Effective Penetration Testing Netwerk Guardian LLC



Similar documents
CEH Version8 Course Outline

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CRYPTUS DIPLOMA IN IT SECURITY

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Application Security Testing

CYBERTRON NETWORK SOLUTIONS

Learn Ethical Hacking, Become a Pentester

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Course Content: Session 1. Ethics & Hacking

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Effective Penetration Testing. Kevin Pescatello

EC Council Certified Ethical Hacker V8

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Global Web Application Firewall Market

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Ethical Hacking Course Layout

Detailed Description about course module wise:

Penetration Testing. Presented by

Network Security: Introduction

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Certified Ethical Hacker (CEH)

[CEH]: Ethical Hacking and Countermeasures

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Information Technology Career Cluster Advanced Cybersecurity Course Number:

Project 2: Firewall Design (Phase I)

NETWORK PENETRATION TESTING

SANS Security 528 CASP Practice Exam

Metasploit The Elixir of Network Security

A Network Administrator s Guide to Web App Security

Justin Kallhoff CISSP, C EH, GPCI, GCIH, GSEC, GISP, GCWN, GCFA. Tristan Lawson CISSP, C EH, E CSA, GISP, GSEC, MCSA, A+, Net+, Server+, Security+

Jort Kollerie SonicWALL

Cisco Security Optimization Service

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Cybersecurity: What CFO s Need to Know

NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER

Five Steps to Improve Internal Network Security. Chattanooga ISSA

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Threats and Vulnerabilities. Ed Crowley

Firewall Testing Methodology W H I T E P A P E R

5 Steps to Advanced Threat Protection

A Decision Maker s Guide to Securing an IT Infrastructure

Penetration Testing Report Client: Business Solutions June 15 th 2015

Reference Architecture: Enterprise Security For The Cloud

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

SONDRA SCHNEIDER JOHN NUNES

CISCO IOS NETWORK SECURITY (IINS)

Vulnerability Scanning & Management

Building Energy Security Framework

8. Firewall Design & Implementation

Malicious Network Traffic Analysis

ICTN Enterprise Database Security Issues and Solutions

Vulnerability Assessment and Penetration Testing

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

FSP-201: Ethical Hacking & IT Security

Defending Against Data Beaches: Internal Controls for Cybersecurity

Response to Questions CML Managed Information Security

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

An Introduction to Network Vulnerability Testing

Penetration Testing with Kali Linux

We ve been hacked! We did it! Rick Grandy Lockheed Martin Hanford Site

Description: Objective: Attending students will learn:

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Firewall Design Principles Firewall Characteristics Types of Firewalls

Why You Need to Test All Your Cloud, Mobile and Web Applications

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

information security and its Describe what drives the need for information security.

RMAR Technologies Pvt. Ltd.

!!!!!!!!!!!!!!!!!!!!!!

Virtual Learning Tools in Cyber Security Education

How To Protect Your Network From Attack From A Hacker On A University Server

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

Network Security Policy

Penetration Test Report

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Best Practices For Department Server and Enterprise System Checklist

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Firewalls. Pehr Söderman KTH-CSC

WHITE PAPER. An Introduction to Network- Vulnerability Testing

MANAGED SECURITY SERVICES

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

Chapter 1 The Principles of Auditing 1

VPN Lesson 2: VPN Implementation. Summary

Transcription:

Effective Penetration Testing Netwerk Guardian LLC Presented by Kevin Pescatello Why it s so important to plan and communicate.

Penetration Testing Survey results from professionals in the field state Most tests have 20% failure rate self/peer ave. Poor communication and planning Failure to follow process Little or no documentation Resistance Legal review of contract and Corporate/IT governance Vulnerability Assessing it s not testing

Why Penetration Testing 2011 Symantec statistics show corporate breach cost 5.5 million Trojans, worms, end user initiated. Imperva -19% DDoS and SQL Injection Verizon 98% attacks from external agents 98% occurred on servers 58% derived from hacktivist

Client X Data Breach

Find a Pen That Fits No one Pen Testing group fits all Unique Strengths and Weaknesses Requesting client needs to know Assets + Processes = Requirements What do you really need tested? Industry Security Standard within reach? ISO 27001/2 FISMA compliance NIST SP800-53v3

Client X Processes

Enabling Events White box with diagrams Manual testing finds more ingress points Good communication plan with limitations Know the effects of tools Documented processes and assets

Inhibiting Events Clients view tests as witch hunts resistance Terminology confusion Running unfamiliar tools No documentation

Test Objectives Server Availability Core Business Application Availability Confidentiality Workstation Confidentiality

Penetration Tests

Penetration Test Schedule The following is an estimate for the test plan. It will take one work day or eight (8) hours to complete the following work Time 08:00-08:30 Target Devices and Services Have all identified targets of evaluation documented Obtain and review prioritized list of services 08:30-09:30 Test Operating Systems Use Microsoft Baseline Security Analyzer Use nmapto discover devices banner grabbing Use Nessus to discover vulnerabilities 09:30-10:30 Test Network Devices Use nmap to discover devices and ports Discover services DoS/DDoS Attack 10:30-12:00 Test Core Business Application Armitage and meterpreter used for testing but not successful. 13:00-14:30 Man in the middle: Appendix F: Sample Contract(Con t) Spoofing & Clear text traffic capturing 14:30-17:00 Contingency Testing, Report with Countermeasures Contingency testing in case one or more test open or deny success Provide results in a brief outlining the test and results Provide Countermeasures

Reverse TCP Shell -Keylogging

Reverse TCP Shell Admin in

Reverse TCP Shell Admin in

Penetration Test Results Application Server Resilient against mild LAN DDoS Integrity - Data is encrypted IIS Service Resilient Workstation Windows 7 Integrity App data is encrypted Susceptible to MITM Susceptible key logging

Countermeasures Summation of Countermeasures 1. NAC Appliance Trustwave 2. Host Based Firewall (Zone Alarms Used) 3. Host based VPN out for secure HTTP 4. Private SSH server

Next Steps Security Planning & Management Have documentation started for ISO C&A Known assets and associated risks Keep going for that standard! Security Management Continuous improvement by managing risk Identifying key risks against critical processes Know your strengths and weakness and when to outsource

Real Life Application Know that not everything is handed to you Security is a constant struggle KSAs require diligence in practice Penetration testing challenges everyone.

References Symantec. (2012). 2011 Annual Study -U.S. Cost of a Data BreachRetrievedfrom http://www.slideshare.net/symantec/2011-annual-study-us-cost-of-a-data-breach-march-2012 Imperva. (2012). Hacker Intelligence Initiative, Monthly Trend Report#13. Retrieved from http://www.imperva.com/docs/hii_monitoring_hacker_forums_2012.pdf Verizon. (2012). 2012 Data breach Investigations Report. Retrieved from http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf

Netwerk Guardian LLC Security Effective Penetration Testing Questions?