Penetration Testing University of Sunderland CSEM02 Harry R Erwin, PhD.

Slides:



Advertisements
Similar presentations
Web Security for Network and System Administrators1 Chapter 1 Introduction to Information Security.
Advertisements

NSFdeposit.com Telephone Checks. NSFdeposit.com Telephone Checks New Automated On-line Payment System One time sign-up; intelligent engine Unique file.
Application Security Best Practices At Microsoft Ensuring the lowest possible exposure and vulnerability to attacks Published: January 2003.
IP ADDRESS MANAGEMENT [IPAM]
Guide to Network Defense and Countermeasures Second Edition
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
 Cyber Ecosystem & Data Security Subhro Kar CSCE 824, Spring 2013 University of South Carolina, Columbia.
Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Hands-On Ethical Hacking and Network Defense
Information Security Policies and Standards
Case Studies for Projects. Network Audit A brief description of the systems (via fingerprinting, if black box is used) Network perimeter should be described.
Chapter 12 Network Security.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Vulnerability Assessment Course Terms, Methodology, Preparation, Obstacles, and Pitfalls.
1 USAID/Peru Risk Assessment In-Briefing February 19, 1999 PRIME Principal Resource for Information Management Enterprise-wide USAID PRIME.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
PRIME Principal Resource for Information Management Enterprise-wide USAID PRIME 1 USAID/Peru Risk Assessment In-Briefing February 19, 1999 PRIME Principal.
SEC835 Database and Web application security Information Security Architecture.
Intranet, Extranet, Firewall. Intranet and Extranet.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Pen testing to ensure your security
Hosted by How to Conduct an Information Security (INFOSEC) Assessment The NSA INFOSEC Assessment Methodology (IAM) Stephen Mencik, CISSP ACS Defense, Inc.
Joseph Ferracin Director IT Security Solutions Managing Security.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
2 Systems Architecture, Fifth Edition Chapter Goals Describe the activities of information systems professionals Describe the technical knowledge of computer.
Module 14: Configuring Server Security Compliance
Ten Ways to Mess Up Your Financial Upgrade Maria BalluchMarch 25, 2014 How to Increase Conversion Success.
CIS 450 – Network Security Chapter 3 – Information Gathering.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Relationships July 9, Producers and Consumers SERI - Relationships Session 1.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
VULNERABILITY ASSESSMENT FOR THE POLICE DEPARTMENT’S NETWORK.
Auditing Information Systems (AIS)
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Securing Your Enterprise with Enterprise Manager 10g Amir Najmi Principal Member of Technical Staff System Management Products Oracle Corporation Session.
Scott Teeters, Jr. MicroSolved, Inc. in partnership with Sogeti USA How to Fail A Penetration Test Concepts in Securing a Network.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Introduction to Information Security
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Cryptography and Network Security
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Technology and User Support Breakout Session SVRS Conference for Wisconsin County Clerks May 4, 2005 – May 5, 2005.
Vulnerability Analysis Dr. X. Computer system Design Implementation Maintenance Operation.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Critical Security Controls
Penetration Test Debrief
ISO/IEC 27001:2005 A brief introduction Kaushik Majumder
Presentation transcript:

Penetration Testing University of Sunderland CSEM02 Harry R Erwin, PhD

Resources Qinetiq Information Security Foundation Course (2002) Tittle, Stewart, and Chapple, 2004, CISSP: Certified Information Systems Security Professional Study Guide, 2 nd edition, Sybex Whittaker and Thompson, 2004, How to Break Software Security, Pearson

Definition An activity used to test the strength and effectiveness of deployed security measures with an authorized attempted intrusion attack. Penetration testing should be performed only with the consent and knowledge of the management staff. (Tittle et al., 2004)

General Comments Usually done to give management a ‘warm and fuzzy’ feeling about the security of their system. Expensive Does not substitute for good security testing or for good security design. This discussion will be of how it is done.

General Approach The members of the team first scope the penetration test. This includes: –Consultation with the customer about the specific type of testing to be performed. On-site Remote Application Telecommunications Hybrid –Number of hosts to be tested –Timescale

Penetration Testing Services Begins with a tailored security health check (SHC), comprised of part or all of: –Network security health check Onsite Remote –Application security health check –Telecommunications security health check Should be flexible and appropriate

Network SHC Location can be remote or onsite Starts with public records –RIPE/DNS/Google (you’ve seen this demonstrated) Network assessment –Architecture Gateways (RIP/OSPF) Firewalls (ACL/rules) –Protocols –IP range –Anomalies

Network Testing If onsite, you will need to conduct on-host audits –Windows –Unix Infrastructure management should also be assessed –Remote/terminal/back-end management Should include a comprehensive configuration review and recommendations

Network Testing Host assessment –Identify the live hosts. –Apply operating system fingerprinting to identify potential vulnerabilities. –Determine the trust relationships. Service assessment –Services offered. –Anomalies and vulnerabilities.

Network Testing Vulnerability assessment –Automated tools? –Manual determination –Risk assessment of data flow

Application Testing What applications are running? –By server type –Stovepipe or specialized systems –Protocols –Session and authentication handling –Default scripts and generic vulnerabilities

Authentication Analysis Session handling –Session identifier—how predictable and identifiable, can it be brute forced, can it be replicated? –Session timeout Comparison to best practices –Correctly implemented? –Predictable secret values? –Is brute force blocked? –Password complexity adequate?

Transactional Security Can transactions be identified in the data stream? How much information can be derived from them? What happens when –Transactions are replicated –Transactions are injected –Transactions are deleted

Source Code Review Logical analysis –Control flow –Functionality Information leakage –Error messages Input validation –Bad input –Bypass –Drilling through Expensive in time and money. Pay me now, or pay me later. It costs more later.

Telecomms Testing War-dialing and modem detection –Identified modems need to be inventoried PABX audit looks for: –Toll fraud –Call redirection –Remote reconfiguration –Trunk line configuration

Penetration Test Process Scope/preparation Briefing Physical test Knowledge transfer and education Diagnosis Debriefing Report

Scope/Preparation Scope and scale the test Establish deadlines and schedules Sign contract Conduct test planning –Risk and perceived threat –Technology –Identify and deploy necessary skills

Initial Briefing Meet technical staff Collect contact information Describe the test Identify areas of concern –Maintain contact –Track major user issues –Be open

Physical Test Evaluate the network –IP range –Subnets Automated tests (nessus/nmap) Hands-on tests –Prior experience of testers –Trust analysis –Exploits

Debriefing Evaluated automated results Assess anomalies Ensure full scope of testing has been completed Make sure the nature of any successful penetration is clear to the customer

Closure Make sure all experts/managers are involved. Discuss all results Identify who receives reports Provide contact details Prepare report –When due, what, and follow-up.

Conducting the Test Identify target and goal Gather information Identify potential routes into network Test potential routes Capture target

Identify Target and Goal Targets –What is to be attacked? Goals –Compromise –Privacy-sensitive data –Defacement –Denial of service –Fraud

Information Gathering Resources include: –RIPE (Europe) –ARIN (US) –DNS –IRC (technical chat rooms) –Phone books –Public business records –Trash cans –Google (which you’ve seen)

Potential Routes Social engineering –Open sources –Newsgroups and papers published Use this to plan the penetration Play the role Create trust

Telecomms War-dialing to identify modems Voice mail

Mapping Identify servers and subnets Evaluate firewalls and routers Each route in needs to be assessed –Firewalls –Protection –Access –Speed –Special circumstances

Capture Target Develop detailed capture scenario Take into account vulnerabilities and special circumstances Implement Usually, you will demonstrate the initial access point vulnerability, give the administrators time to fix it, and continue from the access point to the target.

What Allows This to Succeed? Public data Uneducated staff Misconfigured servers Misconfigured boundary protection Lack of IDS Patches not implemented

Countermeasures Have your security reviewed Educate users and staff Implement authentication, access control, and audit Use an IDS Code reviews Keep private data private