Penetration Test Debrief

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

Vulnerability Analysis Borrowed from the CLICS group.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
Web server security Dr Jim Briggs WEBP security1.
Hacking Web Server Defiana Arnaldy, M.Si
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
By: Razieh Rezaei Saleh.  Security Evaluation The examination of a system to determine its degree of compliance with a stated security model, security.
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Cosc 4765 Server side Web security. Web security issues From Cenzic Vulnerability report
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
1 Nessus - NASL Marmagna Desai [592- Project]. 2 Agenda Introduction –Nessus –Nessus Attack Scripting Language [ N A S L] Features –Nessus –NASL Testing.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Software Security Testing Vinay Srinivasan cell:
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
All Input is Evil (Part 1) Introduction Will not cover everything Healthy level of paranoia Use my DVD Swap Shop application (week 2)
SCSC 555 Frank Li.  Introduction to Enumeration  Enumerate Microsoft OS  Enumerate *NIX OS  Enumerate NetWare OS (skip) 2.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
CSCE 548 Secure Software Development Taxonomy of Coding Errors.
nd Joint Workshop between Security Research Labs in JAPAN and KOREA Marking Scheme for Semantic- aware Web Application Security HPC.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Turning Windows 7 into a Web Server Ch 28. Understanding Internet Information Services.
Module 7: Advanced Application and Web Filtering.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Web Security Group 5 Adam Swett Brian Marco. Why Web Security? Web sites and web applications constantly growing Complex business applications are now.
TCOM Information Assurance Management System Hacking.
Retina Network Security Scanner
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
EECS 354: Network Security Group Members: Patrick Wong Eric Chan Shira Schneidman Web Attacks Project: Detecting XSS and SQL Injection Vulnerabilities.
Enumeration. Definition Scanning identifies live hosts and running services Enumeration probes the identified services more fully for known weaknesses.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Aaron Corso COSC Spring What is LAMP?  A ‘solution stack’, or package of an OS and software consisting of:  Linux  Apache  MySQL  PHP.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Unit 2: Cyber Security Part 3 Monitoring Tools & other Security Products.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
CITA 352 Chapter 6 Enumeration.
Nessus Vulnerability Scan
Web Application Security
Fortinet NSE8 Exam Do You Want To Pass In First Attempt.
Chapter 7: Identifying Advanced Attacks
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
CITA 352 Chapter 5 Port Scanning.
Setting-Up and Securing a Server
Secure Software Confidentiality Integrity Data Security Authentication
Web Application Firewall Bypassing – an approach for pentesters
A Security Review Process for Existing Software Applications
Marking Scheme for Semantic-aware Web Application Security
Penetration Test Debrief
Security.
Intro to Ethical Hacking
Intro to Ethical Hacking
Metasploit Analysis Report Overview
AppExchange Security Certification
Security.
NESSUS SCANNING By: Vaibhav Shukla.
6. Application Software Security
Exploring DOM-Based Cross Site Attacks
Presentation transcript:

Penetration Test Debrief Ted Vera & Mark Trynor November 30, 2010 Confidential and Proprietary Gamers First Information

Confidential and Proprietary Gamers First Information Agenda Pen Test Review Recommendations NOTE: All trademarks referenced in this presentation are property of their respective owners. Confidential and Proprietary Gamers First Information

Confidential and Proprietary Gamers First Information Overview During the test we enumerated 302 hosts running 1174 services on the target netblocks as discovered by nmap. Nessus identified 346 vulnerabilities broken out as follows: 3 High, 6 Medium, and the remainder Low severity. Of these, 0 were successfully compromised and 1 password was obtained (anonymous ftp server). NOTE: All trademarks referenced in this presentation are property of their respective owners. Confidential and Proprietary Gamers First Information

Confidential and Proprietary Gamers First Information Pen Test Review: Day 1 Kick-off Meeting Reviewed customer ROE Installed pen test tools on attack VMs Performed automated port and vulnerability scans against target systems NOTE: All trademarks referenced in this presentation are property of their respective owners. Confidential and Proprietary Gamers First Information

Confidential and Proprietary Gamers First Information Pen Test Review: Day 2 Started comprehensive Nessus scan against the target IP addresses. Nessus is a vulnerability-scanning program that targets remote access vulnerabilities, misconfigurations, default passwords, and utilizes mangled packets for possible Denial of Service (DoS) attacks. Identified one high-risk vulnerability and relayed information to Phil: Microsoft IIS WebDav ntdll.dll Remote Overflow (MS03-007) NOTE: All trademarks referenced in this presentation are property of their respective owners. Confidential and Proprietary Gamers First Information

Confidential and Proprietary Gamers First Information Pen Test Review: Day 3 Performed automated attacks against enumerated hosts/services using Metasploit with over 900 exploit modules. Completed brute-force attacks against open authentication services. Identified one anonymous ftp user account. Completed automated cross-site-scripting attacks against all http servers. NOTE: All trademarks referenced in this presentation are property of their respective owners. Confidential and Proprietary Gamers First Information

Confidential and Proprietary Gamers First Information Pen Test Review: Day 3 Brute-force attacks against web login pages are currently underway. Rescanning ports based on Chris's findings.  Scanning is still underway. Performed manual custom XSS attacks against four HTTP servers. Performed automated cross-site scripting attacks using XSSer (Table 6. XSSer Output). Cross Site Scripting (XSS) allows code injection by bypassing web browser client-side security measures. NOTE: All trademarks referenced in this presentation are property of their respective owners. Confidential and Proprietary Gamers First Information

Confidential and Proprietary Gamers First Information Pen Test Review: Day 4 Manually verified numerous Nessus false positives. Ran Nikto web application scanner. Nikto is a web application scanner that checks for over 9000 potentially dangerous files/CGIs, version specific problems, and server configuration issues. NOTE: All trademarks referenced in this presentation are property of their respective owners. Confidential and Proprietary Gamers First Information

Confidential and Proprietary Gamers First Information Pen Test Review: Day 5 Day 5 of the test focused on manually validating false positives reported by automated tools, running automated attack tools, and performing custom exploit development and attacks. NOTE: All trademarks referenced in this presentation are property of their respective owners. Confidential and Proprietary Gamers First Information

Confidential and Proprietary Gamers First Information Pen Test Review: Day 6-10 Day 6-10 consisted of running intensive nmap port scan of target netblocks. Identified numerous additional ports/services and updated excel spreadsheet with results. Compiled final reports and presentation. NOTE: All trademarks referenced in this presentation are property of their respective owners. Confidential and Proprietary Gamers First Information

Vulnerabilities: High Priority Severity IP Description High 173.195.33.145 Microsoft IIS WebDAV ntdll.dll Remote Overflow (MS03-007) 173.195.37.2 Web Server Incomplete Basic Authentication DoS 207.38.96.60 Unsupported Unix Operating System Confidential and Proprietary Gamers First Information

Vulnerabilities: Med Priority Severity IP Description Medium 173.195.37.2 Novell GroupWise Enhancement Pack Java Server URL Handling Overflow DoS SWS Web Server Unfinished Line Remote DoS NETGEAR ProSafe VPN Firewall Web Server Malformed Basic Authorization Header Remote DoS Confidential and Proprietary Gamers First Information

Vulnerabilities: Med Priority Severity IP Description Medium 207.38.96.60 HTTP TRACE / TRACK Methods Allowed 207.38.96.57 Web Server Uses Plain Text Authentication PHP Potential Information Disclosure Confidential and Proprietary Gamers First Information

Confidential and Proprietary Gamers First Information Recommendations: Manually Verify Medium & High Severity Vulnerabilities Disable Unnecessary Services Enforce strong user passwords Ensure passwords at least 8 characters in length, use a combination of uppercase and lowercase letters (Aa–Zz), numbers (0–9), and symbols ( @ # $ % ^ & * ( ) _ + | ~ - = { } [ ] : ; < > ? , . /). To prevent injection attacks, do not allow passwords to use symbols \ (back slash) or ' ” (quotes). Patch Management  Install operating system and application patches in a timely manner. NOTE: All trademarks referenced in this presentation are property of their respective owners. Confidential and Proprietary Gamers First Information