Vulnerability Assessment and Penetration Testing



Similar documents
ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Understanding Security Testing

8 Steps for Network Security Protection

8 Steps For Network Security Protection

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

EC-Council Certified Security Analyst (ECSA)

Detailed Description about course module wise:

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Course Title: Penetration Testing: Network & Perimeter Testing

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Hackers are here. Where are you?

Network Incident Report

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Payment Card Industry Self-Assessment Questionnaire

2012 Data Breach Investigations Report

WHITE PAPER. An Introduction to Network- Vulnerability Testing

CRYPTUS DIPLOMA IN IT SECURITY

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

An Introduction to Network Vulnerability Testing

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing An Update

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

CYBERTRON NETWORK SOLUTIONS

Penetration Testing Service. By Comsec Information Security Consulting

Course Title: Penetration Testing: Security Analysis

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

NETWORK PENETRATION TESTING

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER

Web Security School Final Exam

Section 12 MUST BE COMPLETED BY: 4/22

Feeling Vulnerable? Jamie S. Herman, C CISO, CISM, CISSP Balazs Bucsay, OSCE, OSCP, GIAC, GPEN

Reducing Application Vulnerabilities by Security Engineering

Hosts HARDENING WINDOWS NETWORKS TRAINING

Penetration Testing //Vulnerability Assessment //Remedy

!!!!!!!!!!!!!!!!!!!!!!

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Student Tech Security Training. ITS Security Office

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Passing PCI Compliance How to Address the Application Security Mandates

PCI Requirements Coverage Summary Table

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Ethical Hacking Course Layout

Information Security Services

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report

Build Your Own Security Lab

Introduction to Cyber Security / Information Security

ICANWK406A Install, configure and test network security

Hackers are here. Where are you?

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Goals. Understanding security testing

Hands-on Hacking Unlimited

SCADA SYSTEMS AND SECURITY WHITEPAPER

Best Practices For Department Server and Enterprise System Checklist

A Case for Managed Security

Network Security Administrator

Achieving PCI Compliance Using F5 Products

Chapter 9 Firewalls and Intrusion Prevention Systems

Protecting Your Organisation from Targeted Cyber Intrusion

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

Presented by Evan Sylvester, CISSP

Targeted attacks: Tools and techniques

74% 96 Action Items. Compliance

Locking down a Hitachi ID Suite server

Windows Remote Access

Critical Controls for Cyber Security.

Payment Card Industry (PCI) Data Security Standard

Penetration testing & Ethical Hacking. Security Week 2014

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

Healthcare Security Vulnerabilities. Adam Goslin Chief Operations Officer High Bit Security

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Jort Kollerie SonicWALL

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

GFI White Paper PCI-DSS compliance and GFI Software products

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Metasploit Pro Getting Started Guide

Who is Watching You? Video Conferencing Security

Need for Database Security. Whitepaper

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

Transcription:

Vulnerability Assessment and Penetration Testing Presenters: Bruce Upton CISSP, CISA, C EH bruce.upton@protectmybank.com Jerry McClurg CISSP, CISA, C EH jerry.mcclurg@protectmybank.com

Agenda and Overview: Vulnerability Scanning and Identification: What is a vulnerability assessment? Internal versus external scanning an testing How are vulnerability tests different from penetration tests? Vulnerability scanning tools and reporting Additional considerations: Understanding vulnerability assessments and penetration tests are only valid for a short period of time Continuous monitoring Management oversight

What s the Difference?: Vulnerability Identification versus Penetration Testing: Vulnerability Assessment: Generally, a vulnerability assessment is an automated scan of network resources resulting in a detailed report of security vulnerabilities. Penetration Test: Penetration testing incorporates vulnerability scanning and identification, but additional effort is applied in an attempt to exploit identified vulnerabilities. Vulnerability assessments and penetration tests are both good security due-diligence.

What s the Difference?: Vulnerability Identification versus Penetration Testing: A vulnerability assessment may identify the following security weaknesses: Users have local administrator rights on their Windows 7 computers. Users can access most websites on the Internet. Users have the authority to run programs from within Internet Explorer. A penetration test would identify the security weaknesses, but go quite a bit further: Users have local administrator rights on their Windows 7 computers. Users can access most websites on the Internet. Users have the authority to run programs from within Internet Explorer. A user was convinced to visit a phishing website The user ran a connection test application Symantec Antivirus did not detect the connection test application Unauthorized remote access was obtained into the network.

Internal versus External: Generally speaking, there are two types of assessments: Internal Assessment: The vulnerability scan or penetration test is performed from inside the organization. The engineer(s) either physically visit the organization or gain secure remote access. The test simulates an attack from the inside-out. This overall approach will: Identify internal devices (enumeration) Identify services and footprint internal devices Identify internal security weaknesses in the following, at a minimum, categories: Patch management, network segregation, network access controls, data security, intrusion detection systems (IDS) testing, SCADA (if in scope), key management and crypto security (if in scope); Password practices and overall PC, server, and network device security due-diligence, etc.

Internal versus External: Generally speaking, there are two types of assessments: External Assessment: The vulnerability scan or penetration test is performed from outside the organization. The engineer(s) test the organizations infrastructure using an outside-in approach. This overall approach will: Identify external devices (enumeration) Identify services and foot print external devices Identify external security weaknesses in the following, at a minimum, categories: Firewall security, remote access portals, database management system (DBMS) security, web application security, intrusion detection systems (IDS) and intrusion prevention services (IPS) testing.

Testing Quality: Testing quality and effectiveness: The overall effectiveness of your assessment is generally based on three main factors: The effectiveness and thoroughness of the scanning toolset(s) The overall quality and talent of the internal and/or external security firm or personnel Certifications, experience, etc. How effectively the security firm and internal departments work together Free flow of information between the firm and key departments is central to the success of an assessment

Toolsets: Vulnerability scanning toolsets: The effectiveness and thoroughness of a vulnerability assessment is heavily based on toolsets. Some effective toolsets include: Qualys Internal and external vulnerability scanning Low false-positive rates Pay per IP model Rapid7 Internal and external vulnerability scanning Low false-positive rates Pay per IP model Nessus Internal and external vulnerability scanning Effective pricing model In our experience, Nessus tends to have a higher false-positive rate Nexpose Internal and external vulnerability scanning Community edition available Low false-positive rates

Toolsets: Vulnerability scanning toolsets: Qualys Enterprise scanning tool with a number of compliance modules

Toolsets: Vulnerability scanning toolsets: Qualys Reporting, remediation tracking and a large knowledgebase:

Toolsets: Vulnerability scanning toolsets: Qualys Advantages: Low false-positive rates Detailed reporting Remediation tracking Most vulnerabilities identified will have resolution strategies Disadvantages All scan data is stored in the cloud at Qualys Pay-per-IP model makes scanning large IP blocks very expensive

Toolsets: Vulnerability scanning toolsets: Nexpose Enterprise-class with a low false-positive rate, strong reporting and numerous compliance templates

Toolsets: Vulnerability scanning toolsets: Nexpose Extensive compliance and simulation testing:

Toolsets: Vulnerability scanning toolsets: Nexpose Advantages: Low false-positive rates Detailed reporting Many compliance and simulation scan templates Most vulnerabilities identified will have resolution strategies It s not a pay-per-ip scanning solution, potentially making it a good fit for internal scanning and testing Disadvantages Like most vulnerability scanners it generates a lot of network traffic. It could cause network latency or denial-of-service if it s not configured properly. Resource intensive It s pricy at about $10,000 to $15,000 depending on the scope and services needed

Tool Availability: Overall, We re seeing two concerning trends today: The availability of hacking tools is unprecedented. Free tools to: Exploit websites Identify vulnerabilities Perform data mining Hacking wireless networks, etc. Tools available to hide your tracks and/or become virtually invisible are at an all time high. Examples include: VPN solutions that don t keep long-term logs ProXPN - pro TOR Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security torproject.org The world has learned just how effective TOR is: the Snowden leaks demonstrated the NSA has not broken TOR (only circumvented it)

Why are we concerned? The following attack was performed using publicly-available software and our origin was successfully masked: First step, go dark (anonymous) to obscure where your Internet traffic is originating from. In our case, it looks like we re coming from Germany:

Why are we concerned? The following attack was performed using publicly-available software and our origin was successfully masked: An outside-in approach was used and it starting with Google hacking: The hacker identifies a target (neither of these websites were used in our demonstration):

Why are we concerned? The following attack was performed using publically-available software and our origin was successfully masked: An escape string is used to look for an SQL-injection vulnerability: Inserting the string generated an error:

Why are we concerned? The error message tells us it s likely vulnerable to an SQLinjection attack Further testing reveals it is, and the following information is initially obtained via SQL-injection strings:

Why are we concerned? SQL-injection commands are further used to extract information: Database table names are obtained using an SQL-injection string: Count(table_name) of information_schema.tables where table_schema=0x67656d656469615f7073 is 27 Note the users table

Why are we concerned? SQL-injection commands are further used to extract information: Table field names are extracted from the users table: Count(column_name) of information_schema.columns where table_schema=0x67656d656469615f7073 and table_name=0x7573657273 is 13

Why are we concerned? SQL-injection commands are further used to extract information: Username and password field data are extracted from the users table: Count(*) of XXXXXXXX_ps.users is 4

Why are we concerned? Data extraction: Testing revealed the passwords are encrypted How are they encrypted? How do we find out? Is there a way to decrypt them?

Why are we concerned? Password decryption: There are a number of off-line tools such as Hashcat and L0phtCrack that can be used to launch brute-force or dictionary attacks. A number of websites specialize in dictionary lookups Cloudcracker.com Crackstation.net md5decrypter.co.uk

Why are we concerned? Password decryption: We were able to successfully identify how the passwords were encrypted, and we were able to decrypt two of three:

Why are we concerned? Malicious intent: We stopped testing at this point, but unfortunately, most blackhat hackers would not. Web anonymity is a great way to encourage Internet privacy. However, the tools to protect our Internet privacy are being used maliciously by hackers to cover their tracks.

Additional Considerations Vulnerability and penetration testing frequency: Vulnerability assessments and penetration tests are only valid for a short period of time For example, the second Tuesday of every month is known as Patch Tuesday. The following Wednesday is known as Exploit Wednesday. To address these security gaps-in-time, continuous monitoring systems can be implemented: Bit9 Parity Tripwire FireMon

Additional Considerations Assess and Identify All Ports, Programs, and Services : The programs we have discussed should identify all active ports/services What About Software Programs or Inactive Processes? Tools that Identify All Installed Software Microsoft Assessment and Planning (MAP) Toolkit Emco Network Software Scanner Try to use at least two programs to check against each other

Additional Considerations

Additional Considerations Assessment Plan: Start from the External View View Information from a Hacker Viewpoint Domain and DNS Registration Gateway Routers, IDS, Firewalls Email and DMZ Devices Internal Network Internal/Rogue User Access Vendor/Visitor Access Remote Access

Additional Considerations Document and Track Open Issues: Easy to Lose Track Without Tracking and Follow-up Schedule Regular Progress Updates and Report to Management

Summary and Take-Aways: Document and Follow an Assessment Plan Maintain Multiple Software Toolsets Stay Engaged Technology Security is a Moving Target

Questions?