PENETRATION TEST & SECURITY STANDARDS



Similar documents
Penetration Testing in Romania

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Using Free Tools To Test Web Application Security

Guide to information security certifications. SearchSecurity.com's guide to vendor-neutral security certifications

HOW SECURE IS YOUR PAYMENT CARD DATA?

Bust a cap in a web app with OWASP ZAP

Renewing CompTIA Certifications With Achieving Other Vendor Certifications

GIAC Certification. Enterprise Solution

WEB APPLICATION FIREWALL

Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS

PCI Compliance. Top 10 Questions & Answers

PCI Data Security Standards

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS

GIAC Program Overview 2015 Q4 Version

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

PCI DSS. Payment Card Industry Data Security Standard.

SecurityMetrics Introduction to PCI Compliance

PCI Compliance Top 10 Questions and Answers

PCI Security Compliance

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

PCI DSS Overview and Solutions. Anwar McEntee

Two Approaches to PCI-DSS Compliance

PCI DSS Compliance Guide

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

PCI Compliance: How to ensure customer cardholder data is handled with care

Penetration testing & Ethical Hacking. Security Week 2014

Information Security Engineering

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

PCI Compliance Overview

The McAfee SECURE TM Standard

Achieving Compliance with the PCI Data Security Standard

Payment Card Industry Data Security Standard Explained

IT Security Compliance PCI DSS FOR MERCHANTS THE PAYMENT CARD INDUSTRY DATE SECURITY STANDARD WHITE PAPER

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

(WAPT) Web Application Penetration Testing

PCI DATA SECURITY STANDARD OVERVIEW

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

GFI White Paper PCI-DSS compliance and GFI Software products

Course Descriptions November 2014

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October cliftonlarsonallen.com CliftonLarsonAllen LLP

Professional Services Overview

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Presented By: Bryan Miller CCIE, CISSP

How To Protect Your Business From A Hacker Attack

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

Payment Card Industry Data Security Standard

Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

State of Web Application Security. Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters rd@rd1.net

Vinny Hoxha Vinny Hoxha 12/08/2009

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA

Josiah Wilkinson Internal Security Assessor. Nationwide

Westpac Merchant. A guide to meeting the new Payment Card Industry Security Standards

A Decision Maker s Guide to Securing an IT Infrastructure

PCI Compliance. How to Meet Payment Card Industry Compliance Standards. June 5, CliftonLarsonAllen LLP

Kerem Kocaer 2010/04/14

INFORMATION SECURITY TESTING

!!!!!!!!!!!!!!!!!!!!!!

Payment Card Industry Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) Frequently Asked Questions

Payment Card Industry Data Security Standard (PCI DSS) v1.2

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

PCI Compliance. How to Meet Payment Card Industry Compliance Standards. May cliftonlarsonallen.com CliftonLarsonAllen LLP

PCI DSS v2.0. Compliance Guide

Why Is Compliance with PCI DSS Important?

The PCI DSS Compliance Guide For Small Business

Protecting Your Customers' Card Data. Presented By: Oliver Pinson-Roxburgh

Are You Prepared to Successfully Pass a PCI-DSS and/or a FISMA Certification Assessment? Fiona Pattinson, SHARE: Seattle 2010

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

Vulnerability Assessment and Penetration Testing

PCI Standards: A Banking Perspective

Preventing. Payment Card Fraud. Is your business protected?

Information for merchants. Program implementation details for merchants. Payment Card Industry Data Security Standard (PCI DSS)

Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients

Transcription:

1NTT COM SECURITY (FORMELY INTEGRALIS) PENETRATION TEST & SECURITY STANDARDS SCOTT TSE (MPHIL, CISSP, CISM, CEH) WISHLOG@GMAIL.COM

INTRODUCTION ABOUT SCOTT TSE Identify 0-day attack on web mail used by HKU, CUHK when studying Mphil Found multiple vulnerabilities on websites secured by Found >20k credit cards through SQL injection, unprotected admin page or even in share drive Conducted pentest in CN, TW, JP, Washington DC, Miami, Bermuda, Philippine, Assisted one of the big4 to secure their websites and mobile MDM solution 2

BREAKDOWN The Security Market The not-so-dramatic hacking Penetration Test Web Application Scanning and Attacks Security certificate on People Security certificate on Enterprize 3

WHAT CAN YOU BUY IN SECURITY MARKET? Extended reading: https://www.trustwave.com/downloads/trustwave_wp_global_security_report_2012.pdf 4

SERVICES A long list of services category: IT audit PCI compliance Vulnerability Scan Penetration Test Web app assessment Mobile phone / Mobile app assessment * (The Integralis catalog) 5

PRODUCTS A wide range of Firewalls Antivirus products Next generation firewalls FireEye PaloAlto Impreva 6

ALTERNATIVES Virus / Zero day exploits Acquired by HP à Stolen macbooks, phones from the Deep web Hacking / DDOS services from IRC / forum 7

PENETRATION TEST What is penetration test? To simulate real hacking activity in a control environment to analysis the potential risk exist in the enterprise Why is it needed? Achieve just enough security in economical way See what can a bad guy do Compliance requirement (Forced by 3 rd parties) Who will need it? Government sectors Enterprise Hospitality Food and beverage Retails Bank Extended reading: https://www.trustwave.com/downloads/trustwave_wp_global_security_report_2012.pdf 8

VULNERABILITY / RISK ASSESSMENT Ways to deal with risk Plan Ignore Mitigate Transfer Reduce Act Do Check Terminology: Information Security (IS) V.S. IT Security IS Governance, Policy, Baseline, Guideline Business Continuity, Disaster Recovery 9

VULNERABILITY / RISK ASSESSMENT To NAME a vulnerability CVE V.S. CWE Others: BID ####, MS##-####, OSVDB ### To Report a vulnerability Standard: Security Content Automation Protocol SCAP Entity: CERT, CVE, WooYun (Chinese), References http://cwe.mitre.org http://cvedetails.com 10

PENETRATION TEST HOW TO? Internal Penetration test Plugin into internal network see what you shouldn t see External Penetration test Browse from cooperate web, see what you shouldn t see Standards, methodology: Open source pentest framework http://www.vulnerabilityassessment.co.uk/penetration%20test.html NIST Special Pub OSSTMM http://csrc.nist.gov/publications/nistpubs/800-115/sp800-115.pdf http://www.isecom.org/home.html Orange Book (One of the Rainbow series) UK, Canada s standard Extended reading: http://en.wikipedia.org/wiki/penetration_test 11

PENETRATION TEST PHASES (GENERAL) 1. Define a scope with client (Good guy only) 2. Identify core value 3. Reconnaissance 4. Enumeration 5. Vulnerability Assessment / Exploitation 6. Further investigation / Pivoting 7. Get the core information, e.g. password, client data, company reports, financial data, e.g. 8. Plant rootkit and erase track (Bad guy only) 12

PENETRATION TEST PHASES (DETAILS) 1. Plug into office network, guest network 2. Sniff for open protocols 3. Try default credentials 4. Identify open service and try exploits 5. Gain confidential information Company financial reports Client data Credentials Credit card number ID card number 6. Reporting! 13

DEMO owning a laptop Tools: Nmap, Metasploit, Nexpose Warning: do not try it at home Do it only under Adon s supervision. ROFL 14

EXTERNAL ASSESSMENT Assessment scope: Similar to internal assessment Tricks Bypass firewall / IPS UDP may not be blocked SNMP DNS Test/Debug pages in production servers Security Misconfiguration in IPv6 Unpatched Apache, IIS Sql injection (To be discuss later) 15

WEB ASSESSMENT Client-side attacks XSS, CSRF, etc Server-side attacks SQL injection, Local / Remote file inclusion, etc Standards OWASP, WASC, SANS 16

WEB ASSESSMENT Dynamic web scanners Acuentix HP WebInspect IBM AppScan Google skipfish Static source code scanners CheckMarx * Attack tools Dirbuster SQLmap * PadOracleAttack Nikto2 Arachni * ZAP, Paros proxy Security Seals McAfee Trustwave CUHK J Given after purchasing scanning services False sense of security http://sectooladdict.blogspot.com/2011/08/commercial-web-application-scanner.html 17

DEMO Automated tools Skipfish, Nikto2, Arachni sqlmap Semi-automated tools Zap Proxy 18

SECURITY STANDARDS Extended reading: https://www.trustwave.com/downloads/trustwave_wp_global_security_report_2012.pdf 19

COMPLIANCE What is a compliance? Make sure the business operations satisfy with regulatory standards In Information [Technology] Security Highly recognized: ISO27001 PCI-DSS Other IS frameworks: ITIL, COSO, COBIT, FISMA, OCTAVE, CMMI Book: IT Audit, Control and Security By Robert Moeller 20

PCI-DSS Payment Card Industry Data security standard Why exist A standard established by major payment brands Visa, American Express, MasterCard, JCB, Discover Who need it Merchants that accept online payments If PCI compliance is done, financial loss goes to PCI when data security is breached Otherwise, merchants will bear the risk and compensation for data security breach 21

PCI-DSS MERCHANTS TO BE AUDITED BY Qualified Security Assessor (QSA) QSAs are approved by the Council to assess and prove the compliance with the PCI DSS Approved Security Vendor (ASV) Responsible for SCANNING of customer facing payment card network DIY: Self Assessment Questionnaire (SAQ) Self-assessment: Security CHECKLIST approach Eligible only for Level 3-4 merchants Depending on the nature of transactions, internal transactions go for QSA customer-facing transactions go for ASV small companies go for SAQ 22

PCI-DSS MERCHANT TRANSACTION VOLUMES Level 4 < 20k Transaction per year Level 3 20k 1M Transaction per year Level 2 1M 6 M Transaction per year > 6M Transaction per year Previous incidents of security breach or data compromise Level 1 They spot you 23

PCI-DSS PROCEDURES TO COMPLY Contact ASV or DIY Identify the scope and determine the target network range Conduct a scan by ASV or DIY Fix vulnerabilities / loopholes Rescan Confirm all KNOWN vulnerabilitiesare fixed Report to and Certify by QSA! Rescan every quarter 24

PCI-DSS DOMAINS https://www.pcisecuritystandards.org/pdfs/pci_ssc_quick_guide.pdf https://www.pcisecuritystandards.org/security_standards/documents.php?assocation=pc 25

PCI-DSS, ISO27001 MAPPING 26

LATEST TECHNOLOGY, TRENDS Mobile App assessment Cloud security Security Information and Event Management (SIEM) Next Generation Firewall (NGFW) Web Application Firewall (WAF) Some WAF introduce new exploits J http://www.andlabs.org/whitepapers/split_and_join.pdf Exploits for sale come to a upper-ground business APT prevention: FireEye, PaloAlto 27

SECURITY CERTIFICATES Cisco Systems CCNA Security CCSP CCIE Security ENSA CEH CHFI ECSA LPT CNDA ECIH ECSS EC- Council ECVP EDRP ECSP ECSO GSIF GSEC GCFW GCIA GCIH GCUX GCWN GCED GPEN GWAPT GAWN GISP GLSC GCPM GLEG G7799 GSSP- NET GSSP- JAVA GCFE GCFA GIAC ISACA (ISC)² ISECOM GREM GSE CISA CISM CGEIT CRISC SSCP CAP CSSLP CISSP ISSAP ISSEP ISSMP OPST OPSA OPSE OWSE CTA Offensive Security OSCP OSCE OSWP CREST IACRB elearnsecurity SCP CERT CREST Consultant CPT CEPT ecppt SCNS SCNP SCNA CSIH 28

Q & A Extended reading: https://www.trustwave.com/downloads/trustwave_wp_global_security_report_2012.pdf 29