Penetration Testing in Romania



Similar documents
Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Penetration Testing - a way for improving our cyber security

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

Pentests more than just using the proper tools

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

ISSECO Syllabus Public Version v1.0

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

Information Security Services

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Pentests more than just using the proper tools

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Evolution of Penetration Testing

About Effective Penetration Testing Methodology

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Where every interaction matters.

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WEB APPLICATION VULNERABILITY STATISTICS (2013)

Penetration testing & Ethical Hacking. Security Week 2014

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

THE OPEN UNIVERSITY OF TANZANIA

Penetration Testing Services. Demonstrate Real-World Risk

An approach to Web Application Penetration Testing. By: Whiskah

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Application Security Testing

Bust a cap in a web app with OWASP ZAP

Web Application Security

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

05.0 Application Development

Magento Security and Vulnerabilities. Roman Stepanov

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Using Free Tools To Test Web Application Security

Passing PCI Compliance How to Address the Application Security Mandates

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Integrating Security Testing into Quality Control

Client logo placeholder XXX REPORT. Page 1 of 37

Introduction to Penetration Testing Graham Weston

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Feeling Vulnerable? Jamie S. Herman, C CISO, CISM, CISSP Balazs Bucsay, OSCE, OSCP, GIAC, GPEN

Secure Web Applications. The front line defense

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Cyber R &D Research Roundtable

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Overview of the Penetration Test Implementation and Service. Peter Kanters

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

SECURITY. Risk & Compliance Services

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

Web Application Penetration Testing

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Effective Software Security Management

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Web App Security Audit Services

Adobe Systems Incorporated

Hands-On Ethical Hacking and Network Defense - Second Edition Chapter 1. After reading this chapter and completing the exercises, you will be able to:

Penetration Testing Report Client: Business Solutions June 15 th 2015

Vinny Hoxha Vinny Hoxha 12/08/2009

Criteria for web application security check. Version

Strategic Information Security. Attacking and Defending Web Services

(WAPT) Web Application Penetration Testing

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Penetration: from Application down to OS

External Scanning and Penetration Testing in PCI DSS 3.0. Gary Glover, Sr. Director of Security Assessments

SAST, DAST and Vulnerability Assessments, = 4

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

SQuAD: Application Security Testing

Penetration Testing Scope Factors

FedRAMP Penetration Test Guidance. Version 1.0.1

Pentesting for fun... and profit! David M. N. Bryan and Rob Havelt

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

What is Penetration Testing?

Web application testing

Information Security Organizations trends are becoming increasingly reliant upon information technology in

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

A Decision Maker s Guide to Securing an IT Infrastructure

PENETRATION TESTING GUIDE. 1

Essential IT Security Testing

HP WebInspect Tutorial

Evaluation of Penetration Testing Software. Research

Columbia University Web Security Standards and Practices. Objective and Scope

Rational AppScan & Ounce Products

Web Engineering Web Application Security Issues

Security for a Smarter Planet IBM Corporation All Rights Reserved.

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Transcription:

Penetration Testing in Romania Adrian Furtunǎ, Ph.D. 11 October 2011 Romanian IT&C Security Forum

Agenda About penetration testing Examples Q & A 2

What is penetration testing? Method for evaluating the security of an information system or network by simulating attacks from malicious outsiders or insiders. Related terms: Penetration testing Pentesting Ethical hacking Tiger Teaming Red Teaming (RO: teste de penetrare, teste de intruziune) Penetration testing is not Vulnerability assessment Penetration testing is: authorized adversary-based ethical (for defensive purposes) 3

Penetration testing by example Threats Vulnerabilities Assets Risks Vulnerable? Exploitable? External attacker - hacker - industrial espionage - organized crime Internal attacker - malicious employee - collaborator - consultant - visitor Insufficient input validation Insecure session configuration Application logic flaws Insecure server configuration Internet Banking application SQL injection OS command execution Authentication bypass Cross Site Scripting Directory browsing H H H M M Password autocomplete L 4

Motivation. Why? When? Verify the effectiveness of protection mechanisms implemented Application security mechanisms Server configurations Network configurations Employee security awareness Physical security Test the ability of system defenders to detect and respond to attacks Obtain a reliable basis for investments in security personnel and technology Required by ISO 27001, PCI DSS, etc As part of risk assessment for risk identification and quantification As part of ongoing/periodic security assessment Before a new system is put in production In the development phase of a new system 5

Penetration testing objectives and targets (examples) External penetration test: Test the security of internet banking / mobile banking apps Evaluate the security of internet facing applications Perform fraudulent transactions in online shops Access personal data in online medical applications Gain physical access to company building and install rogue access point Internal penetration test: Obtain access to database server containing customer information Gain control of Active Directory Obtain administrative access to ERP application Gain access to company assets (sensitive files, project plans, intellectual property) 6

Penetration testing types According to attacker s location: Test type External pentest Internal pentest Simulated threats Hackers, corporate espionage, terrorists, organized crime Malicious employee, collaborator, consultant, visitor According to attacker s initial information: Black box test Gray box test White box test Hackers, organized crime, terrorists, visitors Consultants, corporate espionage, business partner, regular employees Malicious system administrators, developers, consultants According to the attacks performed: - pure technical - social engineering - denial of service 7

How? Information gathering Create attack trees Prepare tools Perform collaborative attacks Identify vulnerabilities Exploit vulnerabilities Extract sensitive data Gain system access Escalate privileges Pivot to other systems Write the report 8

Automated vs. Manual Automated testing: Configure scanner Run scanner & wait for results (Validate findings where possible) Deliver report to client Manual testing: Use tools as helpers only Validate findings by exploitation (no false positives) Dig for sensitive data, escalate privileges, gain access to other systems Model and simulate real threats: simulate attacker s way of thinking, consider attacker s resources, knowledge, culture, motivation Several manual tests for exploitation of specific vulnerabilities Strict control, logging, quick feedback Interpret the findings according to business impact 9

Resources Dedicated machines Dedicated network Software tools: In-house developed Open source Commercial Dedicated workspace (IT Security Laboratory) Protect client data Logging facility 10

Limitations Timeframe Budget Resources Personnel awareness All software vulnerabilities Known Vulnerabilities Things change Does not discover all vulnerabilities but reduces the number of vulnerabilities that could be found by high skilled attackers having similar resources and knowledge 11

Reporting Executive summary Overview Key findings High-level observations Risk matrix Technical report Findings Risks Recommendations Present report to client 12

Standards, Certifications and Knowledge Security testing standards: OSSTMM - Open Source Security Testing Methodology Manual NIST 800-42 - The National Institute of Standards and Technology Special Publication OWASP - The Open Web Application Security Project Certifications: Knowledge: Offensive Security OSCE, OSCP, OSWP ISECOM OPST SANS GPEN, GWAPT EC-Council LPT, CEH CHECK Team Leader, Team Member CREST Registered Tester, Certified Tester System administration Network administration Software development Quality assurance / software testing 13

Examples (1): Outdated CMS allows unauthorized file upload 14

Examples (2): Arbitrary file download 15

Example (3): Gaining access to development servers 16

Example (4): Application logic flaw 17

Example (5): Social engineering 18

Example (6): Gaining root access 19

Thank you! Questions? Adrian Furtunǎ, Ph.D. afurtuna@kpmg.com