Client logo placeholder XXX REPORT. Page 1 of 37

Similar documents
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Web Application Vulnerability Testing with Nessus

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

Using Nessus In Web Application Vulnerability Assessments

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Learn Ethical Hacking, Become a Pentester

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

CYBERTRON NETWORK SOLUTIONS

CRYPTUS DIPLOMA IN IT SECURITY

encription IT Security and Forensic Services


The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

(WAPT) Web Application Penetration Testing

Payment Card Industry (PCI) Executive Report 08/04/2014

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

Security Considerations White Paper for Cisco Smart Storage 1

Application Security Testing. Generic Test Strategy

Web App Security Audit Services

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Payment Card Industry (PCI) Executive Report. Pukka Software

IBM. Vulnerability scanning and best practices

Certified Ethical Hacker (CEH)

An Introduction to Network Vulnerability Testing

Vulnerability Assessment and Penetration Testing

Online Vulnerability Scanner User Manual

Penetration Testing Report Client: Business Solutions June 15 th 2015

Web Application Security

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Online Vulnerability Scanner Quick Start Guide

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Automated Vulnerability Scan Results

Where every interaction matters.

WHITE PAPER. An Introduction to Network- Vulnerability Testing

Criteria for web application security check. Version

Payment Card Industry (PCI) Executive Report 10/27/2015

Course Content: Session 1. Ethics & Hacking

Understanding Security Testing

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

Kentico CMS security facts

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Penetration Testing with Kali Linux

Payment Card Industry (PCI) Data Security Standard

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER

Passing PCI Compliance How to Address the Application Security Mandates

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

05.0 Application Development

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

Payment Card Industry (PCI) Data Security Standard

What is Web Security? Motivation

Cyber Essentials. Test Specification

WEB APPLICATION HACKING. Part 2: Tools of the Trade (and how to use them)

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

External Network & Web Application Assessment. For The XXX Group LLC October 2012

QuickBooks Online: Security & Infrastructure

Ethical Hacking Course Layout

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

SCP - Strategic Infrastructure Security

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Web Vulnerability Assessment Report

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

NETWORK PENETRATION TESTING

Andreas Dittrich, Philipp Reinecke Testing of Network and System Security. example.

AN OVERVIEW OF VULNERABILITY SCANNERS

GFI White Paper PCI-DSS compliance and GFI Software products

Columbia University Web Security Standards and Practices. Objective and Scope

STABLE & SECURE BANK lab writeup. Page 1 of 21

PCI Security Scan Procedures. Version 1.0 December 2004

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

Single Sign-On for the Internet: A Security Story. Eugene Tsyrklevich eugene@tsyrklevich.name Vlad Tsyrklevich vlad902@gmail.com

Demystifying Penetration Testing

April 11, (Revision 2)

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

Web application security

External Network Penetration Test Report

Sonian Getting Started Guide October 2008

74% 96 Action Items. Compliance

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Magento Security and Vulnerabilities. Roman Stepanov

Web Plus Security Features and Recommendations

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

Penetration Testing in Romania

Thick Client Application Security

Attack Vector Detail Report Atlassian

Penetration Testing Workshop

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Kerem Kocaer 2010/04/14

Transcription:

Client logo placeholder XXX REPORT Page 1 of 37

Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company Version Control Version Date Author Description Page 2 of 37

Table of Contents : Table of Contents :... 3 Table List... 4 Graph List... 4 1. Executive Summary... 5 1.1. Scope Purpose and Duration of Work... 5 1.2. Findings... 5 1.3. Social Engineering Statistics... 5 1.4. Risk Distribution... 5 2. Methodology... 6 2.1. Determining the Scope... 7 2.2. Information Gathering... 8 2.3. Scanning... 14 2.4. Vulnerability Analysis... 19 2.5. Social Engineering Approaches... 31 2.6. Exploitation... 32 2.7. Post Exploitation... 33 3. Detailed Information on Findings... 34 3.1. Definition of Risk levels... 34 3.2. Vulnerability List... 35 4. Detected Vulnerabilities and Recommendations.... 36 4.1. Host Vulnerabilities... 36 4.2. Vulnerabilities by IP Numbers... 37 Page 3 of 37

Table List Table 1: Tested Systems... 5 Table 2: Risk level definitions.... 34 Table 3: Vulnerabilities According to risk level.... 35 Graph List No table of figures entries found. Page 4 of 37

Executive Summary 1. Executive Summary 1.1. Scope Purpose and Duration of Work In accordance with the contract signed between T&VS and [CLIENT], the penetration test was performed on [XXX domain and applications] between [DATE] and [DATE]. Domains and applications were tested for ### work hours. Reporting took ### work hours. The purpose of the test was to [determine sec vulnerabilities, pci compliance, etc]. The scope of the test was limited to [IP address(es) listed/ web application(s) on the IP adress(es) listed] below. IP Number XXX Domain XXX Table 1: Tested Systems 1.2. Findings Urgent Critical High: Medium: Low: 1.3. Social Engineering Statistics # Total emails sent Total clicks on the fake page Total credentials revealed 1.4. Risk Distribution (create a graph like this using Table-3) Risk Distribution 40% 20% 10% 30% Acil Kritik Yüksek Orta Düşük Graph 1: Risk Distribution. Page 5 of 37

Methodology 2. Methodology The methodology consisted of # of steps beginning with the determination of test scope, and ending with reporting. These tests were performed by security experts using potential attackers modes of operation while controlling execution to prevent harm to the systems being tested. The approach included but is not limited to manual and automated vulnerability scans, verification of findings (automated and otherwise). This verification step and manual scanning process eliminated false positives and erroneous outputs, resulting in more efficient tests. Determining scope of the test Information Gathering / Reconnaissance Scanning Vulnerability Analysis Exploitation Post-Exploitation activities (Social Engineering - Optional) (Other Optional activity e.g. DDoS tests, Firewall gap analysis, log reviews, professional training) Reporting Page 6 of 37

Methodology 2.1. Determining the Scope Choose one, delete other Our first step was determining the scope of the test. Since this was a Blackbox/Whitebox/Graybox (explain) test scope, as agreed with the client. Our first step was determining the scope of the test. This was a Blackbox test, therefore the target was researched to establish the test scope. [Full research work, whois data, registrars, scans, etc.] Page 7 of 37

Information Gathering 2.2. Information Gathering Before directly accessing the target we researched everything we could locate from third party resources. This included DNS records, previous hacking attempts, job listings, email addresses, etc. This information was used in later tests. 2.2.1. IP Addresses and Domains Here is a list of the IP addresses and domains gathered using search engines: a.b.c.d www.host.com 2.2.2. Virtual Hosts Virtual hosts sometimes share the same IP address with other website addresses. An attacker can compromise the server on which the target application runs using a vulnerability found on another website hosted on the same server. a.b.c.d www.host.com Page 8 of 37

IP Range Information 2.2.3. IP Range Information Page 9 of 37

Detailed DNS Records 2.2.4. Detailed DNS Records DNS records identify URL/IP pairs. DNS servers connect the organization website to outside world. Exploitation of these servers may lead to malicious usage of the organization web and mail servers. Page 10 of 37

WHOIS Information 2.2.5. WHOIS Information WHOIS searches provide information regarding the domain name. It may include information such as domain ownership, where and when it was registered, expiration date, email address of the domain manager and the server names assigned to the domain. Page 11 of 37

Job Advertisements 2.2.6. Job Advertisements Job advertisements may reveal information about the organization systems and network. The requirements specified in job adverts sometimes disclose information regarding which programme languages and systems are used, providing attackers with more specific knowledge of the targets. PHP By analyzing the following job advertisements we obtained the information listed below. Page 12 of 37

Login Pages Found During Server Analysis 2.2.7. Login Pages Found During Server Analysis Login pages are the front line of an application s defence against unauthorized access. They also present a surface area of interest to attackers who will try to defeat the defences in order to access the functionality and data within the system. This section indentifies the URLs and screens of the login pages discovered during analysis. Page 13 of 37

Port Scans 2.3. Scanning Various scans were performed to determine and verify vulnerabilities in the target systems. Expand scans you did and remove scans you didn t do, if you executed a scan not listed here add it to the list and update the template. If you used any tools explain what you used and why. Screenshots/text logs for results 2.3.1. Port Scans Which tool did you use, explain why. Screenshots/text logs for results Primarily nmap is used to scan the targets. Besides nmap, tools like strobe, xprobe, amap are used to determine which ports are open, which operating systems are working on targets, and which services are used. Host (IP) Open Port: Service: (tcp/80) A web server is running on this port. (tcp/443) A web server is running on this port through TLSv1. (tcp/443) A TLSv1 server answered on this port. Page 14 of 37

Route Scans 2.3.2. Route Scans Which tool did you use, explain why. Screenshots/text logs for results Using tools like hping, scanrand, traceroute, the network mapping of targets can be determined. It is also useful for detecting defensive measures like IDS, IPS, UTM, and firewalls. Page 15 of 37

SNMP Scans 2.3.3. SNMP Scans Which tool did you use, explain why. Screenshots/text logs for results Using onesixtyone, SNMP scans were conducted to gain information. Page 16 of 37

Server Identification 2.3.4. Server Identification Which tool did you use, explain why. Screenshots/text logs for results Using tools like httprint, smtpscan, detected servers (HTTP, FTP, SMTP, POP, IMAP, etc) from previous scans are listed and classified by their brand/model/operation systems/version numbers. Page 17 of 37

VPN Identification 2.3.5. VPN Identification Which tool did you use, explain why. Screenshots/text logs for results Using ike-scan, the network was traced for VPN servers. Page 18 of 37

Scanning Target Systems 2.4. Vulnerability Analysis 2.4.1. Scanning Target Systems Using vulnerability scanners like nessus, acunetix, etc, target systems were crosschecked with up-todate vulnerability databases. Page 19 of 37

2.4.2. SSL Certificates SSL certificates used in target systems were scanned to determine the validity of their security. (ssl analyzer) Page 20 of 37

Password Breaking 2.4.3. Password breaking (Optional) Using tools like hydra, nessus, a password breaking attack was executed by Brute force / Dictionary attack techniques. Page 21 of 37

Privilege Escalation Attacks 2.4.4. Privilege Escalation Attacks Attacks where the goal is by-passing access control systems. (Logins, cookies, etc.) Page 22 of 37

Web Scans 2.4.5. Web Scans Using tools like nikto and wfuzz, folders and files hidden from end users were searched. *: For simplification of the results, false positive items have been removed from the output. Host (IP) port 80 --------------------------------------------------------------- + Target IP: + Target Hostname: + Target Port: + Start Time: --------------------------------------------------------------- Page 23 of 37

Business Logic Flaws 2.4.6. Business Logic Flaws Flaws in application logic are harder to characterize than headline vulnerabilities like SQL injection. In all but the simpliest of applications a large amount of logic is executed at every stage which presents an intricate surface of great interest to attackers. Page 24 of 37

HTML Source Code Analysis 2.4.7. HTML Source Code Analysis HTML source codes on the targets were checked to gather useful information. Page 25 of 37

Testing for CAPTCHA 2.4.8. Testing for CAPTCHA CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a type of challenge-response test used by many web applications to ensure responses are not generated by computers. CAPTCHA implementations are often vulnerable to attacks even if the generated CAPTCHA is unbreakable. Page 26 of 37

XSS Scans 2.4.9. XSS Scans Cross-Site Scripting vulnerabilities on input fields were checked. Hostname Affected item Affected Request Page 27 of 37

SQLi Scans 2.4.10. SQLi Scans Possible SQL injection points on target servers were checked. Page 28 of 37

Input Sanitizations 2.4.11. Input Sanitizations Various input points in the applications were tested to determine if they could be used for unintended purposes (file upload, file download, read access, etc). Page 29 of 37

Session Security 2.4.12. Session Security Cookie security and the presence of Cross-Site Request Forgery (XSRF) vulnerabilities were tested. Page 30 of 37

Social Engineering Approaches 2.5. Social Engineering Approaches 2.5.1. Direct Social Engineering Exploiting information from employees of the client. 2.5.2. Document Analysis. Combing through documents found in scans. 2.5.3. Previous Hack Attempts. Collecting information on previous attacks. 2.5.4. E-mails Collected email list for SET phishing attacks. Page 31 of 37

Exploitation 2.6. Exploitation Collect, list and explain every exploit found in the vulnerability scan steps. Page 32 of 37

Post-Exploitation 2.7. Post Exploitation If necessary list any post exploitation work here (removing traces, deleting logs, removing backdoors put in system) Page 33 of 37

Definition of Risk levels 3. Detailed Information on Findings 3.1. Definition of Risk levels Risk levels are based upon PCI / DSS standard definitions. The risk levels contained in this report are not the same as risk levels reported by the automated tools in general. Risk Level Urgent Explanation Trojan horses, Backdoors, file read write vulnerabilities, remote code execution. 5 th level vulnerabilities give attackers remote root/administrator access and full control of the system. Critical Potential Trojan horses, potential backdoors. File read vulnerability, limited filer write vulnerabilities. High Medium Low Table 2: Risk level definitions. 4ths level gives attacker limited access to controlling the systems. And access to critical confidential data. Limited read, directory traversal, denial of service. 3 rd level gives attacker access to private data such as security settings and partial file information and/or limited file access. Information gathered from this level vulnerability can potentially be used in harmful ways. Mail relay and DoS vulnerabilities are also classified this level. Detailed configuration data, service version numbers, installed patches. 2 nd level vulnerabilities discloses sensitive information about systems that can be used as basis for future attacks. Basic configuration data. 1 st level vulnerabilities (a.k.a. low, a.k.a. informational) vulnerabilities gives basic information for the system. Page 34 of 37

Vulnerability List 3.2. Vulnerability List Vuln. Code Vulnerability Definition. Risk Level Affected count Table 3: Vulnerabilities According to risk level. Page 35 of 37

Host Vulnerabilities 4. Detected Vulnerabilities and Recommendations. List every vulnerability found using this format 4.1. Host Vulnerabilities 4.1.1. Example XXX Vulnerability. Risk Source : risk level : page url, ip address, system name, etc. (i.e. domain name /login.php) If multiple systems are affected by same vulnerability list all Explanation : Explanation of vulnerability, including Screenshots Recommendation : What can client do to solve the problem (i.e upgrade, apply patch) Page 36 of 37

Vulnerabilities by IP Numbers 4.2. Vulnerabilities by IP Numbers Name Reverse DNS Open Services XXXIP Notes Level Urgent Critical Medium Low Vulnerabilities Page 37 of 37