Penetration testing. A step beyond missing patches and weak passwords



Similar documents
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Cybersecurity Health Check At A Glance

A Decision Maker s Guide to Securing an IT Infrastructure

Computer and Network Security Policy

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Did you know your security solution can help with PCI compliance too?

Medical Device Security Health Group Digital Output

Goals. Understanding security testing

How To Protect Your Data From Being Stolen

VoipSwitch Security Audit

Locking down a Hitachi ID Suite server

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Digital Pathways. Penetration Testing

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

1. Why is the customer having the penetration test performed against their environment?

GFI White Paper PCI-DSS compliance and GFI Software products

Instructions for connecting to the LSC-O Secure Wireless Network

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

Presented By: Bryan Miller CCIE, CISSP

Critical Controls for Cyber Security.

Directory and File Transfer Services. Chapter 7

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Microsoft Baseline Security Analyzer (MBSA)

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Preliminary Course Syllabus

Using a VPN with Niagara Systems. v0.3 6, July 2013

Information Security Services

Web Plus Security Features and Recommendations

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0

Top 20 Critical Security Controls

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Designing Security for Microsoft SQL Server 2005

System Security Plan University of Texas Health Science Center School of Public Health

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

California State Polytechnic University, Pomona. Desktop Security Standard and Guidelines

Feeling Vulnerable? Jamie S. Herman, C CISO, CISM, CISSP Balazs Bucsay, OSCE, OSCP, GIAC, GPEN

Eduroam wireless network Windows Vista

AeroLab Wireless Network Code of Conduct. Connecting to the AeroLab Wireless Network

System Security Policy Management: Advanced Audit Tasks

The Self-Hack Audit Stephen James Payoff

1 Introduction 2. 2 Document Disclaimer 2

Cyber Essentials. Test Specification

Lync SHIELD Product Suite

Client Security Risk Assessment Questionnaire

Presented by: Mike Morris and Jim Rumph

SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Passing PCI Compliance How to Address the Application Security Mandates

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation

Data Stored on a Windows Server Connected to a Network

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Medical Image Manager (MIM) Version 6.1.

Penetration Testing - a way for improving our cyber security

Using a VPN with CentraLine AX Systems

Data Security and Healthcare

Host/Platform Security. Module 11

Information Security

Configuring Sponsor Authentication

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

SPICE EduGuide EG0015 Security of Administrative Accounts

Topics in Network Security

SECURE FTP CONFIGURATION SETUP GUIDE

Penetration Testing. Presented by

SQL Server Hardening

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Web Security School Entrance Exam

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

THE OPEN UNIVERSITY OF TANZANIA

Network Services One Washington Square, San Jose, CA

Using Nessus In Web Application Vulnerability Assessments

Exploiting Transparent User Identification Systems

CEH Version8 Course Outline

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

IDS and Penetration Testing Lab ISA 674

Penetration Testing Report Client: Business Solutions June 15 th 2015

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Network/Cyber Security

Windows Remote Access

Automate PCI Compliance Monitoring, Investigation & Reporting

Achieving PCI Compliance Using F5 Products

PRINTER SECURITY AUDIT: THE UNIVERSITY OF VIRGINIA. Kevin Savoy, CPA, CISA, CISSP Brian Daniels, CISA, GCFA

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices

PENTEST. Pentest Services. VoIP & Web.

Building A Secure Microsoft Exchange Continuity Appliance

How We're Getting Creamed

SANS Institute First Five Quick Wins

SEC Secure. Usable. Cheap. Data. Applications. Host Internal Network Perimeter Physical Security. People, Policies, & Process.

NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER

Introduction to Cyber Security / Information Security

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Security Testing in Critical Systems

information security and its Describe what drives the need for information security.

Transcription:

Penetration testing A step beyond missing patches and weak passwords June 25 th, 2012 Eirik Thormodsrud Graduated from the ISG in 2006 Employed by Ernst & Young Norway ever since (5 ½ years) Manager at IT Risk and Assurance Mainly performs: attack and penetration testing security audits risk analysis Also a guest lecturer at Gjøvik University College BSc/MSc course Ethical hacking and penetration testing Side 1

What I like to do On your quest for. Always on the lookout for oddities Sometimes you end up banging your head against a wall Before you strike gold and find the really juicy oddities! Penetration testing Passive reconnaissance Continuous analysis Phase 1: Passive reconnaissance Finding Phase 2: Active reconnaissance Finding Phase 3: Vulnerability assessment Finding Phase 4: Penetration test Finding Sniffing network traffic Searching open sources Active reconnaissance Port / vulnerability scanning Vulnerability assessment Analysis of information from phase 2 Penetration test Attempts to exploit identified vulnerabilities, i.e. rule out false positives Wrap-up and reporting Side 2

One example Scenario Attacker with access to the internal network Access to computer/software for hacking Three days at disposal, test parts of infrastructure without credentials. Test of client PC image with and without credentials Infrastructure: Latest version Microsoft products Strict patch routines Strict password policy Internally segmented network with strict firewall policies 802.1x on all network end-points Organization develops their own business applications in-house Results Infrastructure Network X Client laptop Client laptop Users can freely obtain local admin rights through internal routines Side 3

Clien t File location info, Application server Encrypted auth protocol FTP username/password, FTP transfer, FTP server Authentication server Results Infrastructure Network Client Encrypted auth protocol FTP username/password, Authentication server XClient laptop File location info, FTP transfer, Application server FTP server Results Infrastructure Network Domain admin ROOT! Server admin Used by admin users XClient laptop FTP data Used to group FTP accounts FTP account used by application Side 4

Findings In-house developed security and authentication solution Password in clear text during logon process Use of FTP with login per file transfer Use of application account to access data with no differentiation between user levels FTP account has OS admin privileges Nested group memberships give access creep, resulting in Domain Admin privileges Short term fixes Change password of FTP account Revoke group memberships Change to encrypted file transfer mechanism, at least one that protects logon information Protect logon procedure of application Use SSL/TLS or similar to encrypt the whole logon process. Or change application so that logon process is secure Side 5

Long term recommendations Security must be embedded in development process for: Application design Infrastructure Define security requirements Approved protocols Reuse industry standard authentication and encryption standards Security testing/assessments during design, implementation and prior to production setting Long term recommendations Control of access privileges Formal approval of change in access privileges Regular verification of correctness Analysis of effect of changes, in particular for nested groups Control of user accounts Accounts for separate uses, e.g. application accounts should not have OS privileges etc. Side 6

In short PLAN DO ACT CHECK Typical culprit is: Weaknesses in information security management and lack of focus If all else fails! Side 7

Thank you for your attention Questions? Side 8