Chapter 12 - The Pen Test, Putting it all Together Flashcards
Security Assessment
any test performed to assess the level of security on an network or system
3 categories of security assessments
security audit
vulnerability assessment
penetration test
Security Audit
policy and procedure focused
tests whether the organization is following specific standards and policies they have in place
Vulnerability assessment
scans and tests a system or network for existing vulnerabilities but doesn’t exploit them
Penetration test
searches for vulnerabilities and actively seeks to exploit them
must have an agreement in place before testing begins
agreement should spell out limitations, constraints, liabilities, between organization and the pen test team. A separate indemnity form releasing you from financial liability is also necessary (ie what if port scanner accidentally takes down server)
Exam Tip, know Shellshock vulnerability
aka Bashdoor, Bash Bug, CVE-2014-6271
affected Bash shell found in most versions of Linux, Unix and Mac OS X. Also some linux-based routers with CGI-enabled web interface
External assessment
analyzes publicly available information, performs network scanning, enumeration and testing from the network perimeter. Usually the internet
Internal assessment
performed from inside the organization
define black, white, gray box testing
black - no knowledge of infrastructure. simulates outside hacker
white - complete knowledge of infrastructure. simulates insider
gray - soem information on infrastructure
red team
offense, hacking group, black box style with no knowledge
blue team
defensive team
automated testing
codenomicon
core impact pro
metasploit (with Autopwn module)
CANVAS
point and shoot with all inclusive tool set like Core Impact
can save time and money, but prone to false positives and negatives, doesn’t necessarily care about your scope agreement
3 phases of a pen test
pre-attack
attack
post-attack
pre-attack phase
reconnaissance and data gathering
ID network ranges, DNS enumeration, IP ranges, nmap network scanning, test proxy servers, checking for firewalls
attack phase
attempt to penetrate network perimeter, acquire targets, execute attacks, elevate privileges
verify ACL’s by crafting packets, seeing if you can use covert tunnels, trying XSS, buffer overflows, SQL injections, password cracking,