Concept that an exploit was completely executed. This would include: A detailed description with screenshots and logs of the vulnerabilities found and exploited. A detailed technical explanation of the vulnerability and the process of obtaining access

The testing agency should be prepared to provide remediation via customized remedies and workarounds for the vulnerabilities found. These remediations should include best business practices for the configurations of devices and services. Each organization should be able to identify its requirements before entering into an agreement with an outside agency to complete security testing. Having a specific understanding of the various processes means the organization is far more likely to get the information it needs to have a secure business environment.