Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Penetration Testing Anand Sudula, CISA,CISSP SSA Global Technologies, India Anand Sudula, CISA,CISSP SSA Global Technologies, India.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Hands-On Ethical Hacking and Network Defense
Security Controls – What Works
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Network Vulnerability Scanning Xiaozhen Xue Dept. of Computer Science Texas Tech University, USA Akbar Siami Namin Dept. of Computer.
SELECTING AND IMPLEMENTING VULNERABILITY SCANNER FOR FUN AND PROFIT by Tim Jett and Mike Townes.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Network security policy: best practices
Penetration Testing Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA 16802
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
Website Hardening HUIT IT Security | Sep
Performing a Penetration Test.  Penetration Tester  Attempts to reveal potential consequences of a real attack  Security Audit / Vulnerability Assessment.
 Jonathan Trull, Deputy State Auditor, Colorado Office of the State Auditor  Travis Schack, Colorado’s Information Security Officer  Chris Ingram,
SEC835 Database and Web application security Information Security Architecture.
Information Systems Security Computer System Life Cycle Security.
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
AASSA Conference 2012 Quito, Ecuador March 16 th 2012 All the rights reserved.Instructor: Francisco Bolaños, Ing. InterAmerican Academy Ethical Hacking.
Professionalizing Penetration Tests CORE SECURITY TECHNOLOGIES © 2002  Professionalizing Penetration Testing.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Topic 5: Basic Security.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Module 5 – Vulnerability Identification  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
About Us Vulsec’s security experts deliver versatile tactics tailored to arm your IT department in the fight against hackers. We assess your organization.
Computer Security By Duncan Hall.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Role Of Network IDS in Network Perimeter Defense.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Filip Chytrý Everyone of you in here can help us improve online security....
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Security and resilience for Smart Hospitals Key findings
Defining your requirements for a successful security (and compliance
Information Systems Security
CS457 Introduction to Information Security Systems
Professionalizing Penetration Testing
Penetration Testing in Financial Institutions
Topic 5 Penetration Testing 滲透測試
Comprehensive Security and Compliance at an Affordable Price.
Security Testing Methods
Evaluating Existing Systems
Evaluating Existing Systems
Security Engineering.
Security in Networking
COMPTIA CAS-003 Dumps VCE
Myths About Web Application Security That You Need To Ignore.
2018 Latest Eccouncil Exam Questions Answers - Eccouncil Dumps PDF
I have many checklists: how do I get started with cyber security?
National Cyber Security
Learning objectives By the end of this unit you should: Explain
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Ethical Hacker Pro IT Fundamentals Pro
Presentation transcript:

Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential

Content About Docutek The real Difference — We Take Your Security Personally Our mission is to deliver the most comprehensive, accurate, and thorough information security assessments in the industry. We focus exclusively on what we do best — penetration testing and IT security and vulnerability assessments. 2VA PT Approach Confidential

We are certified to do our job! VA PT Approach Confidential3 Certified Penetration Tester CPT Metasploit Penetration Tester Pro HP TippingPoint HP ExpertOne – Cloud Architect HP AppPulse OpenEMR CompTIA Health IT Security + LPT, ENSA, SCUS CEH Certified Ethical Hacker

Content Table of Content 1.Introduction 2.The need for VA - PT 3.What is VA - PT 4.Typical Approaches 5.Methodology 6.Challenges 4VA PT Approach Confidential

Content Introduction 5VA PT Approach Confidential Introduction

6VA PT Approach Confidential

7

8

Before you start Business Associate – Compliance BA Risk Analysis – Always Insurance – Just in case (CyberEdge AIG) Contract – Peace of mind Alliances – Do not go in alone VA PT Approach Confidential9

To improve information security awareness To assess risk To mitigate risk immediately To reinforce the information security process To assist in decision making processes To Validate that current security mechanisms are working Compliance to various security standards and regulations such as ISO 27001, IT ACT 2000, SOX, HIPAA, PCI, etc VA PT Approach Confidential10 Need for VA – PT Highest Security Risk

VA PT Approach Confidential11 Hospitals and Medical Devices Found Prone To Hacking Due To Network Security Flaw Thousands of healthcare organizations around the world, along with the medical devices and equipment that connect to their systems, are leaving themselves open to cyber attacks because of a crucial mis-configuration of a network security protocol.

What is VA – PT ? A form of Stress testing, which exposes weaknesses or flaws in a computer system Art of finding an Open door A valued Assurance Assessment tool PT can be used to find Flaws in – Specifications, Architecture, Implementation, Software, Hardware, And many more……………… Vulnerability assessment is the process of identifying and quantifying vulnerabilities in a system. A vulnerability assessment is what most companies generally do, as the systems they are testing are live production systems and can’t afford to be disrupted by active exploits which might crash the system. VA PT Approach Confidential12

Typical Approach Typical Approach – It is also know as “complete knowledge” testing WHITEBOX Testing BLACKBOX Testing VA PT Approach Confidential13

WHITEBOX Testing It is also known as “complete knowledge” testing Testers are given full information about the target system they are supposed to attack Information TESTING includes: Technology overviews Data flow & Network diagrams Code snippets Benefits: Reveals more vulnerabilities and may be faster Compared to replicate an attack from a criminal hacker that knows the company infrastructure very well This hacker may be an employee of the company itself, doing an internal attack VA PT Approach Confidential14

BLACKBOX Testing The tester simulates an inside Employee. The tester is given an account on the internal network and standard access to the network. This test assesses internal threats from employees within the Company. The relative merits of all these approaches are debatable. In most cases it is preferable to assume a worst-case scenario and provide the testers with as much information as they require, assuming that any determined attacker would already have acquired this. VA PT Approach Confidential15

Penetration Process Cycle - PPC VA PT Approach Confidential16

Methodology 1.Scope / Goal Definition 2.Information Gathering 3.Information Analysis & Planning 4.Vulnerability Detection 5.Attack & Penetration / Privilege Escalation 6.Result Analysis & Reporting 7.Clean Up VA PT Approach Confidential17

VA PT Approach Confidential18

1. Scope/Goal Definition Which attacker profile the tester will use Hacker with no knowledge about the target Hacker with knowledge about the target Internet user with access Which System or network the test will be conducted Duration of Test VA PT Approach Confidential19

VA PT Approach Confidential20

2. Information Gathering Information about the Target Who is: ARIN ; RIPE ; APNIC Google: General Information; Financial, Phone Book, Google Hacking Databases; Web Searching DNS Retrieval, SOA Record, MX Records, NS Records, A Records etc. Tools / Websites: Cheops-ng, Sam Spade, Social Engineering Dumpster Diving Web Site Copy VA PT Approach Confidential21

VA PT Approach Confidential22

3. Vulnerability Detection Manual Detection Manually probe the target host from common mis- configuration or flaws because a vulnerability scanner can fail to identify certain vulnerabilities. Ex: Database configuration etc…. – Open TCP Ports – Closed TCP Ports – Open UDP Ports – Closed UDP Ports – Service Probing VA PT Approach Confidential23

VA PT Approach Confidential24

4. Information Analysis & Planning – Collating the information gathered in previous stages. – Preparation of High level attack planning. Overall Approach Target identification VA PT Approach Confidential25

VA PT Approach Confidential26

5. Penetration & Privilege Escalation HAS Two Sub Stages Attack & Penetration – Known / available exploit selection – Tester acquires publicly available s/w for exploiting. – Exploit customization – Customize exploits s/w program to work as desired. – Exploit development – Develop own exploit if no exploit program available – Exploit testing – Exploit must be tested before formal Test to avoid damage. – Attack – Use of exploit to gain unauthorized access to target. VA PT Approach Confidential27

VA PT Approach Confidential28

Penetration & Privilege Escalation Privilege Escalation – What can be done with acquired access / privileges Alter Damage What not VA PT Approach Confidential29

VA PT Approach Confidential30

6. Result Analysis & Reporting Organize Data/related results for Management Reporting Consolidation of Information gathered Analysis and Extraction of General conclusions Recommendations VA PT Approach Confidential31

VA PT Approach Confidential32

7. Cleanup – Cleaning of all that has been done during the testing Any System alterations Exploits VA PT Approach Confidential33

Challenges Quality & Experience of Pen Testers Quality & Effectiveness of Tools Usage of Globally Accepted Methodology such as OSSTMM, OWASP etc Ensuring all the findings are reported to the Management Follow stringent program to Fix Vulnerabilities Conduct Periodic Testing VA PT Approach Confidential34

VA PT Approach Confidential35 DOCUTEK 7000 N Plaza Austin, TX USA