Penetration Testing. University of Sunderland CSEM02 Harry R Erwin, PhD



Similar documents
Cisco Advanced Services for Network Security

How To Perform An External Security Vulnerability Assessment Of An External Computer System

Hosts HARDENING WINDOWS NETWORKS TRAINING

Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing An Update

93% of large organisations and 76% of small businesses

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

An Introduction to Network Vulnerability Testing

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

CyberNEXS Global Services

Goals. Understanding security testing

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

The Trivial Cisco IP Phones Compromise

NETWORK PENETRATION TESTING

Understanding Security Testing

Module 4 Protection of Information Systems Infrastructure and Information Assets. Chapter 6: Network Security

Introduction to Penetration Testing Graham Weston

Basics of Internet Security

A Decision Maker s Guide to Securing an IT Infrastructure

Payment Card Industry (PCI) Data Security Standard

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

74% 96 Action Items. Compliance

Network Segmentation

2012 Data Breach Investigations Report

EC-Council Certified Security Analyst (ECSA)

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

PENTEST. Pentest Services. VoIP & Web.

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

Attack and Penetration Testing 101

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Penetration Testing Service. By Comsec Information Security Consulting

Course Title: Penetration Testing: Communication Media Testing, 1st Edition

Security Testing in Critical Systems

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Network and Host-based Vulnerability Assessment

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Penetration Testing. Presented by

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Web Application Vulnerability Testing with Nessus

H.I.P.A.A. Compliance Made Easy Products and Services

05.0 Application Development

External Supplier Control Requirements

Network Security Audit. Vulnerability Assessment (VA)

Firewalls and Intrusion Detection

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

WHITE PAPER. An Introduction to Network- Vulnerability Testing

White Paper. Information Security -- Network Assessment

A Practical Approach to Threat Modeling

Network Security Administrator

Detailed Description about course module wise:

Threat Modelling for Web Application Deployment. Ivan Ristic (Thinking Stone)

Avaya G700 Media Gateway Security - Issue 1.0

Avaya TM G700 Media Gateway Security. White Paper

Information Security Organizations trends are becoming increasingly reliant upon information technology in

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Presented by Evan Sylvester, CISSP

Developing Network Security Strategies

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Passing PCI Compliance How to Address the Application Security Mandates

How To Protect Your Network From Attack From Outside From Inside And Outside

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Chapter 9 Firewalls and Intrusion Prevention Systems

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan

Analyze. Secure. Defend. Do you hold ECSA credential?

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report

Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements

Penetration Testing Services. Demonstrate Real-World Risk

Payment Card Industry Self-Assessment Questionnaire

Beyond the Hype: Advanced Persistent Threats

Hackers are here. Where are you?

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Learn Ethical Hacking, Become a Pentester

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

Security Technology: Firewalls and VPNs

How To Audit The Mint'S Information Technology

Security and Vulnerability Testing How critical it is?

Recommended IP Telephony Architecture

Becoming PCI Compliant

Information Security Assessment and Testing Services RFQ # Questions and Answers September 8, 2014

INFORMATION TECHNOLOGY ENGINEER V

Transcription:

Penetration Testing University of Sunderland CSEM02 Harry R Erwin, PhD

Resources Qinetiq Information Security Foundation Course (2002) Tittle, Stewart, and Chapple, 2004, CISSP: Certified Information Systems Security Professional Study Guide, 2 nd edition, Sybex Whittaker and Thompson, 2004, How to Break Software Security, Pearson

Definition An activity used to test the strength and effectiveness of deployed security measures with an authorized attempted intrusion attack. Penetration testing should be performed only with the consent and knowledge of the management staff. (Tittle et al., 2004)

General Comments Usually done to give management a warm and fuzzy feeling about the security of their system. Expensive Does not substitute for good security testing or for good security design. This discussion will be of how it is done.

General Approach The members of the team first scope the penetration test. This includes: Consultation with the customer about the specific type of testing to be performed. On-site Remote Application Telecommunications Hybrid Number of hosts to be tested Timescale

Penetration Testing Services Begins with a tailored security health check (SHC), comprised of part or all of: Network security health check Onsite Remote Application security health check Telecommunications security health check Should be flexible and appropriate

Network SHC Location can be remote or onsite Starts with public records RIPE/DNS/Google (you ve seen this demonstrated) Network assessment Architecture Gateways (RIP/OSPF) Firewalls (ACL/rules) Protocols IP range Anomalies

Network Testing If onsite, you will need to conduct on-host audits Windows Unix Infrastructure management should also be assessed Remote/terminal/back-end management Should include a comprehensive configuration review and recommendations

Network Testing Host assessment Identify the live hosts. Apply operating system fingerprinting to identify potential vulnerabilities. Determine the trust relationships. Service assessment Services offered. Anomalies and vulnerabilities.

Network Testing Vulnerability assessment Automated tools? Manual determination Risk assessment of data flow

Application Testing What applications are running? By server type Stovepipe or specialized systems Protocols Session and authentication handling Default scripts and generic vulnerabilities

Authentication Analysis Session handling Session identifier how predictable and identifiable, can it be brute forced, can it be replicated? Session timeout Comparison to best practices Correctly implemented? Predictable secret values? Is brute force blocked? Password complexity adequate?

Transactional Security Can transactions be identified in the data stream? How much information can be derived from them? What happens when Transactions are replicated Transactions are injected Transactions are deleted

Source Code Review Logical analysis Control flow Functionality Information leakage Error messages Input validation Bad input Bypass Drilling through Expensive in time and money. Pay me now, or pay me later. It costs more later.

Telecomms Testing War-dialing and modem detection Identified modems need to be inventoried PABX audit looks for: Toll fraud Call redirection Remote reconfiguration Trunk line configuration

Penetration Test Process Scope/preparation Briefing Physical test Knowledge transfer and education Diagnosis Debriefing Report

Scope/Preparation Scope and scale the test Establish deadlines and schedules Sign contract Conduct test planning Risk and perceived threat Technology Identify and deploy necessary skills

Initial Briefing Meet technical staff Collect contact information Describe the test Identify areas of concern Maintain contact Track major user issues Be open

Physical Test Evaluate the network IP range Subnets Automated tests (nessus/nmap) Hands-on tests Prior experience of testers Trust analysis Exploits

Debriefing Evaluated automated results Assess anomalies Ensure full scope of testing has been completed Make sure the nature of any successful penetration is clear to the customer

Closure Make sure all experts/managers are involved. Discuss all results Identify who receives reports Provide contact details Prepare report When due, what, and follow-up.

Conducting the Test Identify target and goal Gather information Identify potential routes into network Test potential routes Capture target

Identify Target and Goal Targets What is to be attacked? Goals Compromise Privacy-sensitive data Defacement Denial of service Fraud

Information Gathering Resources include: RIPE (Europe) ARIN (US) DNS IRC (technical chat rooms) Phone books Public business records Trash cans Google (which you ve seen)

Potential Routes Social engineering Open sources Newsgroups and papers published Use this to plan the penetration Play the role Create trust

Telecomms War-dialing to identify modems Voice mail

Mapping Identify servers and subnets Evaluate firewalls and routers Each route in needs to be assessed Firewalls Protection Access Speed Special circumstances

Capture Target Develop detailed capture scenario Take into account vulnerabilities and special circumstances Implement Usually, you will demonstrate the initial access point vulnerability, give the administrators time to fix it, and continue from the access point to the target.

What Allows This to Succeed? Public data Uneducated staff Misconfigured servers Misconfigured boundary protection Lack of IDS Patches not implemented

Countermeasures Have your security reviewed Educate users and staff Implement authentication, access control, and audit Use an IDS Code reviews Keep private data private