Types of Penetration TestingExternal testing • External testing involves analysis of publicly available information, a network enumeration phase, External testing and the behavior of s
Trang 1Penetration Testing
Module X
Trang 2A penetration tester is differentiated from an
attacker only by his intent and lack of malice
Penetration testing that is not completed
professionally can result in the loss of services and disruption of the business continuity
Trang 3Types of Penetration Testing
External testing
• External testing involves analysis of publicly
available information, a network enumeration phase,
External testing
and the behavior of security devices analyzed
Internal testing
• Internal testing will be performed from a number of
network access points, representing each logical and
h i l t
Internal testing
physical segment
• Black-hat testing/zero-knowledge testing
• Gray-hat testing/partial-knowledge testing
• White-hat testing/complete-knowledge testing White hat testing/complete knowledge testing
Trang 4Risk = Threat x Vulnerability
A planned risk is any event that has the potential to adversely affect the penetration test
The pentest team is advised to plan for significant
risks to enable contingency plans in order to
ff i l ili i d
effectively utilize time and resources
Trang 6Outsourcing Penetration Testing Services
Drivers for outsourcing pentest services
• To get the network audited by an external agency to
acquire an intruder’s point of view
Drivers for outsourcing pentest services
• The organization may require a specific security
assessment and suggestive corrective measures
• Professional liability insurance pays for settlements
Underwriting penetration testing
or judgments for which pen testers become liable as
a result of their actions, or failure to perform
professional services
• It is also known as E&O insurance or professional It is also known as E&O insurance or professional
indemnity insurance
Trang 7Terms of Engagement
An organization will sanction a penetration test against any of its production systems after it
agrees upon explicitly stated rules of engagement
It must state the terms of reference under which
th i t t ith th i ti
the agency can interact with the organization
It if th d i d d f d t th
It can specify the desired code of conduct, the
procedures to be followed, and the nature of the interaction between the testers and the
organizationg
Trang 8Project Scope
Determining the scope of the pentest is essential
to decide if the test is a targeted test or a
comprehensive test
Comprehensive assessments are coordinated
efforts by the pentest agency to uncover as much vulnerability as possible throughout the
organization
A targeted test will seek to identify vulnerabilities
in specific systems and practices
Trang 9Pentest Service Level Agreements
A service level agreement is a contract that details the terms of service that an outsourcer will provide
Professionally done SLAs can include both remedies and penalties
The bottom line is that SLAs define the minimum levels of availability from the testers and determine what actions will be taken in the event of serious disruption
Trang 10Providing a penetration testing team with
additional information may give them an
unrealistic advantage
Similarly, the extent to which the vulnerabilities need to be exploited without disrupting critical services needs to be determinedb
Trang 11An on-site assessment may be expensive and may not simulate an external threat exactly
Trang 12Automated Testing
Automated testing can result in time and cost savings over a long term;
however, it cannot replace an experienced security professional
Tools can have a high learning curve and may need frequent updating to be effective
With automated testing, there exists no scope for any of the architectural elements to be tested
As with vulnerability scanners, there can be false negatives or worse, false positives
Trang 13Manual Testing
Manual testing is the best option an organization can choose to benefit from the
experience of a security professional
The objective of the professional is to assess the security posture of the
organization from a hacker’s perspective
A manual approach requires planning, test designing, scheduling, and diligent documentation to capture the results of the testing process in its entirety
Trang 14Using DNS Domain Name and
IP Address Information
Data from the DNS servers related to the target network
can be used to map a target organization’s network
The DNS record also provides some valuable
information regarding the OS or applications that are
b i th
being run on the server
The IP block of an organization can be discerned by
looking up the domain name and contact information
for personnel
Trang 15Enumerating Information about Hosts on Publicly-Available Networks y
Enumeration can be done using port scanning
tools, IP protocols, and listening to TCP/UDP ports
The testing team can then visualize a detailed
network diagram that can be publicly accessed
Additionally, the effort can provide screened
subnets and a comprehensive list of the types of
traffic that are allowed in and out of the network
Website crawlers can mirror entire sites
Trang 16Testing Network-Filtering Devices
The objective of the pentest team would be to
ascertain that all legitimate traffic flows through the
filtering device
Proxy servers may be subjected to stress tests to
determine their ability to filter out unwanted packets
Testing for default installations of the firewall can be
done to ensure that default user IDs and passwords
have been disabled or changed
Testers can also check for any remote login capability
that might have been enabled
Trang 17Enumerating Devices
A device inventory is a collection of network devices
together with some relevant information about each device that is recorded in a document
After the network has been mapped and the business assets identified the next logical step is to make an inventory of the devices
A physical check may be conducted additionally to ensure that the enumerated devices have been located correctly
Trang 18Denial of Service Emulation
Emulating DoS attacks can be resource u at g oS attac s ca be esou ce
intensive
DoS attacks can be emulated using
hardware
Some online sites simulate DoS attacks
for a nominal charge
These tests are meant to check the
effectiveness of anti-DoS devices
Trang 19Penetration Testing Tools
Trang 20Pentest Using Appscan
AppScan is a tool developed for automated web application security testing and weakness assessment software
Trang 21HackerShield is an anti hacking program that identifies and fixes the vulnerabilities that hackers use to get into servers, workstations, and other IP devices
Hacking
Trang 22Anti-Pentest Using Cerberus Internet Scanner
Cerber s Information Sec rit sed to maintain the Cerber s Internet Scanner (CIS) is now available at @stake
It is programmed to assist administrators in finding and fixing vulnerabilities in their systems
Trang 23Cerberus: Screenshot
Trang 24Pentest Using Cybercop Scanner
Cybercop Scanner enables the user to identify
vulnerabilities by conducting more than 830
vulnerability checks
It is more effective as it runs a scan on over 100 hosts
at the same time and also does applicable tests on
network devices
It is also useful to administrators for fixing problems
and security holes
Trang 25Cybercop: Screenshot
Trang 26Pentest Using FoundScan Hardware Appliances
FoundScan tries to identify and locate the operating systems running
on each live host by analyzing returned data with an algorithm
Trang 27Pentest Using Nessus
Nessus is a suitable utility for service detection as it has an enhanced service detecting feature
Trang 28Pentest Using NetRecon
NetRecon is useful in defining common intrusion and attack scenarios to locate and report network holes
Trang 29Pentest Using SAINT
SAINT monitors every live system on a network for TCP and UDP devices
Trang 30Pentest Using SecureNET Pro
SecureNET Pro is a fusion of many technologies, namely session
monitoring, firewall, hijacking, and keyword-based intrusion detection
Trang 31Pentest Using SecureScan
SecureScan is a network vulnerability assessment tool that
determines whether internal networks and firewalls are vulnerable to attacks, and recommends corrective action for identified
vulnerabilities
Trang 32Pentest Using SATAN, SARA, and Security Analyzer
Security Auditor's Research Assistant (SARA) is a
third generation Unix-based security analysis tool
SATAN is considered one of the pioneering tools that
led to the development of vulnerability assessment
tools
Security Analyzer helps in preventing attacks,
protecting the critical systems, and safeguarding
information
Trang 33Pentest Using STAT Analyzer
STAT Analyzer is a vulnerability assessment utility that integrates stateSTAT Analyzer is a vulnerability assessment utility that integrates state-of-the-art commercial network modeling and scanning tools
Trang 34Pentest Using VigilENT
VigilENT helps to protect systems by
assessing policy compliance, identifying
security vulnerabilities, and helping
correct exposures before they result in
failed audits, security breaches, or costly
downtime
Trang 35Pentest Using WebInspect
Trang 36Pentest Using CredDigger
www foundstone com
CredDigger™ is a tool that attempts to gather data to
assist penetration testing on a corporate network by:p g p y
• Determining every host on which a given set of user
Trang 37CredDigger: Screenshot 1
Trang 38CredDigger: Screenshot 2
Trang 39Pentest Using Nsauditor
www nsauditor com
Nsauditor is a network security scanner that allows to audit and
monitor remote network computers for possible vulnerabilities,
checks your network for all potential methods that a hacker might use to attack
The program includes more than 45 network tools for scanning,
sniffing, enumerating, and gaining access to machines and contains g, g, g g
a built-in database of known network security vulnerabilities, which allows you to select the items for scanning and adds custom entries
It can reveal and catalog a variety of information, including
installed software, shares, users, drives, hotfixes, NetBios, RPC,
SQL and SNMP information, and open ports
Trang 40Nsauditor: Screenshot
Trang 41Evaluating Different Types of Pentest Tools
The different factors affecting the type of tool