Penetration Test Overview

Similar documents
INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

THE TOP 4 CONTROLS.

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Computer System Security Updates

Security Management. Keeping the IT Security Administrator Busy

Penetration Testing with Kali Linux

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

CRYPTUS DIPLOMA IN IT SECURITY

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Client logo placeholder XXX REPORT. Page 1 of 37

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

IBM Managed Security Services Vulnerability Scanning:

Nessus Agents. October 2015

Web App Security Audit Services

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER

GFI White Paper PCI-DSS compliance and GFI Software products

Best Practices for PCI DSS V3.0 Network Security Compliance

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Penetration Testing. Presented by

Cybersecurity Health Check At A Glance

2012 Data Breach Investigations Report

PCI Requirements Coverage Summary Table

An Introduction to Network Vulnerability Testing

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

by Penetration Testing

AN OVERVIEW OF VULNERABILITY SCANNERS

Penetration Testing Report Client: Business Solutions June 15 th 2015

How To Test For Security On A Network Without Being Hacked

Security Considerations White Paper for Cisco Smart Storage 1

NETWORK PENETRATION TESTING

The Protection Mission a constant endeavor

5 Steps to Advanced Threat Protection

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Top Ten Cyber Threats

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

Learn Ethical Hacking, Become a Pentester

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

Foundstone ERS remediation System

INFORMATION SECURITY TESTING

Web application testing

Penetration Testing Service. By Comsec Information Security Consulting

Basics of Internet Security

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

How To Perform An External Security Vulnerability Assessment Of An External Computer System

SANS Institute First Five Quick Wins

INCIDENT RESPONSE CHECKLIST

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

PCI Security Scan Procedures. Version 1.0 December 2004

Ethical Hacking: The Value of Controlled Penetration Tests

Service Definition (Q-D1) Penetration Testing. Overview of Service. Functional and non-functional Detail. Q-D1: Service Definition

Windows Remote Access

Cisco Advanced Services for Network Security

Demystifying Penetration Testing

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Vulnerability Assessment

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Discovering passwords in the memory

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Protecting Your Organisation from Targeted Cyber Intrusion

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

The Influence of Software Vulnerabilities on Business Risks 1

ensuring security the way how we do it

Evaluation of Penetration Testing Software. Research

The Business Case for Security Information Management

Network and Host-based Vulnerability Assessment

Payment Card Industry (PCI) Data Security Standard

Medical Device Security Health Group Digital Output

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Metrics Suite for Enterprise-Level Attack Graph Analysis

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Click to edit Master title style

Name. Description. Rationale

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

Seven Strategies to Defend ICSs

Transcription:

PenetrationTestOverview PathMakerGroupdevelopedthisPenetrationTestservicetoevaluateyournetwork,systemand applicationcontrols.ourapproachconsistsofthreeoverallphasesthatincludesavarietyofkey assessmenttasks. Phase I:PlanningandPreparation Phase II:VulnerabilityAssessmentandTargetedExploitationTests(PenTest) Phase III:Reporting,Clean up,anddestructionofartifacts Pleasereferencethelastpageofthisdocumentforthelistofadvancedtoolsinourlibrary.We utilize several of these tools on every engagement, based upon the client s environment and resultsofourinformationgatheringandvulnerabilityidentification. PHASE I:PLANNINGANDPREPARATION Thisphasecomprisesthestepstoexchangeinitialinformation,planandprepareforthetest.Prior totesting,aformaldocumentauthorizingthetestandscopewillbesignedbyanofficerofboth companies.groundrules,orscopeforthetest,arethemeansfordefiningsuccessfulcompletion. Theanalysisissuccessfullyconcludedwhen: 1. adefinednumberofflawsarefound;or 2. asetleveloftestingtimehastranspired;or 3. adummytargetobjectisaccessedbyunauthorizedmeans;or 4. thesecuritypolicyisviolatedsufficientlyandbypassed;or 5. theprojectbudgetandresourcesareexhausted. Groundrulesdefinethebasisforassignmentandmutuallegalprotection.Thesealsospecifythe engagementteam,theexactdates/timesofthetest,escalationpath,incidentreporting,andother arrangements.thefollowingactivitiesareenvisagedinthisphase: 1. IdentificationofcontactpersonsfromboththeClientandPathMakerGroup,and 2. Definetheobjectives,groundrules(constraints)anddurationofthetest,and 3. Definewhetherthetestiscovert(restrictedknowledge)orovert,and 4. Completelegaldocuments,authorizingPathMakerGrouptoperformthetest,and 5. Meet(optional)tocommunicatethescope,approachandmethodology,and 6. Finalagreementtospecifictestcasesandescalationpaths. PHASE II:THEASSESSMENT This is the phase where the actual attack is carried out. In the assessment phase, a layered approach is followed, as per the figure shown below. Each layer represents an increased comprehensionofinformationassets.thefollowinglayersareenvisaged: Copyright 2010PathMakerGroup.Allrightsreserved.

1. InformationGathering 2. NetworkMapping 3. VulnerabilityIdentification 4. Exploitation 5. GainingAccess&PrivilegeEscalation 6. EnumeratingFurther 7. CompromiseRemoteUsers/Sites 8. MaintainingAccess 9. CoveringTracks Theexecutionstepsarecyclicalanditerativeasillustratedbythearrowsinthefigurebelow: 1.InformationGathering Information gathering in advance of the actual exploitation is essential. Using the Internet and related services, we find as much information as possible about the target (company and/or personnel) using both technical methods (DNS/WHOIS) and non technical methods (search engines,newsgroups,pressreleases,mailinglists,etc). This is the initial stage of any public information study, which most penetration testers tend to overlook. When performing any test on an information system, especially in covert (white box) tests,informationgatheringanddataminingisessentialandprovidesuswithrelevantinformation bywhichwemayidentifyattackvectorsandfurtherplanthetest.whilestudyingthisinformation, wetrytomaintainasopenandimaginativeanapproachaspossible.weattempttoexploreevery possible avenue to gain more understanding of the target and its resources. When social Copyright 2010PathMakerGroup.Allrightsreserved.

engineeringisacomponentoftheassessment,wefindthatcompanybrochures,businesscards, newspaperadvertisements,andinternalpaperworkallprovideinformationthatwecanexploit. Informationgatheringdoesnotrequirethattheassessorestablishcontactwiththetargetsystem. Informationiscollected(mainly)frompublicsourcesontheInternetandorganizationsthathold publicinformation(e.g.taxagencies,pressreleases,thecompany swebsite,etc.) Assessmentsaregenerallylimitedbyafunctionoftimeandresources.Therefore,itiscriticalto identifyallpointsthatwillbemostvulnerable,andfocusonthem.eventhebesttoolsareuseless ifnotusedappropriatelyandintherightplaceandtime.thisiswhyweinvestacertainamountof timeinthisformofinformationgathering. 2.NetworkMapping Following the information study and when adequate information about the target has been acquired, a more technical approach is taken to profile the network and resources that are in scope.networkspecificinformationfromtheprevioussectionisexpandedtoproduceaprobable networktopologyforthetargetenvironment.weuseseveraltoolsinthisstagetoaidindiscovery of technical information about the hosts, networks, applications and databases involved in the test. Findlivehosts Portandservicescanning Perimeternetworkmapping(router,firewalls,loggingsystems) Identifyingcriticalservices OperatingSystemfingerprinting IdentifyingroutesusingManagementInformationBase(MIB) Servicefingerprinting To be effective, network mapping should be performed according to a plan. This plan includes probableweakpointsand/orpointsthataremostcriticaltotheclient sorganization. Network mapping helps us to refine the information previously acquired and confirm or dismiss hypothesesrelatedtothetargetsystems(e.g.purpose,software/hardwarebrands,configuration, architecture,relationshipswithotherresourcessuchasotherapplicationsanddatabases,aswell asrelationshipswithbusinessprocessessuchase business,payments,hr,etc.). 3.VulnerabilityIdentification Before starting this section, we will have identified specific points to test and established the meansbywhichtotestthem.duringvulnerabilityidentification,wewillperformseveralactivities todetectexploitableweakpoints.theseactivitiesinclude: Identifyvulnerableservicesusingservicebanners Copyright 2010PathMakerGroup.Allrightsreserved.

Perform vulnerability scan to search for known vulnerabilities. Information regarding knownvulnerabilitiescanbeobtainedfromthevendors securityannouncements,orfrom industry forums and subscriptions including: SecurityFocus; CVE or CERT advisory; metasploitcommunity,andothers. Performfalsepositiveandfalsenegativeverification(e.g.bycorrelatingvulnerabilitieswith eachother,comparefindingsbetweentools,andagainstpreviouslyacquiredinformation). Enumeratediscoveredvulnerabilities. Estimate probable impact (classify vulnerabilities as found according to industry rating prioritizedas:critical,high,medium,low,informational).wewillraiseorlowertherating baseduponourexpertknowledgeappliedtoweighthelikelihoodthatanexploitcouldbe carriedoutagainstagivenvulnerability. Identifyattackpathsandscenariosforexploitation 4.Penetration/Exploitation Wethenattempttogainunauthorizedaccessbycircumventingthesecuritymeasuresinplaceand attempt to reach as wide an approach of access as possible. This process is divided in the followingsteps: Findproofofconceptcode/tool Findproofofconceptcodeavailablewithinourrepositoryorfromtrustedpublicsourcestotest forvulnerabilities.ifthecodeisobtainedfromourrepositoryoratrustedsource,thenithasbeen thoroughlytestedandwemayusewithinthetest.otherwise,allcodewillbefirsttestedwithin anisolatedenvironment. Developtools/scripts Under some circumstances, our assessor may need to create and/or adapt existing tools and scripts. Testproofofconceptcode/tool Customizeproofofconceptcode/tool Testproofofconceptcode/toolinanisolatedenvironment Useproofofconceptcodeagainsttarget The proof of concept code/tool is applied against the target to gain as many points of unauthorizedentry(access)aspossible. Copyright 2010PathMakerGroup.Allrightsreserved.

Verifyordisprovetheexistenceofvulnerabilities Only by testing vulnerabilities will our assessor be able to confirm or disprove vulnerabilities definitively. Documentthevulnerabilitiesfound This documentation provides details related to the vulnerabilities, potential exploitation paths, assessed impact and proof of the existence of each vulnerability, risk prioritization, and basic remediation recommendations. This output is designed to be a stand alone vulnerability assessment and includes an executive summary as well as technical details about the found vulnerabilities. 5.AccessandPrivilegeEscalation Inanygivensituation,thetestcanbegenerallyenumeratedfurther.Activitiesinthissectionallow ustoconfirmanddocumentprobableintrusionand/orautomatedattackspropagationlikeliness. GainingAccess Gaining access is possible through a variety of means. Some techniques used for gaining access mayberestricted,aspertheconstraintsthatmaybedefinedduringtheplanningphasesofthe test such as restricting buffer overflow tests, and other tests that could impact system performanceandavailability. GainLeastPrivilege Gaining least privilege access is possible by obtaining access to unprivileged accounts through severalmeans,including: Discovery of username/password combinations (e.g. dictionary attacks, brute force attacks) Discoveryofblankpasswordordefaultpasswordsinsystemaccounts Exploitvendordefaultsettings(suchasnetworkconfigurationparameters,passwordsand others) Discovery of public services that allow for certain operations within the system (e.g. writing/creating/readingfiles) Compromise Reachingthetargetoftheassessment(beitaspecificsystemoraprotectednetwork)mayrequire thatintermediatesystemsbecompromisedaswell,inordertobypasstheirsecuritymeasuresthat potentiallyprotectaccesstotheassessor sobjectivetarget.thesepossibleintermediatedevices can include routers, firewalls, domain member servers, applications, and databases, to name a few. Copyright 2010PathMakerGroup.Allrightsreserved.

CompromiseonTarget This step executes the compromise. The final target has been breached and is under complete control by the assessor. The objective may have been defined as successfully obtaining administrative privileges over the system, in the form of administrative accounts such as an administrator, root, system, or other privileged account. Or, the objective may have been to obtain sensitive information in the form of user information such as customer name, customer password,customerprofileinfo,bankinfo,etc PrivilegeEscalation We often find that only low privileged access can be acquired on a system. In this case, the mapping of system specific vulnerabilities is performed (as opposed to network based vulnerabilities), a proof of concept exploit is obtained, developed, and tested in an isolated environment,andthenappliedonthecompromisedsystem. Atthisstagethegoalisagaintoattempttoelevateprivilegetoanadministrativelevelofaccess. The main barriers we expect to encounter include the level of patching and hardening of the system;andsystemintegritytools(includinganti virus)thatcandetect,andinsomecasesblock theactionoftheproofofconceptexploitsthatwerequire. 6.EnumeratingFurther Obtain encrypted passwords for offline cracking (for example by dumping the SAM on Windowssystems,orcopying/etc/passwdand/etc/shadowfromaLinuxsystem) Obtainpassword(plaintextorencrypted)byusingsniffingorothertechniques Sniff(captureactual)networktrafficandanalyzeit(requiresphysicalaccess) Gathercookiesandusetoexploitsessionsaswellasinitiatepasswordattacks E mailaddressgathering Identifyingroutesandnetworks Furtherrefinementofinternalnetworkmapping Performsteps1to6againwiththissystemasstartingpoint 7.CompromiseRemoteUsers/Sites A single security hole is sufficient to expose an entire network, regardless of how secure the perimeternetworkisclaimedtobe.anysystemisonlyassecureastheweakestofitsparts. Communications between remote users, sites and enterprise networks may be provided with authenticationandencryptionbyusingtechnologiessuchasvpn,toensurethatthedataintransit overthenetworkcanneitherbeforgednoreavesdropped.however,thisdoesnotguaranteethat thecommunicationendpointshaven tbeencompromised. Copyright 2010PathMakerGroup.Allrightsreserved.

In such scenarios, and dependent on scope, we may be required to attempt to compromise remote users, telecommuter and/or remote sites of an enterprise. These targets are likely candidatesthatcanyieldprivilegedaccesstointernalnetwork. 8.MaintainingAccess Note: the continued use of covert channels, back door installation, and deployment of root kits aretypicallynotperformedaspartofapenetrationtest.wearegenerallyaskedtorefrainfrom these techniques, due to the risk involved if any of these remain open either during or after testing, and are detected by an attacker. Typically, clients ask us to elaborate on how these channelscanbemadepersistent(remainopen)byprovidinga nextstephypothesis. Channels Covertchannelsarealsousedtohideourpresenceonsystemsoronthenetwork.Covertchannels canbeeitherprotocol tunnels(likeicmp tunnel,http tunneletc )orcanutilizevpntunnels.we canperformfollowingstepstousecovertchannels: IdentifyCovertChannelWhichCanBeUsed SelecttheBestAvailableToolfortheCovertChannel Methodology SetuptheCovertChannelintheTargetNetwork TesttheCovertnessofChannelUsingCommonDetectionTechnique Backdoors Backdoorsaremeanttoprovidemeanstogetbackintoacertainsystem,eveniftheaccountused tohackthesystemisnolongeravailable(forexample,iftheaccounthassincebeenterminated). Backdoors can be created in several ways. Either by using root kits (see further), by opening a listeningportonthetargetsystem,bylettingthetargetsystemconnecttoourservers,bysetting upalistenerforacertainpacketsequencewhichinturnwillopenaport. Root kits Root kitsallowanassessortopossessmorepoweroverthesystemthanthesystemadministrator. Root kitsenabletheassessortoobfuscateanyinformationotherwiseshowntotheadmin,antivirussystem,and/ormalwaredetectionsystemcontrols. Oftenroot kitsalsoallowfile,processand/ornetworksocketconcealment,whilestillallowingthe individualincontroloftheroot kittodetectandutilizethoseresources. The standard remediation method for root kits is to wipe and reinitialize the system. In a productionsystemenvironment,theuseofroot kitsinthepenetrationtestistypicallyprohibited duetocostandworkefforttorecover. Copyright 2010PathMakerGroup.Allrightsreserved.

9.CoverTracks Note: it is normal practice during penetration tests to act as open as possible (except when requestedbythecustomer)andtoproducedetailedinformationandlogsofallactivities,sothe sectionbelowismostlyforreferencepurposes. HidingFiles Hiding files is important if the assessor must conceal ongoing activities during and after compromisingthesystemandtomaintainbackchannel[s].dependingonthedurationofthetest, wemayhidetoolsdiscretelyonthesysteminordertoavoiduploadingthemoneachiterationof thetest. ClearingLogs Theimportanceofthisstageiseasilyunderstoodbuttypicallyunderstated.Afteranassessorhas successfullycompromisedthesystem,hemayberequiredtoremainconnectedwithoutalerting the administrator. The longer the assessor remains connected to the compromised system, the betterthechancesthathewillbeabletoachievehisgoalstofurtherexploitand/orenumerate systemsandothertargetswithinthenetwork. Duringtheprocessofcompromisingthesystem,somesuspiciousand/orerroneousactivitiesare almost always logged within system log files. A skilled attacker knows that logs will need to be altered to conceal his activities. He modifies them to cover his tracks and hide his presence. In sometestsweareaskedtoattempttoclearlogs,however,wewillalwaysmakecopiesoflogfiles priortorevisingthem. Note:Thisisonlyeffectiveifacentralizedlogmanagementsystemisnotinuse.Ifacentralized loggingsystemisincorporated,thenthesesystems(syslogservers,etc)couldbetestedaswell. Defeatfileintegritychecking In cases where static integrity checking by systems such as Tripwire, or our CLIC File Integrity Monitoringprogramhavebeenimplemented,itisverydifficulttomakeanychangestothesystem withoutthosebeingdetectedandreported. However, if the deployment of the system integrity tool was incorrectly done, for example by leavingthefilewiththesignaturesofvalidfilesandprogramsinthesameserver,itwillbepossible tomodifythesystemandregeneratethesignatures. DefeatAnti virus On most workstations and servers, anti virus (A/V) software is typically installed to protect the systemagainstwell knownmalicioussoftware(likeexploits,virus,worms,etc).afunctionalstep inthepenetrationtestmayinvolveourattempttodisable,ordefeat,a/vsoftwaresuchthatthe assessorisabletoperformactivitiesunhindered. Copyright 2010PathMakerGroup.Allrightsreserved.

In most centrally managed A/V solutions, the A/V software is restarted after a certain period of time when stopped for any reason (by the assessor). This time period allows the assessor to execute several steps in attempt to further disable and/or extend the time the A/V remains disabled. Thefollowingarepotentialstepsthatourassessorscanperform,mostofwhichrequire Administratorlevelaccess: CreateabatchfilesothattheA/Vservicesarestoppedevery30second,etc. DisabletheA/Vservicesentirely. IssueanA/Vpolicychangetopreventissueofanyvirussignatureupdatestoanysystem, orspecificsystems. Blockthecentralmanagementsystemcommunicationstoend pointsystems ImplementRoot kits Root kits should be customized to each client s environment in order to completely conceal the assessor sactivities.inmostcases,ifana/vsolutionisinplaceandfunctioningproperly,root kits will generally be detected before they can be installed. Therefore, if root kit exploitation is requestedthentheroot kitsmustbecustomize. SystemAudit System audits provide a great deal more about potential security vulnerabilities than a single penetration test. Therefore, we recommend that system audits should be performed in conjunction with the penetration test. A system audit checks all services(running or not), open ports, established connections, malware and root kit detection, file system permissions, shared resources within the enterprise, logging and/or remote logging, inventory of software, registry, anduserdatabase,aswellasthelevelofauditingenabledwithinthesystemitself. PHASE III:REPORTING,CLEANUP&DISPOSALOFARTIFACTS Reporting Ataminimal,ourtestswillincludethefollowing: VerbalReporting Duringthecourseofthepenetrationtest,ifacriticalissueisidentified,itisreportedimmediately toensurethattheorganizationisawareofit.thecriticalityoftheissuetakesprecedenceandis discussedandcountermeasuretosafeguardagainstthisissueshouldbeprovided. Issuesthatwarrantimmediatecriticalcommunicationwiththeclientinclude: Copyright 2010PathMakerGroup.Allrightsreserved.

Identificationthatthesystemiscurrentlycompromisedbyanotherparty,or Indications that sensitive information including: protected health info; financial info; or personallyidentifiableinfomayhavealreadybeencompromised,orarecurrentlyexposed. FinalReporting After the completion of all test cases defined in scope of work, a written report describing the detailed results of the tests is prepared to include findings and recommendations for improvement. The report should follow a uniform structure. Items that are included within the reportarethefollowing: Executive Summary: is a management report written to non technical executive on the businessrisksandthehigh levelnextstepstoremediatetherisks. Articulatethescopeoftheproject,aswellasout of scopeitems(constraints). List the tools and techniques used during the test including exploit code and reference materials. Datesandtimesoftheactualtestsonthesystems Detailedoutputs,artifactsand/orscreenshotsofalltestsperformed.Reportsfromspecific automatedtoolswillgenerallybeincludedasexternalattachments. Alistingofallidentifiedvulnerabilities,classifiedbasedonthelevelofrisktothebusiness, andourrecommendationsonhowtosolvetheissuesfound. Alistingofactionitemsbasedonriskpriority(whatrecommendationstoperformfirstand potentialprocesschangesand/orsolutiontoconsider). CleanUpandDisposalofArtifacts All information including diagrams, code examples, vulnerability reports, and any exploitation artifactsthatwerecreatedand/orstoredonthetestedsystemsareremovedfromthesystems. Allartifactsandreportsrelatedtothetestareformallyhandedovertotheclientfordisposalor instructionforustodoso. If any artifacts cannot be removed, then all files, with their specific locations, are listed in the technicalreportinorderthattheclient spersonnelmayremovetheseafterthereporthasbeen receivedandtheprojectofficiallyclosedascomplete. Copyright 2010PathMakerGroup.Allrightsreserved.

ListofAdvancedAssessmentandExploitationTools Besidesthebasicsthatincludeping,telnet,dig,nslookup,traceroute,whois,netstatandseveral others,wehaveprovidedbelowarepresentativelistofadvancedtoolswithinourlibrarythatmay beemployedduringthepenetrationtest.ourselectionoftoolsforagivenprojectisbasedonthe resultsofourreconnaissanceandtheclient sspecificenvironment. 1. AttackToolKit 2. Brutus 3. BurpSuite 4. CainandAbel 5. Cattscanner 6. Ciscoauditingtool 7. Cisco torch 8. Crowbar 9. Dirb 10. DurzoSploit 11. DNSscan 12. Ethereal/Wireshark 13. Foundstonevulnerabilityscanner 14. FpDNS 15. FTPcheck 16. Getif 17. GrendelScan 18. Hping2 19. HTTPrint 20. Hydra 21. Ike scan 22. JohntheRipper 23. MD Webscan 24. MetaCoreTex 25. MetasploitFramework 26. Nessus(TenablePF) 27. Nikto 28. Nmap 29. Oedipus 30. Oracleauditingtool 31. Oracletools 32. Paros 33. Queso 34. RelayScanner 35. SamSpade 36. Sara 37. SinFP 38. Sitedigger 39. SiteSucker 40. SMTP scan 41. SNMP(Braa)tool 42. SQLauditingtool 43. SQLNinja 44. THC_Amap 45. W3af 46. Wapiti 47. Webfuzzer 48. Webroot 49. WebScarab 50. Wikto 51. Winfingerprint 52. Winfo 53. Winhex 54. Xscan Copyright 2010PathMakerGroup.Allrightsreserved.