CISO's Guide to. Penetration Testing. James. S. Tiller. A Framework to Plan, Manage, and Maximize Benefits. CRC Press. Taylor & Francis Group

Similar documents
locuz.com Professional Services Security Audit Services

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Ctfo MANAGEMENT SECURITY PATCH. Felicia M. Nicastro. Second Edition. CRC Press. VC#*' J Taylor & Francis Group / Boca Raton London New York

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Penetration Testing. Presented by

Network Security Audit. Vulnerability Assessment (VA)

Learn Ethical Hacking, Become a Pentester

Web App Security Audit Services

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

CMPT 471 Networking II

For more information or call

Penetration Testing. Security Testing

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

Certified Ethical Hacker (CEH)

Firewalls. Chapter 3

VULNERABILITY MANAGEMENT AND RESEARCH PENETRATION TESTING OVERVIEW

Simple Steps to Securing Your SSL VPN

The Protection Mission a constant endeavor

The Value of Vulnerability Management*

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Information Security. Training

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Cisco Security Optimization Service

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Bypassing PISA AGM Theme Seminar Presented by Ricky Lou Zecure Lab Limited

Professional Penetration Testing Techniques and Vulnerability Assessment ...

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Security Management. Keeping the IT Security Administrator Busy

IxLoad-Attack: Network Security Testing

Application Security in the Software Development Lifecycle

Web Security School Final Exam

LINUX / INFORMATION SECURITY

Governance Simplified

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Network Security: A Practical Approach. Jan L. Harrington

Rapid Vulnerability Assessment Report

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

Security Testing in Critical Systems

Coimbatore-47, India. Keywords: intrusion detection,honeypots,networksecurity,monitoring

CompTIA Security+ (Exam SY0-410)

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

SECOND EDITION THE SECURITY RISK ASSESSMENT HANDBOOK. A Complete Guide for Performing Security Risk Assessments DOUGLAS J. LANDOLL

CIS 4204 Ethical Hacking Fall, 2014

Cyber Essentials. Test Specification

Course Descriptions November 2014

Computer Security Literacy

The Ethical Hack A Framework for Business Value Penetration Testing

Cybersecurity The role of Internal Audit

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Computer Security and Penetration Testing. Chapter 2 Reconnaissance

Assessing Network Security

Computer Security SEGC-00 - Overview

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001


Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Information Security Services

April 11, (Revision 2)

Attacks and Defense. Phase 1: Reconnaissance

Looking for Trouble: ICMP and IP Statistics to Watch

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Network Instruments white paper

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Certified Ethical Hacker Exam Version Comparison. Version Comparison

How To Test For Security On A Network Without Being Hacked

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Stateful Inspection Technology

Networking: EC Council Network Security Administrator NSA

FFIEC Cybersecurity Assessment Tool

Keywords Vulnerability Scanner, Vulnerability assessment, computer security, host security, network security, detecting security flaws, port scanning.

McAfee Certified Assessment Specialist Network

SAST, DAST and Vulnerability Assessments, = 4

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

Management. ITIL Release. Dave Howard. A Hands-on Guide. CRC Press. Taylor & Francis Group. Taylor St Francis Croup, an Informa business

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

Network Security and Firewall 1

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Firewalls, IDS and IPS

1. LAB SNIFFING LAB ID: 10

SONDRA SCHNEIDER JOHN NUNES

Managing IT Security with Penetration Testing

Network Security Fundamentals

Transcription:

CISO's Guide to Penetration Testing A Framework to Plan, Manage, and Maximize Benefits James S. Tiller CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an Informs business AN AUERBACH BOOK

Contents Foreword xi Chapter 1: Getting Started 1 Audience How to Use This Book Chapter 2: Setting the Stage 9 Perspectives of Value Where Does Penetration Testing Fit? What Constitutes a Success? A Quick Look Back Hacking Impacts Resources Information Time Brand and Reputation The Hacker Types of Hackers Script Kiddies Independent Hackers Organized Hackers Sociology Motives Chapter 3: The Framework 39 Planning the Test Sound Operations Reconnaissance Enumeration Vulnerability Analysis Exploitation Final Analysis Deliverable Integration Chapter 4: The Business Perspective 51 Business Objectives Previous Test Results Building a Roadmap Business Challenges Security Drivers v

vi Contents Increasing Network Complexity Ensuring Corporate Value Lower Management Investment Business Consolidation Mobile Workforce Government Regulations and Standards Why Have the Test? Proof ofissue Limited Staffing and Capability Third-Party Perspective It Is All about Perspective Overall Expectations How Deep Is Deep Enough? One-Hole Wonder Today's Hole Chapter 5: Planning for a Controlled Attack.. 77 Inherent Limitations Time Money Determination Legal Restrictions Ethics Imposed Limitations Timing Is Everything Attack Type Source Point Required Knowledge Timing ofinformation Inter-net Web Authenticated Application Service Direct Access Multiphased Attacks Parallel Shared Parallel Isolated Series Shared Series Isolated Value ofmultiphase Testing Employing Multiphased Tests Teaming and Attack Structure Red Team Vulnerability Explanation Testing Focus Mitigation White Team

Contents Piggyback Attacks Reverse Impact Detection Blue Team Incident Response Vulnerability Impact Counterattack Team Communications Engagement Planner The Right Security Consultant Technologists Architects Ethics The Tester Logistics Agreements Downtime Issues System and Data Integrity Get Out of Jail Free Card Intermediates Partners Customers Service Providers Law Enforcement Chapter 6: Preparing Technical Preparation Attacking System Operating System Tools for a Hack Data Management and Protection Attacking Network Attacking Network Architecture Managing the Engagement Project Initiation Identify Sponsors Building the Teams Schedule and Milestones Tracking Escalation Customer Approval During the Project Status Reports Scope Management Deliverable Review Concluding the Engagement

Vlll Chapter 7: Reconnaissance Social Engineering E-Mail Value Controlling Depth Help Desk Fraud Value Controlling Depth Prowling and Surfing Internal Relations and Collaboration Corporate IdentityAssumption Physical Security Observation Dumpster Diving Theft Internet Reconnaissance General Information Web Sites Social Networking Chapter 8: Enumeration Enumeration Techniques Connection Scanning SYN Scanning FIN Scanning Fragment Scanning TCP Reverse WENT Scanning FTP Bounce Scanning UDP Scanning ACK Scanning Soft Objective LookingAround or Attack? Elements ofenumeration Account Data Architecture Operating Systems Wireless Networks Applications Custom Applications Preparing for the Next Phase Chapter 9: Vulnerability Analysis Weighing the Vulnerability Source Points Obtained Data The Internet Vendors

Contents Alerts Service Packs Reporting Dilemma Chapter 10: Exploitation Intuitive Testing Evasion Threads and Groups Threads Groups Operating System,s Windows UNIX Password Crackers Rootkits Applications Web Applications Distributed Applications Customer Applications Wardialing Network Perimeter Network Nodes Services and Areas of Concern Services Services Started by Default Windows Ports Null Connection Remote Procedure Call (RPC) Simple Network Management Protocol (SNMP) Berkeley Internet Name Domain (BIND) Common Gateway Interface (CGI) Cleartext Services Network File System (NFS) Domain Name Service (DNS) File and Directory Permissions FTP and Telnet Internet Control Message Protocol (ICMP) IMAP and POP Network Architecture Chapter 11: The Deliverable Final Analysis Potential Analysis The Document Executive Summary Present Findings

X Contents Planning and Operations Vulnerability Ranking Process Mapping Recommendations Exceptions and Limitations Final Analysis Conclusion Overall Structure Aligning Findings Technical Measurement Severity Exposure Business Measurement Cost Risk Presentation Remedial Tactical Strategic Chapter 12: Integrating the Results 317 Integration Summary Mitigation Test Pilot Implement Validate Defense Planning Architecture Review Architecture Review Structure Awareness Training Awareness Program Incident Management Building a Team People Mission Constituency Organizational Structure Defining Services and Quality CERT Forms Security Policy Data Classification Organizational Security Conclusion Index 361