Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential
Content About Docutek The real Difference — We Take Your Security Personally Our mission is to deliver the most comprehensive, accurate, and thorough information security assessments in the industry. We focus exclusively on what we do best — penetration testing and IT security and vulnerability assessments. 2VA PT Approach Confidential
We are certified to do our job! VA PT Approach Confidential3 Certified Penetration Tester CPT Metasploit Penetration Tester Pro HP TippingPoint HP ExpertOne – Cloud Architect HP AppPulse OpenEMR CompTIA Health IT Security + LPT, ENSA, SCUS CEH Certified Ethical Hacker
Content Table of Content 1.Introduction 2.The need for VA - PT 3.What is VA - PT 4.Typical Approaches 5.Methodology 6.Challenges 4VA PT Approach Confidential
Content Introduction 5VA PT Approach Confidential Introduction
6VA PT Approach Confidential
7
8
Before you start Business Associate – Compliance BA Risk Analysis – Always Insurance – Just in case (CyberEdge AIG) Contract – Peace of mind Alliances – Do not go in alone VA PT Approach Confidential9
To improve information security awareness To assess risk To mitigate risk immediately To reinforce the information security process To assist in decision making processes To Validate that current security mechanisms are working Compliance to various security standards and regulations such as ISO 27001, IT ACT 2000, SOX, HIPAA, PCI, etc VA PT Approach Confidential10 Need for VA – PT Highest Security Risk
VA PT Approach Confidential11 Hospitals and Medical Devices Found Prone To Hacking Due To Network Security Flaw Thousands of healthcare organizations around the world, along with the medical devices and equipment that connect to their systems, are leaving themselves open to cyber attacks because of a crucial mis-configuration of a network security protocol.
What is VA – PT ? A form of Stress testing, which exposes weaknesses or flaws in a computer system Art of finding an Open door A valued Assurance Assessment tool PT can be used to find Flaws in – Specifications, Architecture, Implementation, Software, Hardware, And many more……………… Vulnerability assessment is the process of identifying and quantifying vulnerabilities in a system. A vulnerability assessment is what most companies generally do, as the systems they are testing are live production systems and can’t afford to be disrupted by active exploits which might crash the system. VA PT Approach Confidential12
Typical Approach Typical Approach – It is also know as “complete knowledge” testing WHITEBOX Testing BLACKBOX Testing VA PT Approach Confidential13
WHITEBOX Testing It is also known as “complete knowledge” testing Testers are given full information about the target system they are supposed to attack Information TESTING includes: Technology overviews Data flow & Network diagrams Code snippets Benefits: Reveals more vulnerabilities and may be faster Compared to replicate an attack from a criminal hacker that knows the company infrastructure very well This hacker may be an employee of the company itself, doing an internal attack VA PT Approach Confidential14
BLACKBOX Testing The tester simulates an inside Employee. The tester is given an account on the internal network and standard access to the network. This test assesses internal threats from employees within the Company. The relative merits of all these approaches are debatable. In most cases it is preferable to assume a worst-case scenario and provide the testers with as much information as they require, assuming that any determined attacker would already have acquired this. VA PT Approach Confidential15
Penetration Process Cycle - PPC VA PT Approach Confidential16
Methodology 1.Scope / Goal Definition 2.Information Gathering 3.Information Analysis & Planning 4.Vulnerability Detection 5.Attack & Penetration / Privilege Escalation 6.Result Analysis & Reporting 7.Clean Up VA PT Approach Confidential17
VA PT Approach Confidential18
1. Scope/Goal Definition Which attacker profile the tester will use Hacker with no knowledge about the target Hacker with knowledge about the target Internet user with access Which System or network the test will be conducted Duration of Test VA PT Approach Confidential19
VA PT Approach Confidential20
2. Information Gathering Information about the Target Who is: ARIN ; RIPE ; APNIC Google: General Information; Financial, Phone Book, Google Hacking Databases; Web Searching DNS Retrieval, SOA Record, MX Records, NS Records, A Records etc. Tools / Websites: Cheops-ng, Sam Spade, Social Engineering Dumpster Diving Web Site Copy VA PT Approach Confidential21
VA PT Approach Confidential22
3. Vulnerability Detection Manual Detection Manually probe the target host from common mis- configuration or flaws because a vulnerability scanner can fail to identify certain vulnerabilities. Ex: Database configuration etc…. – Open TCP Ports – Closed TCP Ports – Open UDP Ports – Closed UDP Ports – Service Probing VA PT Approach Confidential23
VA PT Approach Confidential24
4. Information Analysis & Planning – Collating the information gathered in previous stages. – Preparation of High level attack planning. Overall Approach Target identification VA PT Approach Confidential25
VA PT Approach Confidential26
5. Penetration & Privilege Escalation HAS Two Sub Stages Attack & Penetration – Known / available exploit selection – Tester acquires publicly available s/w for exploiting. – Exploit customization – Customize exploits s/w program to work as desired. – Exploit development – Develop own exploit if no exploit program available – Exploit testing – Exploit must be tested before formal Test to avoid damage. – Attack – Use of exploit to gain unauthorized access to target. VA PT Approach Confidential27
VA PT Approach Confidential28
Penetration & Privilege Escalation Privilege Escalation – What can be done with acquired access / privileges Alter Damage What not VA PT Approach Confidential29
VA PT Approach Confidential30
6. Result Analysis & Reporting Organize Data/related results for Management Reporting Consolidation of Information gathered Analysis and Extraction of General conclusions Recommendations VA PT Approach Confidential31
VA PT Approach Confidential32
7. Cleanup – Cleaning of all that has been done during the testing Any System alterations Exploits VA PT Approach Confidential33
Challenges Quality & Experience of Pen Testers Quality & Effectiveness of Tools Usage of Globally Accepted Methodology such as OSSTMM, OWASP etc Ensuring all the findings are reported to the Management Follow stringent program to Fix Vulnerabilities Conduct Periodic Testing VA PT Approach Confidential34
VA PT Approach Confidential35 DOCUTEK 7000 N Plaza Austin, TX USA