Vulnerability Testing Approach Prepared By: Phil Cheese Nov 2008.

Slides:



Advertisements
Similar presentations
Chapter 14 Fraud Risk Assessment.
Advertisements

OVERVIEW TEAM5 SOFTWARE The TEAM5 software manages personnel and test data for personal ESD grounding devices. Test and personnel data may be viewed/reported.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Penetration Testing Anand Sudula, CISA,CISSP SSA Global Technologies, India Anand Sudula, CISA,CISSP SSA Global Technologies, India.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
The State of Security Management By Jim Reavis January 2003.
Network Security Testing Techniques Presented By:- Sachin Vador.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Web server security Dr Jim Briggs WEBP security1.
Computer Security and Penetration Testing
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Comp 8130 Presentation Security Testing Group Members: U Hui Chen U Ming Chen U Xiaobin Wang.
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Website Hardening HUIT IT Security | Sep
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Theo Tryfonas Centre in Systems, Faculty of Engineering Embedding Competitor Intelligence Capability in the Software Development Lifecycle Security and.
PCI: As complicated as it sounds? Gerry Lawrence CTO
Outsourcing Louis P. Piergeti VP, IIROC March 29, 2011.
Information Systems Development. Outline  Information System  Systems Development Project  Systems Development Life Cycle.
Honeypot and Intrusion Detection System
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Nata Raju Gurrapu Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Chapter 1: Fundamental of Testing Systems Testing & Evaluation (MNN1063)
Module 5 – Vulnerability Identification  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
South Wales Cyber Security Cluster A networking group with a purpose Membership Open to anyone with an interest in Cyber Security.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Computer Security By Duncan Hall.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
RISK MANAGEMENT: CONTROLLING RISK IN INFORMATION SECURITY By Collin Donaldson.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Information Systems Development. Outline  Information System  Systems Development Project  Systems Development Life Cycle.
Performing Risk Analysis and Testing: Outsource or In-house
Shadow Brokers – Details on Leaked Cyberintelligence Tools and Vulnerabilities A brief research note for Info-Tech’s members.
Topic 5 Penetration Testing 滲透測試
Cyber Security for Building Management
Critical Security Controls
Overview – SOE PatchTT November 2015.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Unauthorized Access Risk Mitigation Techniques
Information Security based on International Standard ISO 27001
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
IS4680 Security Auditing for Compliance
AppExchange Security Certification
Data Governance & Management Skills and Experience
6. Application Software Security
V1.1 1.
Presentation transcript:

Vulnerability Testing Approach Prepared By: Phil Cheese Nov 2008

2 Outline Structure of Technology UK Security Team Why we test What we test When we test How we test Demo of a unix platform test Hot topics Questions and Answers

3 UK Technology Security teams Security Consultants Security Monitoring Mail, Logs, IDS, Firewall Review New Systems Vulnerability Test Team Vulnerability Testing Security OperationsUK Tech. Security MgrGroup CISO

4 Definition Penetration testing v Vulnerability testing ? Wikepedia “Security testing techniques scour for vulnerabilities or security holes in applications. These vulnerabilities leave applications open to exploitation. Ideally, security testing is implemented throughout the entire software development life cycle (SDLC) so that vulnerabilities may be addressed in a timely and thorough manner. Unfortunately, testing is often conducted as anafterthought at the end of the development cycle.”exploitationsoftware development life cycle Why ? – test against standards, identify misconfigurations, old vunerable versions of software, test drive Ethics & Legality

5 Why testing Preventing financial loss through fraud (hackers, extortionists and disgruntled employees) or through lost revenue due to unreliable business systems and processes. Proving due diligence and compliance to your industry regulators, customers and shareholders. Non-compliance can result in your organisation losing business, receiving heavy fines, gathering bad PR or ultimately failing. Protecting your brand by avoiding loss of consumer confidence and business reputation. vulnerability testing helps shape information security strategy through identifying vulnerabilities and quantifying their impact and likelihood so that they can be managed proactively; budget can be allocated and corrective measures implemented.

6 Defining the scope Full-Scale vs. Targeted Testing Platform, Network, Database, Applications Remote vs. Local Testing In-house v outsourcing

7 Defense in depth Operating System Database Application Network

8 Tester Sun Solaris Application Server HP-UX Oracle DB Redhat Apache Web server Network elements e.g SGSN’s, HLR’s Windows File server Nmap Nessus

9 Nmap

10 Nessus

11 Tester Sun Solaris Application Server HP-UX Oracle DB Redhat Apache Web server Network elements e.g SGSN’s, HLR’s Windows File server Assuria Agents

12 Assuria Auditor Console

13 Tester Sun Solaris Application Server HP-UX Oracle DB Redhat Apache Web server Network elements e.g SGSN’s, HLR’s Windows File server NGS Squirrel

14 NGS Squirrel

15 Tester Sun Solaris Application Server HP-UX Oracle DB Redhat Apache Web server Network elements e.g SGSN’s, HLR’s Windows File server Appscan, Superwalk

16 Appscan

17 Backtrack

18 Tester Sun Solaris Application Server HP-UX Oracle DB Redhat Apache Web server Network elements e.g SGSN’s, HLR’s Windows File server Assuria CLI Remote test (Data Centre)

19 Remote platform vulnerability assessment using Assuria Auditor & workbench via the command line “It is better to voyage hopefully than to drive to Oldham” FTP and install scripts Run scans Copy off raw results files Generate csv files Import results into workbench Review scan results Producing reports Agreeing remedial actions and re-testing

20 Log onto remote server

21 FTP onto a remote server

22 unzip tarball file

23

24 Areas checked by ‘Initial’ policies

25 Run scans

26 FTP results back to desktop

27 Generate CSV files

28 Import into Workbench

29 Reconcile results

30 Filter results

31 Vulnerability testing - hot topics PCI-DSS – keeping Security vendor industry going! Appliances and automation – keep your auditors happy Virtualisation and middleware vulnerabilities – don’t forget’em…. Exploitation tools – Metasploit framework, Canvas, Core Impact. BEEF

32 Conclusions In depth, holistic approach to security testing Testing needs to take place during the development lifecycle Can be complex and time consuming Outsource specialist testing to third party vendors Commercial tools easy to maintain and use but can be expensive “A fool with a tool is still a fool” Results from tools need analysis and put into a ‘business risk’ context

33 Any Questions ?