1. Trang chủ
  2. » Công Nghệ Thông Tin

Module X Penetration Testing doc

41 260 1
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 41
Dung lượng 5,8 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Types of Penetration TestingExternal testing • External testing involves analysis of publicly available information, a network enumeration phase, External testing and the behavior of s

Trang 1

Penetration Testing

Module X

Trang 2

A penetration tester is differentiated from an

attacker only by his intent and lack of malice

Penetration testing that is not completed

professionally can result in the loss of services and disruption of the business continuity

Trang 3

Types of Penetration Testing

External testing

• External testing involves analysis of publicly

available information, a network enumeration phase,

External testing

and the behavior of security devices analyzed

Internal testing

• Internal testing will be performed from a number of

network access points, representing each logical and

h i l t

Internal testing

physical segment

• Black-hat testing/zero-knowledge testing

• Gray-hat testing/partial-knowledge testing

• White-hat testing/complete-knowledge testing White hat testing/complete knowledge testing

Trang 4

Risk = Threat x Vulnerability

A planned risk is any event that has the potential to adversely affect the penetration test

The pentest team is advised to plan for significant

risks to enable contingency plans in order to

ff i l ili i d

effectively utilize time and resources

Trang 6

Outsourcing Penetration Testing Services

Drivers for outsourcing pentest services

• To get the network audited by an external agency to

acquire an intruder’s point of view

Drivers for outsourcing pentest services

• The organization may require a specific security

assessment and suggestive corrective measures

• Professional liability insurance pays for settlements

Underwriting penetration testing

or judgments for which pen testers become liable as

a result of their actions, or failure to perform

professional services

• It is also known as E&O insurance or professional It is also known as E&O insurance or professional

indemnity insurance

Trang 7

Terms of Engagement

An organization will sanction a penetration test against any of its production systems after it

agrees upon explicitly stated rules of engagement

It must state the terms of reference under which

th i t t ith th i ti

the agency can interact with the organization

It if th d i d d f d t th

It can specify the desired code of conduct, the

procedures to be followed, and the nature of the interaction between the testers and the

organizationg

Trang 8

Project Scope

Determining the scope of the pentest is essential

to decide if the test is a targeted test or a

comprehensive test

Comprehensive assessments are coordinated

efforts by the pentest agency to uncover as much vulnerability as possible throughout the

organization

A targeted test will seek to identify vulnerabilities

in specific systems and practices

Trang 9

Pentest Service Level Agreements

A service level agreement is a contract that details the terms of service that an outsourcer will provide

Professionally done SLAs can include both remedies and penalties

The bottom line is that SLAs define the minimum levels of availability from the testers and determine what actions will be taken in the event of serious disruption

Trang 10

Providing a penetration testing team with

additional information may give them an

unrealistic advantage

Similarly, the extent to which the vulnerabilities need to be exploited without disrupting critical services needs to be determinedb

Trang 11

An on-site assessment may be expensive and may not simulate an external threat exactly

Trang 12

Automated Testing

Automated testing can result in time and cost savings over a long term;

however, it cannot replace an experienced security professional

Tools can have a high learning curve and may need frequent updating to be effective

With automated testing, there exists no scope for any of the architectural elements to be tested

As with vulnerability scanners, there can be false negatives or worse, false positives

Trang 13

Manual Testing

Manual testing is the best option an organization can choose to benefit from the

experience of a security professional

The objective of the professional is to assess the security posture of the

organization from a hacker’s perspective

A manual approach requires planning, test designing, scheduling, and diligent documentation to capture the results of the testing process in its entirety

Trang 14

Using DNS Domain Name and

IP Address Information

Data from the DNS servers related to the target network

can be used to map a target organization’s network

The DNS record also provides some valuable

information regarding the OS or applications that are

b i th

being run on the server

The IP block of an organization can be discerned by

looking up the domain name and contact information

for personnel

Trang 15

Enumerating Information about Hosts on Publicly-Available Networks y

Enumeration can be done using port scanning

tools, IP protocols, and listening to TCP/UDP ports

The testing team can then visualize a detailed

network diagram that can be publicly accessed

Additionally, the effort can provide screened

subnets and a comprehensive list of the types of

traffic that are allowed in and out of the network

Website crawlers can mirror entire sites

Trang 16

Testing Network-Filtering Devices

The objective of the pentest team would be to

ascertain that all legitimate traffic flows through the

filtering device

Proxy servers may be subjected to stress tests to

determine their ability to filter out unwanted packets

Testing for default installations of the firewall can be

done to ensure that default user IDs and passwords

have been disabled or changed

Testers can also check for any remote login capability

that might have been enabled

Trang 17

Enumerating Devices

A device inventory is a collection of network devices

together with some relevant information about each device that is recorded in a document

After the network has been mapped and the business assets identified the next logical step is to make an inventory of the devices

A physical check may be conducted additionally to ensure that the enumerated devices have been located correctly

Trang 18

Denial of Service Emulation

Emulating DoS attacks can be resource u at g oS attac s ca be esou ce

intensive

DoS attacks can be emulated using

hardware

Some online sites simulate DoS attacks

for a nominal charge

These tests are meant to check the

effectiveness of anti-DoS devices

Trang 19

Penetration Testing Tools

Trang 20

Pentest Using Appscan

AppScan is a tool developed for automated web application security testing and weakness assessment software

Trang 21

HackerShield is an anti hacking program that identifies and fixes the vulnerabilities that hackers use to get into servers, workstations, and other IP devices

Hacking

Trang 22

Anti-Pentest Using Cerberus Internet Scanner

Cerber s Information Sec rit sed to maintain the Cerber s Internet Scanner (CIS) is now available at @stake

It is programmed to assist administrators in finding and fixing vulnerabilities in their systems

Trang 23

Cerberus: Screenshot

Trang 24

Pentest Using Cybercop Scanner

Cybercop Scanner enables the user to identify

vulnerabilities by conducting more than 830

vulnerability checks

It is more effective as it runs a scan on over 100 hosts

at the same time and also does applicable tests on

network devices

It is also useful to administrators for fixing problems

and security holes

Trang 25

Cybercop: Screenshot

Trang 26

Pentest Using FoundScan Hardware Appliances

FoundScan tries to identify and locate the operating systems running

on each live host by analyzing returned data with an algorithm

Trang 27

Pentest Using Nessus

Nessus is a suitable utility for service detection as it has an enhanced service detecting feature

Trang 28

Pentest Using NetRecon

NetRecon is useful in defining common intrusion and attack scenarios to locate and report network holes

Trang 29

Pentest Using SAINT

SAINT monitors every live system on a network for TCP and UDP devices

Trang 30

Pentest Using SecureNET Pro

SecureNET Pro is a fusion of many technologies, namely session

monitoring, firewall, hijacking, and keyword-based intrusion detection

Trang 31

Pentest Using SecureScan

SecureScan is a network vulnerability assessment tool that

determines whether internal networks and firewalls are vulnerable to attacks, and recommends corrective action for identified

vulnerabilities

Trang 32

Pentest Using SATAN, SARA, and Security Analyzer

Security Auditor's Research Assistant (SARA) is a

third generation Unix-based security analysis tool

SATAN is considered one of the pioneering tools that

led to the development of vulnerability assessment

tools

Security Analyzer helps in preventing attacks,

protecting the critical systems, and safeguarding

information

Trang 33

Pentest Using STAT Analyzer

STAT Analyzer is a vulnerability assessment utility that integrates stateSTAT Analyzer is a vulnerability assessment utility that integrates state-of-the-art commercial network modeling and scanning tools

Trang 34

Pentest Using VigilENT

VigilENT helps to protect systems by

assessing policy compliance, identifying

security vulnerabilities, and helping

correct exposures before they result in

failed audits, security breaches, or costly

downtime

Trang 35

Pentest Using WebInspect

Trang 36

Pentest Using CredDigger

www foundstone com

CredDigger™ is a tool that attempts to gather data to

assist penetration testing on a corporate network by:p g p y

• Determining every host on which a given set of user

Trang 37

CredDigger: Screenshot 1

Trang 38

CredDigger: Screenshot 2

Trang 39

Pentest Using Nsauditor

www nsauditor com

Nsauditor is a network security scanner that allows to audit and

monitor remote network computers for possible vulnerabilities,

checks your network for all potential methods that a hacker might use to attack

The program includes more than 45 network tools for scanning,

sniffing, enumerating, and gaining access to machines and contains g, g, g g

a built-in database of known network security vulnerabilities, which allows you to select the items for scanning and adds custom entries

It can reveal and catalog a variety of information, including

installed software, shares, users, drives, hotfixes, NetBios, RPC,

SQL and SNMP information, and open ports

Trang 40

Nsauditor: Screenshot

Trang 41

Evaluating Different Types of Pentest Tools

The different factors affecting the type of tool

Ngày đăng: 12/07/2014, 14:20

TỪ KHÓA LIÊN QUAN