introduction Penetration Testing Version: 1.0.2 On this page
Penetration Testing Simulating of an security attack todiscover vulnerabilities (and document) evaluate the security Detailed analysis of weaknesses in design, technical flaws, and vulnerabilities in organizations information security. E.g. • phishing • testing authentication using dictionaries • test if router is using an obsolete OS Purpose Identify threats Reduce security expensesE.g. you can recommend cheaper router and switches that'll be enough for their capacity and still secure. ROSI = Return on security investment E.g. you'll save company for 100% payback if they implement anti-junk system and junk e-mails cost more to the company. Provide complete security assessment Maintain industry standards and regulations Follow best practices Test security controls Improve current security infrastructure Pay particular attention to severe vulnerabilitiesE.g. explain what one single vulnerability can lead to what kind of damage. Prepare steps for preventing exploitations Test network security devices Activities for a good penetration test Defining the penetration test parametersStates what pen-tester can do and cannot do. Have both signed. Engaging skilled penetration testers Following non-disclosure agreementCompanies don't want to work with someone with bad reputation, e.g. who broke NDA before. Selecting appropriate testsDone by the company and the pen-tester together Find cost/benefit ratio of tests Using and following a methodology 💡 Good to test for all known vulnerabilities to save time and make documentation easier. Documenting the results of the test Creating a final report Audit vs Vulnerability Assessment vs Penetration Test Security audit Compliance = Inspects if an organization is following security standards and policies. E.g. interviewing staff, vulnerability scans, reviewing access controls, analyzing physical access. Often blue/red teaming approach is used by penetration testers. Vulnerability assessment Finds the vulnerabilities in the network Will not state if they're exploitable, nor the potential harm Penetration test Includes both security audit + vulnerability assessment Discovers vulnerabilities in a system and evaluates its security Demonstrates how attackers can exploit the identified vulnerabilities. Tells you what measures should be taken to prevent the vulnerabilities. Blue and red teaming Two teams in company, or sometimes outside of the company who battles against each other. Similar to capture the flag contest, red is aggressor, blue protects. More cost-efficient then hiring an external company to do full penetration testing. Blue team Defender: Detects attackers (red team) and predict possible attacks. Has full access to the system to analyze the security. Red team Attacker: Finds vulnerabilities in the system and penetrates to examine what real attackers could do. Has no access to the system Purple team Both worlds Both attacks and also repairs/suggests improvements Types of penetration testing Consists of white box , black box and grey box testing.💡 The darker the box is the more credible test results and the higher the costs are. As going from nothing to something as opposed to something to nothing would simulate real-world hacks but would take more time. 📝 Each type can beAnnounced vs. UnannouncedAnnounced testing IT team are aware of security being tested. Often it occurs when testing a specific segment where IT admins give you access to test different components. Unannounced testing IT team is unaware of the security being tested Internal vs ExternalInternal Targets assets within an corporate network External Targets internet-facing assets such as web, mail and FTP servers. Black box testing Also called zero-knowledge Testing , blackbox testing or black-box testing 📝 Testers have very little information about the client's infrastructure. The goal is to simulate an external hacking or cyber warfare attack. provides a very realistic scenario for testing of the defenses Can be costlier as it takes much more time to conduct. Blind testing Tester has little information to none about target. Target itself (e.g. system administrator) knows about the test and its scope. Demonstrates what a real attacker would do. Double-blind testing Also called zero-knowledge approach Neither the pen-tester nor the target knows anything about each other. Good & reliable results Most difficult, time-consuming and expensive to perform. Grey box testing Also called greybox testing , grey-box testing , gray box testing , graybox testing , gray-box testing 📝 Tester has partial knowledge i.e. knowledge of the internal workings is limited. Combination of black box and white box testing. Helps to reduce the cost of the test by gaining knowledge that would be harder to gain otherwise. White box testing Also called Complete-Knowledge Testing , whitebox testing or white-box testing 📝 Tester knows the company inside outfully aware of the network, infrastructure policies. e.g. ap of the subnets, ruling list of firewalls, intrusion detection system details. Cost-effective and can be good when testing a single component Security testing methodology Proprietary methodologies Usually done by security companies who offer pen testing services and as such are kept confidential. IncludesIBM Good for mid-sized companies Gives fast result without much effort McAfee Foundstone Used mainly in enterprises. Anything that's custom not generic has big chance of slipping through EC-Council LPT Open-source Methodologies Publicly available and can be used by anyone OWASP (Open Web Application Security Project) Online community, produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security Produces Top 10 lists of the most common vulnerabilities and how to fix them. Good for developers and system architects (anyone working with coding/application) OSSTMM (Open Source Security Testing Methodology Manual) Open-source security testing methodology manual Standard set of penetration testing testsAttempt to standardize pen-testing and making consistent Defines three types of compliance:Contractual : requirements enforced by an industry or non-government group.Legislative : regulations enforced by the government.Standards based : actions that are recommended and must be adhered to in order to be certified by a group. Like an instruction manual "how to conduct a pen-test" NIST (National Institute of Standards and Technology)