Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur



Similar documents
Demystifying Penetration Testing

Understanding Security Testing

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CRYPTUS DIPLOMA IN IT SECURITY

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Vinny Hoxha Vinny Hoxha 12/08/2009

Kerem Kocaer 2010/04/14

Penetration testing & Ethical Hacking. Security Week 2014

Certified Ethical Hacker (CEH)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

CEH Version8 Course Outline

NETWORK PENETRATION TESTING

Penetration Testing in Romania

Network Security Audit. Vulnerability Assessment (VA)

Client logo placeholder XXX REPORT. Page 1 of 37

CYBERTRON NETWORK SOLUTIONS

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Payment Card Industry (PCI) Data Security Standard

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Penetration Testing. Presented by

An Introduction to Network Vulnerability Testing

PCI Security Scan Procedures. Version 1.0 December 2004

Penetration: from Application down to OS

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Detailed Description about course module wise:

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)


Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

Ethical Hacking Course Layout

Penetration Testing - a way for improving our cyber security

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Information Security Services

Goals. Understanding security testing

Introduction to Penetration Testing Graham Weston

Audience. Pre-Requisites

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Payment Card Industry (PCI) Executive Report. Pukka Software

PKF Avant Edge. Penetration Testing. Stevie Heong CISSP, CISA, CISM, CGEIT, CCNP

Security and Vulnerability Testing How critical it is?

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

SNI Vulnerability Assessment Report

Learn Ethical Hacking, Become a Pentester

Hack Your SQL Server Database Before the Hackers Do

!!!!!!!!!!!!!!!!!!!!!!

Professional Penetration Testing Techniques and Vulnerability Assessment ...

A Decision Maker s Guide to Securing an IT Infrastructure

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

WHITE PAPER. An Introduction to Network- Vulnerability Testing

EC-Council Certified Security Analyst (ECSA)

Course Title: Course Description: Course Key Objective: Fee & Duration:

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

[CEH]: Ethical Hacking and Countermeasures

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

HTExploit: Bypassing htaccess Restrictions

Payment Card Industry (PCI) Executive Report 08/04/2014

Pentests more than just using the proper tools

Pentesting for fun... and profit! David M. N. Bryan and Rob Havelt

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

Pentests more than just using the proper tools

Penetration Testing Services. Demonstrate Real-World Risk

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

Exploiting Transparent User Identification Systems

Security Considerations White Paper for Cisco Smart Storage 1

Overview of the Penetration Test Implementation and Service. Peter Kanters

Attack Frameworks and Tools

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing An Update

Vulnerability Assessment and Penetration Testing

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

SENSITIVE AUSTRALIAN SPORTS COMMISSION ATHLETE MANAGEMENT SYSTEM (AMS) SMARTBASE SECURITY TEST PLAN. Final. Version 1.0

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Cisco Advanced Services for Network Security

Experiences from Educating Practitioners in Vulnerability Analysis

Security of IPv6 and DNSSEC for penetration testers

Information Security Assessment and Testing Services RFQ # Questions and Answers September 8, 2014

Transcription:

Demystifying Penetration Testing for the Enterprise Presented by Pravesh Gaonjur

Pravesh Gaonjur Founder and Executive Director of TYLERS Information Security Consultant Certified Ethical Hacker (CEHv8Beta) Certified ISO27001 Lead Auditor Certified Information Security Manager (CISM) CISM Director at ISACA Mauritius Chapter Part Time Academic at UTM & CDAC Publisher of IEEE papers in Information Security

AGENDA What is a Penetration Test Overview of how it works Defining the Pentest Scope Types of Penetration Tests Difference between Penetration Test and Vulnerability Assessment What should the final report contain? Tools

What is a Penetration Test Penetration test is an evaluation method to asses computers, systems or networks vulnerabilities and exploit them in order to measure the impact of the flaws to the system under testing Know the enemy before identifying the evil Think like the evil

Overview of how it works 1. Planning and Preparation 2. Information Gathering and Analysis 3. Vulnerability Detection 4. Penetration Attempt 5. Analysis and Reporting

1. Planning and Preparation

Defining Pentest Scope Non-Destructive Test Destructive Test Types of Environment Wireless DMZ Dial-in etc..

Types of Pentest Black Box Approach Pen tester has no previous knowledge of the remote network Only the company name or the IP address is known Simulation of a real world hacking by a hacker

Types of Pentest White Box Approach Pen tester provided with significant knowledge of the remote network Type of network devices (i.e. Cisco gear, TCP/IP), WebServer details (i.e., Apache/*nix or Apache/Win2k), Grey Box Approach Partial knowledge of the network

2. Information Gathering and Analysis

Information Gathering This is the first step for any remote host Penetration Testing. Expected Results: Zone Transfer Information Domain Registration Information Email IDs IP Addresses Range

Footprinting/Fingerprinting In this step, information like WebServer and OS type running on remote host are gathered to further precise the attack. Expected Results: Remote server OS type Remote server web-server type Applications running on remote server

Network Surveying/Mapping A network survey serves often as an introduction to the systems to be tested. It is best defined as a combination of data collection, information gathering, and policy control. Expected Results: Firewall / Routers / IDS Discovery Possible Local Network / Subnet Discovery IP Addresses Range Network Topology Mapping ISP information

Port Scanning and Services Identification Port scanning is the invasive probing of system ports on the transport and network level. Expected Results: Open, closed or filtered ports Services Identification

Evading Firewall rules In this phase, firewall evasion techniques are used to bypass firewall rules. This can further help in port scanning, remote host detection and remote network discovery. Expected Results: Mapping of firewall configuration rules Partial Access to devices behind the firewall

3. Vulnerability Detection

Vulnerability Scanning Identifying, understanding, and verifying the weaknesses, misconfigurations and vulnerabilities associated with remote host. Expected Results: List of vulnerabilities associated with each remote services List of possible denial of service vulnerabilities Possible misconfiguration on the remote server

4. Penetration Attempt

Exploiting Vulnerabilities This is the most important phase of penetration testing. Expected Results: Gaining Access to the system Retrieving hidden information Domain Hijacking Spamming Mail Servers Access to restricted / confidential information Control over web configuration Can also leads to gaining access over other servers

Brute Force/Password Cracking Password cracking is the process of validating password strength through brute force attempts. Expected Results: List of user login IDs or passwords List of authentication PINs or Password

Denial of Service (DoS) Denial of Service (DoS) is a situation where the applications or services running over the remote system stops functioning and prevents authenticated network users or devices to access it. Expected Results: Disruption of Services List of other possible DoS

Privilege Escalation It is the final stage of the remote host hacking where the attacker gains complete control over the remote system. Expected Results: Gain administrator / Super User rights Gain privilege to retrieve or modify confidential data Gain control over server configuration Gain Control over other servers attached to it

5. Analysis and Reporting

Contents of the Report Executive Summary Briefing on the type of test performed A pie graph displaying the vulnerabilities in terms of percentage of high, low & medium Risk Matrix Quantifying the vulnerabilities and showing the high, low & medium in a tabular format Giving a brief of the vulnerabilities found Proof of Concepts (POC) Giving a detail description with the screenshots and logs of the vulnerabilities found and exploited.

Contents of the Report Remedies and Workarounds Providing customized remedies and workarounds for the vulnerabilities found Best practices Suggesting best practices for the configurations for the device or services Final Summary Must contain a brief on the overall vulnerability factor found for the remote device

Difference between Pentest and VA Vulnerability Assessment Only scan for Vulnerabilities Using Automated tools Penetration Test Scan for Vulnerabilities Automated and manual Analysis Exploits Technical and Non-Technical Attacks

Some tools for Pentesting Automated Exploiting Tools Metasploit Framework, Core Impact, Canvas Password Cracking / Brute Forcing Tools John the ripper, L0phtcrack, MD5 Crack, SQL Bruteforce, CISCO Password decryptor, SolarWinds Network Password Decryptor, Cain & Abel, THC-Hydra, BRUTUS etc. Sniffers Ethereal, Ettercap, Dsniff, Hunt

Some tools for Pentesting Denial of Service (DoS) Tools HPING & openly available DoS exploits (Zero-Day and Others) Exploits Used Both customized and publicly available exploits (Zero- Days and Others) and sometimes exploits are coded depending upon the requirements Tools Kit Knoppix-STD, PHLAK, Auditor Security Collection etc.

Questions? Thank you for your attention!