Hacking Techniques & Intrusion Detection



Similar documents
Hacking Techniques & Intrusion Detection. Ali Al-Shemery arabnix [at] gmail

Hacking Techniques & Intrusion Detection

Hacking Techniques & Intrusion Detection

Introduction to Penetration Testing Graham Weston

Hacking Techniques & Intrusion Detection. Ali Al-Shemery arabnix [at] gmail

Risk Management Handbook

3 day Workshop on Cyber Security & Ethical Hacking

Penetration Testing Services. Demonstrate Real-World Risk

Advanced Threat Protection with Dell SecureWorks Security Services

Course Title Penetration Testing: Procedures & Methodologies

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Physical Security to mitigate Social Engineering Risks

GOOD SECURITY IS A GROUP EFFORT

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Information Technology Security Review April 16, 2012

Penetration Testing //Vulnerability Assessment //Remedy

Hackers are here. Where are you?

developing your potential Cyber Security Training

How to Justify Your Security Assessment Budget

What is Penetration Testing?

Pentests more than just using the proper tools

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Guide to Preventing Social Engineering Fraud

Pentests more than just using the proper tools

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

Achieving and Exceeding Compliance Through Open Source Solutions

VULNERABILITY MANAGEMENT AND RESEARCH PENETRATION TESTING OVERVIEW

Five keys to a more secure data environment

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

Penetration Testing Services Procurement Guide VERSION 1.

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Footprinting and Reconnaissance Tools

Penetration Testing Service. By Comsec Information Security Consulting

Course Title: Penetration Testing: Network & Perimeter Testing

Computer Security and Investigations

Give Vendors Access to the Data They Need NOT Access to Your Network

How To Test For Security On A Network Without Being Hacked

Penetration testing & Ethical Hacking. Security Week 2014

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Loophole+ with Ethical Hacking and Penetration Testing

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Hackers are here. Where are you?

FORBIDDEN - Ethical Hacking Workshop Duration

I D C A N A L Y S T C O N N E C T I O N

Penetration Testing Getting the Most out of Your Assessment. Chris Wilkinson Crowe Horwath LLP September 22, 2010

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

Enterprise Computing Solutions

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Best Practices For Department Server and Enterprise System Checklist

Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

The Top Web Application Attacks: Are you vulnerable?

Cyber Security Management

SecurityMetrics Vision whitepaper

Direct Recruitment Privacy Policy

Application Security in the Software Development Lifecycle

Threat Intelligence: Friend of the Enterprise

SCREENING FACILITIES FOR CYBER SECURITY RISK ANALYSIS. by Paul Baybutt Primatech Inc

Healthcare Security Solutions. Building Technologies

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Enterprise Capabilities Descriptions

CIS 4204 Ethical Hacking Fall, 2014

Intelligence Gathering. n00bpentesting.com

Two Approaches to PCI-DSS Compliance

Cisco Security Optimization Service

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

The Roles of Software Testing & QA in Security Testing

Integrated Physical Security and Incident Management

Physical Security for Drinking Water Facilities

Digital Pathways. Penetration Testing

Security Barriers in the Physical Protection Concept of Nuclear Facilities In Switzerland

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

2011 Forrester Research, Inc. Reproduction Prohibited

June 2014 WMLUG Meeting Kali Linux

G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview

INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY.

Physical Security Assessments. Tom Eston Spylogic.net

Protecting your business interests through intelligent IT security services, consultancy and training

The Penetration Testing Execution Standard (PTES) Dave Kennedy (ReL1K) Twitter: Dave_ReL1K

Transcription:

Hacking Techniques & Intrusion Detection Winter Semester 2012/2013 Dr. Ali Al-Shemery aka: B!n@ry

Physical Pentesting What good is your firewall or IDS/IPS if I can grab your box?

Outline Physical Pentesting Intro. The Process Techniques Dr. Ali Al-Shemery (aka: B!n@ry) 3

Overview A Physical Penetration Test identifies the security weaknesses and strengths of the client's physical security. The goal of the test is to demonstrate the existence or absence of deficiencies in operating procedures concerning physical security. Dr. Ali Al-Shemery (aka: B!n@ry) 4

Continue Did You Know? Physical Security is often overlooked in an organization Physical Security breaches can have the same impact as computer breaches Physical Security Attack & Penetration Tests should be conducted on high value facilities and locations annually Physical Security Attack & Penetration Tests should be conducted by qualified personnel with years of experience Dr. Ali Al-Shemery (aka: B!n@ry) 5

The Process Building an Operating Team Project Planning Rules of Engagement Conducting Preliminary Research Evaluating Risk The Test Plan Legal Issues and Documentation Dr. Ali Al-Shemery (aka: B!n@ry) 6

Building an Operating Team Operator all are operators Team Leader onsite/hq Coordinator or Planner offsite/hq Social Engineer Computer Intrusion Specialist Physical Security Specialist Surveillance Specialist Dr. Ali Al-Shemery (aka: B!n@ry) 7

Project Planning Plan your project, create a workflow to be sure that you cover all aspects of the assignment. A recommended approach (Wil Sopp): Receiving the assignment contracts signed and certain legal formalities observed. Negotiating the Rules of Engagement Define what you can and can t do during testing and their purpose is usually to limit testers to a certain scope. Performing Preliminary Research Pursue the initial IG phase. Determining Risk Very important to accurately gauge the risk a project poses both to the company and to the team members executing it. Writing a Test Plan A formal (but flexible) test plan is a good idea from both project management and legal perspectives. Gathering Equipment Important for the team to take gear that s appropriate to the test without being over encumbered. Providing documentation and legal requirements Once the planning stage is complete you will have a not insignificant amount of documentation. Dr. Ali Al-Shemery (aka: B!n@ry) 8

Rules of Engagement Determine areas of security the client considers to be weak and wants tested. Determine areas of testing the client wishes to avoid for legal reasons, such as close surveillance of staff. Agree on team members that will carry out testing (Clearances might not be given to all). Agree on test duration, or the maximum time permitted. Agree about the information given in advance {white, grey, black} box testing. Agree on the target assets (overall goals): something the team must acquire, identify, gain access to, or photograph. Examples include network operation centers, passwords or target personnel. Agree on test success, failure, and abortion circumstances. Agree on the actions to be taken directly following successful, failed and aborted tests. Determine a schedule for presentation and post testing report. After agreement is reached, document the RoE to be added to the project documentation. Dr. Ali Al-Shemery (aka: B!n@ry) 9

Conducting Preliminary Research Human Intelligence (HUMINT). Signals Intelligence (SIGINT). Open Source Intelligence (OSINT). Imagery Intelligence (IMINT). Dr. Ali Al-Shemery (aka: B!n@ry) 10

Evaluating Risk Team leader s responsibility to determine what constitutes an acceptable level of project risk. If level of risk is too high then the RoE should be reassessed or the test should not be carried out. RISK acronym COLE: Contractual Risks Unable to complete assingment Operational Risks Inexperienced team members, technical communication failure Legal Risks Getting arrested Environmental Risks Presence of machinery or high voltage Climbing and falling Guard dogs Extremes of heat or cold Confronting armed security Dr. Ali Al-Shemery (aka: B!n@ry) 11

The Test Plan Strategic: High-level view of the project that details the goals, assets, team members, potential COLE risks, and necessary equipment. Tactical: List of milestones and the order of completion. Operational: Requirements to complete each milestone and how its completion will affect the whole engagement. Dr. Ali Al-Shemery (aka: B!n@ry) 12

Legal Issues and Documentation Includes but not limited to: RoE Test plan Signed contracts Copies of get out of jail free cards Scan of official ID of operating team members (passport, driving license) Dr. Ali Al-Shemery (aka: B!n@ry) 13

Techniques Practical physical security testing Site exploration Tactical approaches Tailgating to Gain Entry Clothes Maketh the Man Visiting a Nonexistent Employee Badge security Security mechanisms Dr. Ali Al-Shemery (aka: B!n@ry) 14

? Countermeasure Mitigation Remediation Dr. Ali Al-Shemery (aka: B!n@ry) 15

SUMMARY The importance of physical penetration testing, and why it must not be overseen, Howto prepare for a physical pentesting, Techniques used for physical pentesting. Dr. Ali Al-Shemery (aka: B!n@ry) 16

References [-] Lock picking info., http://www.lockwiki.com/index.php/main_page [-] Lock picking tools, http://toool.us/ [-] Learn Lock Picking, http://www.learnlockpicking.com [-] Video on Lock picking, http://video.google.com/videoplay?docid=- 8536478434720082857&ei=8sKpSrG0J5jqqwK4tsytAw&q=lock+picking+physical+security&hl=en [-] Journal of Physical Security (JPS), http://jps.anl.gov/ [-] Hardware Tools for Physical Pentesting, http://www.darkreading.com/vulnerabilitymanagement/167901026/security/vulnerabilities/231600749/tech-insight-three-hardware-tools-forphysical-penetration-testing.html Dr. Ali Al-Shemery (aka: B!n@ry) 17