Tải bản đầy đủ (.pdf) (41 trang)

Module X Penetration Testing doc

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (5.8 MB, 41 trang )

Penetration Testing
Module X
Penetration Testing
Penetration testing assesses the security model of
the organization as a whole
It reveals potential consequences of a real attacker
breaking into the network
A penetration tester is differentiated from an
attacker only by his intent and lack of malice
Penetration testing that is not completed
professionally can result in the loss of services and
disruption of the business continuity
disruption of the business continuity
Types of Penetration Testing
External testing
• External testing involves analysis of publicly
available information
,
a network enumeration
p
hase
,
External testing
,p,
and the behavior of security devices analyzed
Internal testing
• Internal testing will be performed from a number of
network access points, representing each logical and
hil t
Internal testing
p


h
ys
i
ca
l
segmen
t
• Black-hat testing/zero-knowledge testing
• Gray-hat testing/partial-knowledge testing

White
-
hat testing/complete
-
knowledge testing
White
hat testing/complete
knowledge testing
Risk Management
An unannounced test is usually associated with higher
ik d t t til f ti
r
i
s
k
an
d
a grea
t
er po

t
en
ti
a
l
o
f
encoun
t
er
i
ng
unexpected problems
Risk = Threat x Vulnerability
A planned risk is any event that has the potential to
adversely affect the penetration test
The pentest team is advised to plan for significant
risks to enable contingency plans in order to
ff i l ili i d
e
ff
ect
i
ve
l
y ut
ili
ze t
i
me an

d
resources
Do-it-Yourself Testing
Th d t hi h th t ti b t t d i f th j
Th
e
d
egree
t
o w
hi
c
h th
e
t
es
ti
ng can
b
e au
t
oma
t
e
d i
s one o
f th
e ma
j
or

variables that affect the skill level and time needed to run a pentest
The degree of test automation, the extra cost of acquiring a tool, and
the time needed to gain proficiency are factors that influence the test
period
period
Outsourcing Penetration Testing
Services
Services
Drivers for outsourcing pentest services
• To get the network audited by an external agency to
acquire an intruder’s point of view
Drivers for outsourcing pentest services
• The organization may require a specific security
assessment and suggestive corrective measures
• Professional liability insurance pays for settlements
jd f hih b libl
Underwriting penetration testing
or
j
u
d
gments
f
or w
hi
c
h
pen testers
b
ecome

li
a
bl
e as
a result of their actions, or failure to perform
professional services

It is also known as E&O insurance or professional
It is also known as E&O insurance or professional
indemnity insurance
Terms of Engagement
ii ill i i
An organ
i
zat
i
on w
ill
sanct
i
on a penetrat
i
on test
against any of its production systems after it
agrees upon explicitly stated rules of engagement
It must state the terms of reference under which
th i t t ith th i ti
th
e agency can
i

n
t
erac
t
w
ith th
e organ
i
za
ti
on
It if th d i d d f d t th
It
can spec
if
y
th
e
d
es
i
re
d
co
d
e o
f
con
d
uc

t
,
th
e
procedures to be followed, and the nature of the
interaction between the testers and the
or
g
anization
g
Project Scope
Determining the scope of the pentest is essential
Determining the scope of the pentest is essential
to decide if the test is a targeted test or a
comprehensive test
Comprehensive assessments are coordinated
efforts by the pentest agency to uncover as much
vulnerability as possible throughout the
vulnerability as possible throughout the
organization
A targeted test will seek to identify vulnerabilities
in specific systems and practices
Pentest Service Level
Agreements
Agreements
A service level agreement is a contract that details the terms of service that an
outsourcer will provide
Professionally done SLAs can include both remedies and penalties
Professionally done SLAs can include both remedies and penalties
The bottom line is that SLAs define the minimum levels of availability from

the testers and determine what actions will be taken in the event of serious
the testers and determine what actions will be taken in the event of serious
disruption
Testing Points
Organizations have to reach a consensus on the
ff h bd ld h
extent o
f
in
f
ormation t
h
at can
b
e
d
ivu
l
ge
d
to t
h
e
testing team to determine the starting point of the
test
Providing a penetration testing team with
additional information may give them an
additional information may give them an
unrealistic advantage
Similarly, the extent to which the vulnerabilities

need to be exploited without disrupting critical
services needs to
b
e determined
b
Testing Locations
The pentest team may have a choice of doing the
test either remotely or on-site
A remote assessment may simulate an external
hacker attack. However, it may miss assessing
internal guards
An on-site assessment may be expensive and may
not simulate an external threat exactly
Automated Testing
Automated testing can result in time and cost savings over a long term;
hi l idifil
h
owever,
i
t cannot rep
l
ace an exper
i
ence
d
secur
i
ty pro
f
ess

i
ona
l
Tools can have a high learning curve and may need frequent updating to be
effective
effective
With automated testing, there exists no scope for any of the architectural
elements to be tested
As with vulnerability scanners, there can be false negatives or worse, false
positives
Manual Testing
Manual testing is the best option an organization can choose to benefit from the
i f i fil
exper
i
ence o
f
a secur
i
ty pro
f
ess
i
ona
l
The objective of the professional is to assess the security posture of the
iif hk’ i
organ
i
zat

i
on
f
rom a
h
ac
k
er

s perspect
i
ve
A manual approach requires planning, test designing, scheduling, and diligent
documentation to capture the results of the testing process in its entiret
y
Using DNS Domain Name and
IP Address Information
IP Address Information
Data from the DNS servers related to the target network
can be used to map a target organization’s network
The DNS record also provides some valuable
information regarding the OS or applications that are
bi th
b
e
i
ng run on
th
e server
The IP block of an organization can be discerned by

The IP block of an organization can be discerned by
looking up the domain name and contact information
for personnel
Enumerating Information about Hosts on
Publicl
y
-Available Networks
y
Enumeration can be done using port scanning
tools, IP protocols, and listening to TCP/UDP ports
The testing team can then visualize a detailed
network diagram that can be publicly accessed
Additionally, the effort can provide screened
subnets and a comprehensive list of the types of
traffic that are allowed in and out of the network
Website crawlers can mirror entire sites
Testing Network-Filtering
Devices
Devices
The objective of the pentest team would be to
ascertain that all legitimate traffic flows through the
ascertain that all legitimate traffic flows through the
filtering device
Proxy servers may be subjected to stress tests to
determine their ability to filter out unwanted packets
Testing for default installations of the firewall can be
done to ensure that default user IDs and passwords
have been disabled or changed
have been disabled or changed
Testers can also check for any remote login capability

hihhb bld
t
h
at m
i
g
h
t
h
ave
b
een ena
bl
e
d
Enumerating Devices
A device inventory is a collection of network devices
together with some relevant information about each device
that is recorded in a document
After the network has been mapped and the business assets
identified the next logical step is to make an inventory of
identified
,
the next logical step is to make an inventory of
the devices
A physical check may be conducted additionally to ensure
that the enumerated devices have been located correctly
Denial of Service Emulation
Em
u

l
at
in
g
D
oS attac
k
s ca
n
be
r
esou
r
ce
u at g oS attac s ca be esou ce
intensive
DoS attacks can be emulated using
hardware
Some online sites simulate DoS attacks
for a nominal charge
These tests are meant to check the
effectiveness of anti-DoS devices
Penetration Testing Tools
Penetration Testing Tools
Pentest Using Appscan
AppScan is a tool developed for automated web application security
testing and weakness assessment software
testing and weakness assessment software
HackerShield
HackerShield

is an anti
hacking program that identifies and fixes the
HackerShield
is an anti
-
hacking program that identifies and fixes the
vulnerabilities that hackers use to get into servers, workstations, and
other IP devices
Anti-
Hacking
Hacking
Pentest Using Cerberus Internet
Scanner
Scanner
Cerber s Information Sec rit sed to maintain the Cerber s
Cerber
u
s Information Sec
u
rit
y u
sed to maintain the Cerber
u
s
Internet Scanner (CIS) is now available at @stake
It is programmed to assist administrators in finding and fixing
vulnerabilities in their systems
Cerberus: Screenshot
Pentest Using Cybercop Scanner
Cybercop Scanner enables the user to identify

vulnerabilities by conducting more than 830
vulnerability checks
It is more effective as it runs a scan on over 100 hosts
at the same time and also does applicable tests on
at the same time and also does applicable tests on
network devices
It is also useful to administrators for fixing problems
and security holes
Cybercop: Screenshot

Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×