penetration testing execution standard

43
Penetration Testing Execution Standard Iftach Ian Amit VP Consulting - Security Art Founder - PTES DC9723 March 22nd, 2011

Upload: iftach-ian-amit

Post on 15-Jan-2015

1.435 views

Category:

Technology


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Penetration Testing Execution Standard

Penetration Testing Execution Standard

Iftach Ian AmitVP Consulting - Security Art

Founder - PTESDC9723

March 22nd, 2011

Page 2: Penetration Testing Execution Standard

Agenda

• Why?

• Who?

• How?

• You!

Page 3: Penetration Testing Execution Standard

PTES - Why?

Page 4: Penetration Testing Execution Standard

PTES - Why?

RAPE!

Page 5: Penetration Testing Execution Standard

PTES - Why?

RAPE!

Someone call the police...

Page 6: Penetration Testing Execution Standard

PTES

• Common language for organizations and service providers

• Set the bar for a common standard to be used

• Eliminate hacks (as in run Nessus, generate report, send to customer, charge $10,000)

Page 7: Penetration Testing Execution Standard

PTES - Who?

• As always - started during a long night of drinking...

• Nickerson (@indi303), Kennedy (author of SET), me (@iiamit), Gates (@carnal0wnage), Val (@attackresearch), Nick (@c7five), Robin (@digininja), Wim (@wimremes), Stefan (@stfn42), lots more... www.pentest-standard.org

Page 8: Penetration Testing Execution Standard

PTES - How?• Basically, define the basic 7 elements of a pentest:

• Pre-engagement

• Intelligence gathering

• Threat modeling

• Vulnerability Analysis

• Exploitation

• Post exploitation

• Reporting

Page 9: Penetration Testing Execution Standard

PTES - How?• Basically, define the basic 7 elements of a pentest:

• Pre-engagement

• Intelligence gathering

• Threat modeling

• Vulnerability Analysis

• Exploitation

• Post exploitation

• Reporting

Page 10: Penetration Testing Execution Standard

PTES - How?• Basically, define the basic 7 elements of a pentest:

• Pre-engagement

• Intelligence gathering

• Threat modeling

• Vulnerability Analysis

• Exploitation

• Post exploitation

• Reporting

“old” pentesting scope

Page 11: Penetration Testing Execution Standard

Pre-Engagement

Page 12: Penetration Testing Execution Standard

Pre-Engagement

Page 13: Penetration Testing Execution Standard

Pre-Engagement

Page 14: Penetration Testing Execution Standard

Intelligence Gathering

Page 15: Penetration Testing Execution Standard

Intelligence Gathering

Page 16: Penetration Testing Execution Standard

Intelligence Gathering

Page 17: Penetration Testing Execution Standard

Threat Modeling

Page 18: Penetration Testing Execution Standard

Threat Modeling

Page 19: Penetration Testing Execution Standard

Vulnerability Analysis

Page 20: Penetration Testing Execution Standard

Vulnerability Analysis

Page 21: Penetration Testing Execution Standard

Exploitation

Page 22: Penetration Testing Execution Standard

Exploitation

Page 23: Penetration Testing Execution Standard

Post-Explotation

Page 24: Penetration Testing Execution Standard

Post-Explotation

Page 25: Penetration Testing Execution Standard

Reporting

Page 26: Penetration Testing Execution Standard

Reporting

Page 27: Penetration Testing Execution Standard

Reporting

Page 28: Penetration Testing Execution Standard

PTES - initial reactions

Page 29: Penetration Testing Execution Standard

PTES - initial reactions

• You have to be kidding me

Page 30: Penetration Testing Execution Standard

PTES - initial reactions

• You have to be kidding me

• No one does that

Page 31: Penetration Testing Execution Standard

PTES - initial reactions

• You have to be kidding me

• No one does that

• I can’t do this all by myself

Page 32: Penetration Testing Execution Standard

PTES - initial reactions

• You have to be kidding me

• No one does that

• I can’t do this all by myself

• This is a lot of work

Page 33: Penetration Testing Execution Standard

PTES - initial reactions

• You have to be kidding me

• No one does that

• I can’t do this all by myself

• This is a lot of work

• Is this going into PCI/ISO/[someStandard]?

Page 34: Penetration Testing Execution Standard

PTES - initial reactions

• You have to be kidding me

• No one does that

• I can’t do this all by myself

• This is a lot of work

• Is this going into PCI/ISO/[someStandard]?

• We already do that

Page 35: Penetration Testing Execution Standard

Now what?

Page 36: Penetration Testing Execution Standard

Now what?

YOU!

Page 37: Penetration Testing Execution Standard

Now what?

YOU!Yes, you...

Page 38: Penetration Testing Execution Standard

Roadmap

Page 39: Penetration Testing Execution Standard

Roadmap

• Catch up on all the “official” news at www.pentest-standard.org

Page 40: Penetration Testing Execution Standard

Roadmap

• Catch up on all the “official” news at www.pentest-standard.org

• Volunteer! (we need working hands...)

Page 41: Penetration Testing Execution Standard

Roadmap

• Catch up on all the “official” news at www.pentest-standard.org

• Volunteer! (we need working hands...)

• Previous milestone - Shmoocon (Feb 2011)

Page 42: Penetration Testing Execution Standard

Roadmap

• Catch up on all the “official” news at www.pentest-standard.org

• Volunteer! (we need working hands...)

• Previous milestone - Shmoocon (Feb 2011)

• Next milestone - ph-neutral (May 2011)

Page 43: Penetration Testing Execution Standard

Roadmap

• Catch up on all the “official” news at www.pentest-standard.org

• Volunteer! (we need working hands...)

• Previous milestone - Shmoocon (Feb 2011)

• Next milestone - ph-neutral (May 2011)

• Drop the bomb - BlackHat?