The Risks that Pen Tests don t Find. OWASP 13 April 2012. The OWASP Foundation http://www.owasp.org



Similar documents
Auditing Internet Security AUD11

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Recommended IP Telephony Architecture

Firewalls. Chapter 3

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

CMPT 471 Networking II

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Chapter 1 The Principles of Auditing 1

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Developing Network Security Strategies

Penetration Testing Report Client: Business Solutions June 15 th 2015

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

Networking for Caribbean Development

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Nixu SNS Security White Paper May 2007 Version 1.2

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

VMware: Advanced Security

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Network Segmentation

Information Security Attack Tree Modeling for Enhancing Student Learning

Blended Security Assessments

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

A Decision Maker s Guide to Securing an IT Infrastructure

IINS Implementing Cisco Network Security 3.0 (IINS)

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

PCI Requirements Coverage Summary Table

March

Implementing Cisco IOS Network Security

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Firewall Audit Techniques. K.S.Narayanan HCL Technologies Limited

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation

Securing E-Commerce. Agenda. The Security Problem IC Security: Key Elements Designing and Implementing _06_2000_c1_sec3

External Supplier Control Requirements

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Network Virtualization Network Admission Control Deployment Guide

Security Testing in Critical Systems

THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

13 Ways Through A Firewall

IT HEALTHCHECK TOP TIPS WHITEPAPER

74% 96 Action Items. Compliance

SECURE DATA CENTER DESIGN. Piotr Wojciechowski (CCIE #25543)

Linux Network Security

CompTIA Security+ (Exam SY0-410)

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

U06 IT Infrastructure Policy

Topics in Network Security

CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security ( )

Security Technology: Firewalls and VPNs

Did you know your security solution can help with PCI compliance too?

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Understanding Security Testing

Network Security Administrator

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Lab Configuring Access Policies and DMZ Settings

Cisco Certified Security Professional (CCSP)

ASDI Full Audit Guideline Federal Aviation Administration

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Protecting Your Organisation from Targeted Cyber Intrusion

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

On the Deficiencies of Active Network Discovery Systems

STREAM FRBC

Secure Software Programming and Vulnerability Analysis

Virtualization System Security

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.

Learn the Essentials of Virtualization Security

Firewall Environments. Name

8. Firewall Design & Implementation

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

BYOD Guidance: BlackBerry Secure Work Space

13 Ways Through A Firewall What you don t know will hurt you

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Consensus Policy Resource Community. Lab Security Policy

TABLE OF CONTENTS NETWORK SECURITY 2...1

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

Securing end devices

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

HOW TO CONFIGURE CISCO FIREWALL PART I

Learn the essentials of virtualization security

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

IBM. Vulnerability scanning and best practices

How To Secure An Rsa Authentication Agent


Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Transcription:

The Risks that Pen Tests don t Find 13 April 2012 Gary Gaskell Infosec Services gaskell@infosecservices.com 0438 603 307 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the License. The Foundation http://www.owasp.org

Objectives Raise debate about testing completeness Promote clear communication of testing scope and utility Describe risks from IT trends not found in pen tests Revisit other risks not reported from pen tests Share info about security holes that are hard to find by black box testing but very easy by inspection 2

Caveats Penetration testing is essential and a highly valued practice This talk s scope is limited to technical weaknesses This talk focuses on identification and analysis of vulnerabilities that cannot be efficiently discovered through pen testing 3

Finifter and Wagner, UC Berkley Scope: code review http://www.cs.berkeley.edu/~daw/papers/webapps11.pdf Used with permission.

? Analysis? Testing

Venn Diagrams Depend on scope Scope? Pen Test Analysis Infrastructure configuration Patching Design Coding Pen Test Analysis Controls Crypto v s Input validation

Theory The Venn diagram proportions will be different for a broader scope Pen tests check the first line of defense Ideal to provide assurance after design and implementation Inspections and analysis check defense in depth Determine the level of resilience Validation against policy and legal requirements

Terminology Black box No prior knowledge of design or target White box Design and implementation detail provided Testing by probing Analysis & inspection Review the design Inspection code Configuration Accounts and ACLs etc

Web Deployment Trends Virtualisation, virtualisation, virtualisation Co-hosting with other s web services Server virtualisation Storage virtualisation 8

Trends - Storage Virtualisation Stretching of SANs into the DMZ Alternative route into the inside All of an organisation s data in one place SAN controls Zoning, with Host Bus Adapters LUN masks or Access Control Lists Virtual servers can have very broad SAN access Use a separate SAN 9

Trends - Storage Virtualisation (2) References SAN Vendor guides IBM Red Book SAN Security

Trends - Server Virtualisation Internet servers on the internal VM farm, but mainly separate VM farms Several key controls not on by default ARP spoofing MAC changes Many DOS controls Persistent log files 11

Trends - Server Virtualisation (2) Sprawl Duplicates running AV forgotten Copies of other system snapshots Clones of insecure development configurations Snapshots unprotected on file system References Vmware Security Hardening Guide, 4.0, 4.1 Microsoft Security Compliance Manager (Hyper-V)

Network Filtering Pen tests and nmap great for obvious stuff ups Weaknesses harder to find Rules with source network filters Still seeing plaintext pop Rules for decommissioned servers (firewall hole reuse) No filtering from DMZ to internal networks No egress filtering Stuff up firewall object definitions Firewall software flaws and patches E.g. Cisco Pix ACL bypass 13

Network Filtering Vulnerable after a reboot Cisco different running and saved configs Unix disabled daemons that restart next boot Dodgy browser and proxy certificate trust roots 14

Network Route Authenticity DOS and Confidentiality attacks BGP authentication Border router outside the firewall Reference, NIST SP800-54 Real world attacks and accidents China Telecom advertised 37 000 unowned networks 2010 Pakistan Telecom blocks YouTube 2008 Malaysian ISP blocks Yahoo 2004 Turkish ISP takes over the Internet 2004, TTNet sent out a full table of Internet routes via BGP that routed most Internet traffic through Turkey for several hours (never seen this risk reported by a pen test)

Checking server security resilience Server resilience easier to find Network attack surface services Pen test hampered by the firewall Inspection = very quick netstat a rpcinfo p Password practices Account maintenance former admins Privilege escalation risks Process account controls Race conditions Protection of access to logs (e.g. password copies) Protection of log tampering 16

Server Resilience Privilege Escalation Plaintext admin access from jump box Common admin/root passwords Sufficient logging of events Poor OS file ACLs E.g. Unix crontabs Unix admin trusted path Patch level Can quickly tell patch status of all packages and not rely on fingerprinting Default passwords on other internal systems 17

Server Security Pen tests great for checking intrusion detection capabilities Systems analysis Logs not kept for long enough Increasingly seeing only 2-4 weeks of logs Faulty or incomplete backup schedules Faulty 10% of the time (in my experience) Only cover log data 1/3 of time Appropriate DR plan & testing Leakage of data through logs 18

Windows Server Security Systems analysis Very easy to inspect GPO Log settings that help forensics Good for checking AV deployments Coverage of systems particularly virtualised environments Currency and configuration heuristics Run MS tools on the box, MBSA, Sec template 19

Web Services Security Systems analysis Check ACLs to services in containers WS layer user interface protections bypassed inconsistent implementation of access controls compared to user interface simplistic authentication (e.g. single user for all access) lack of authorisation controls and/or acls on service actions (all or nothing). inappropriately detailed error messages (trying to make it easier for developers to build/debug clients) 20

Wireless Security Systems analysis Easier to check quality of PSK deployments Check for Rogue AP detection processes 21

Resilience Privilege Escalation via Networks Poor egress filtering Easy access from an owned server DMZ filtering Multiple homed servers Still seeing Unix servers routing Very easy to check ndd command Pen testing try source routing?? VLAN jumping via shared or trunked switches Access to admin interfaces Poor authentication policy Unencrypted access 22

Resilience Privilege Escalation via Networks Hacked virtual server spoofing MAC changes permitted by default 23

Finding Database Risks Costly or incomplete by pen test Easy to inspect for DBA roles Table design e.g. Application password storage DB level auditing settings DB password policies, e.g. DBA password expiry Limited privileges, e.g. select any tables Check DB parameters many compensating controls 24

Finding DOS Risks Costly to pen test for many DOS risks Easy to inspect for particularly virtualisation 25

APT Controls DSD s 35 Mitigations Can pen test much of DSD But it is slow More efficient to test via interviews, then check SPF records published but filtering of incoming mail? List of blocked file types Web content filtering Randomised local administrator passphrases 26

Some Poor Pen Tests No tests of authentication lockout No comment on authentication policies No email address validations No password complexity checks No minimum password length No TLS certificate No cookie checks expiry or secure Not scanning High UDP ports 27

Poor Pen Test Reports VPN risks not reported ESP aggressive mode Poor keys 6 character passwords Firewall unpatched for ACL bypass vulnerability Reporting & communication high vulnerability!= High risk Technical security audience v s CFO or CIO 28

Take Home Thoughts Let s be clear to our organisations or clients about Scope Assurance provided Tests conducted What was not tested (scope, time) Other recommended testing or analysis Other possible sources of security risks Risk levels v s vulnerability levels Business v s technical risks