risk (vulnerability) assessment & penetration test approach 1va pt approach confidential

35
(Vulnerability) Assessment & Penetrati h 1 VA PT Approach Confidential

Upload: matilda-owen

Post on 29-Jan-2016

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 1

Risk (Vulnerability) Assessment & Penetration Test

Approach

Page 2: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 2

Content

About Docutek The real Difference — We Take Your Security Personally

Our mission is to deliver the most comprehensive, accurate, and thorough information security assessments in the industry. We focus exclusively on what we do best — penetration testing and IT security and vulnerability assessments.

Page 3: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 3

We are certified to do our job!

Certified Penetration Tester CPTMetasploit Penetration Tester ProHP TippingPointHP ExpertOne – Cloud ArchitectHP AppPulseOpenEMRCompTIA Health ITSecurity +LPT, ENSA, SCUSCEH Certified Ethical Hacker

Page 4: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 4

ContentTable of Content1. Introduction2. The need for VA - PT3. What is VA - PT4. Typical Approaches5. Methodology6. Challenges

Page 5: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 5

Content

Introduction

Introduction

Page 6: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 6

Page 7: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 7

Page 8: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

8VA PT Approach Confidential

Page 9: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 9

Before you start

• Business Associate – Compliance• BA Risk Analysis – Always• Insurance – Just in case (CyberEdge AIG)• Contract – Peace of mind• Alliances – Do not go in alone

Page 10: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 10

• To improve information security awareness 

• To assess risk 

• To mitigate risk immediately 

• To reinforce the information security process 

• To assist in decision making processes 

• To Validate that current security mechanisms are working 

• Compliance to various security standards and regulations such as ISO 27001, IT ACT 2000, SOX, HIPAA, PCI, etc 

Need for VA – PTHighest Security Risk

Page 11: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 11

Hospitals and Medical Devices Found Prone To Hacking Due To Network Security FlawThousands of healthcare organizations around the world, along with the medical devices and equipment that connect to their systems, are leaving themselves open to cyber attacks because of a crucial mis-configuration of a network security protocol.

Page 12: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 12

What is VA – PT ?• A form of Stress testing, which exposes weaknesses or flaws in a computer system

• Art of finding an Open door

• A valued Assurance Assessment tool

• PT can be used to find Flaws in

– Specifications, Architecture, Implementation, Software, Hardware, And many more………………

• Vulnerability assessment is the process of identifying and quantifying vulnerabilities in a system. A vulnerability assessment is what most companies generally do, as the systems they are testing are live production systems and can’t afford to be disrupted by active exploits which might crash the system.

Page 13: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 13

Typical Approach 

•    Typical Approach – It is also know as “complete knowledge” testing

• WHITEBOX Testing

• BLACKBOX Testing

Page 14: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 14

WHITEBOX Testing

It is also known as “complete knowledge” testing Testers are given full information about the target system they are supposed to attack Information

TESTING includes: • Technology overviews• Data flow & Network diagrams• Code snippets

Benefits:• Reveals more vulnerabilities and may be faster• Compared to replicate an attack from a criminal hacker that knows the company infrastructure very well• This hacker may be an employee of the company itself, doing an internal attack

Page 15: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 15

BLACKBOX Testing

• The tester simulates an inside Employee. The tester is given an account on the internal network and standard access to the network. This test assesses internal threats from employees within the Company.

• The relative merits of all these approaches are debatable.

• In most cases it is preferable to assume a worst-case scenario and provide the testers with as much information as they require, assuming that any determined attacker would already have acquired this.

Page 16: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 16

Penetration Process Cycle - PPC

Page 17: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 17

Methodology

1. Scope / Goal Definition 2. Information Gathering 3. Information Analysis & Planning 4. Vulnerability Detection 5. Attack & Penetration / Privilege Escalation 6. Result Analysis & Reporting 7. Clean Up

Page 18: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 18

Page 19: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 19

1. Scope/Goal Definition

Which attacker profile the tester will use

• Hacker with no knowledge about the target

• Hacker with knowledge about the target

• Internet user with access

Which System or network the test will be conducted

Duration of Test

Page 20: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 20

Page 21: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 21

2. Information Gathering 

Information about the Target

• Who is: ARIN ; RIPE ; APNIC

• Google: General Information; Financial, Phone Book, Google Hacking Databases; Web Searching

• DNS Retrieval, SOA Record, MX Records, NS Records, A Records etc.

• Tools / Websites: Cheops-ng, Sam Spade, www.dnstuff.com

• Social Engineering

• Dumpster Diving • Web Site Copy

Page 22: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 22

Page 23: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 23

3. Vulnerability Detection 

Manual Detection

• Manually probe the target host from common mis-configuration or flaws because a vulnerability scanner can fail to identify certain vulnerabilities.

Ex: Database configuration etc…. – Open TCP Ports – Closed TCP Ports – Open UDP Ports

– Closed UDP Ports – Service Probing

Page 24: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 24

Page 25: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 25

4. Information Analysis & Planning 

– Collating the information gathered in previous stages.

– Preparation of High level attack planning.

• Overall Approach • Target identification

Page 26: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 26

Page 27: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 27

5. Penetration & Privilege Escalation

• HAS Two Sub Stages• Attack & Penetration

– Known / available exploit selection – Tester acquires publicly available s/w for exploiting.

– Exploit customization – Customize exploits s/w program to work as desired.

– Exploit development – Develop own exploit if no exploit program available

– Exploit testing – Exploit must be tested before formal Test to avoid damage.

– Attack – Use of exploit to gain unauthorized access to target.

Page 28: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 28

Page 29: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 29

Penetration & Privilege Escalation

• Privilege Escalation

– What can be done with acquired access / privileges

• Alter

• Damage

• What not

Page 30: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 30

Page 31: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 31

 6. Result Analysis & Reporting

• Organize Data/related results for Management Reporting

• Consolidation of Information gathered

• Analysis and Extraction of General conclusions

• Recommendations

Page 32: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 32

Page 33: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 33

7. Cleanup 

– Cleaning of all that has been done during the testing

• Any System alterations

• Exploits

Page 34: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 34

Challenges

• Quality & Experience of Pen Testers

• Quality & Effectiveness of Tools

• Usage of Globally Accepted Methodology such as OSSTMM, OWASP etc

• Ensuring all the findings are reported to the Management

• Follow stringent program to Fix Vulnerabilities

• Conduct Periodic Testing

Page 35: Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

VA PT Approach Confidential 35

DOCUTEK 7000 N Plaza Austin, TX 78753 USAwww.docutekservices.comosanchez@docutekservices.com787.407.9074