Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability...

18
Security Testing Vulnerability Assessment vs Penetration Testing Gabriel Mihai Tanase, Director KPMG Romania 29 October 2014

Transcript of Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability...

Page 1: Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response

Security Testing

Vulnerability Assessment vs

Penetration Testing

Gabriel Mihai Tanase, Director

KPMG Romania

29 October 2014

Page 2: Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response

2©2014 KPMG Romania SRL, a Romanian limited liability company and a member firm of the KPMG network of independent member firms affiliated

with KPMG International Cooperative("KPMG International"), a Swiss entity. All rights reserved. PDC no.8229.

Agenda

What is…?

Vulnerability Assessment

Penetration Testing

Acting as Conclusion

Page 3: Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response

3©2014 KPMG Romania SRL, a Romanian limited liability company and a member firm of the KPMG network of independent member firms affiliated

with KPMG International Cooperative("KPMG International"), a Swiss entity. All rights reserved. PDC no.8229.

What is …?

Vulnerability Assessment

“A vulnerability assessment is the

process of identifying, quantifying,

and prioritizing (or ranking) the

vulnerabilities in a system”

Penetration Testing

“A penetration test is a method of

evaluating the computer security of a

computer system or network by

simulating an attack from malicious

outsiders and malicious insiders”

Definitions by Wikipedia

Page 4: Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response

4©2014 KPMG Romania SRL, a Romanian limited liability company and a member firm of the KPMG network of independent member firms affiliated

with KPMG International Cooperative("KPMG International"), a Swiss entity. All rights reserved. PDC no.8229.

Vulnerability Assessment

Page 5: Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response

5©2014 KPMG Romania SRL, a Romanian limited liability company and a member firm of the KPMG network of independent member firms affiliated

with KPMG International Cooperative("KPMG International"), a Swiss entity. All rights reserved. PDC no.8229.

Vulnerability Assessment

Automated tool that finds vulnerabilities in the running application by

interacting with it

Web application scanners

General vulnerability scanners (OS, databases, services, network)

Send requests and compare the response against a database of signatures

False positives, false negatives

Must be fine tuned to produce good results

Page 6: Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response

6©2014 KPMG Romania SRL, a Romanian limited liability company and a member firm of the KPMG network of independent member firms affiliated

with KPMG International Cooperative("KPMG International"), a Swiss entity. All rights reserved. PDC no.8229.

Example: Vulnerability Assessment

Page 7: Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response

7©2014 KPMG Romania SRL, a Romanian limited liability company and a member firm of the KPMG network of independent member firms affiliated

with KPMG International Cooperative("KPMG International"), a Swiss entity. All rights reserved. PDC no.8229.

Penetration Testing

Page 8: Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response

8©2014 KPMG Romania SRL, a Romanian limited liability company and a member firm of the KPMG network of independent member firms affiliated

with KPMG International Cooperative("KPMG International"), a Swiss entity. All rights reserved. PDC no.8229.

Penetration Testing

Related terms:

Penetration testing (RO: teste de penetrare,

Pentesting teste de intruziune)

Ethical hacking

Tiger Teaming

Red Teaming

Penetration testing is:

authorized

adversary-based

ethical (for defensive purposes)

Page 9: Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response

9©2014 KPMG Romania SRL, a Romanian limited liability company and a member firm of the KPMG network of independent member firms affiliated

with KPMG International Cooperative("KPMG International"), a Swiss entity. All rights reserved. PDC no.8229.

Penetration Testing types

According to attacker’s

location:

According to attacker’s

initial information:

External pentest

Internal pentest

Black box test

Gray box test

White box test

Simulated threats

Hackers, corporate espionage,

terrorists, organized crime

Malicious employee, collaborator,

consultant, visitor

Hackers, organized crime, terrorists,

visitors

Consultants, corporate espionage,

business partner, regular employees

Malicious system administrators,

developers, consultants

Test type

According to the attacks performed: - pure technical

- social engineering

- denial of service

- source code review.

Page 10: Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response

10©2014 KPMG Romania SRL, a Romanian limited liability company and a member firm of the KPMG network of independent member firms affiliated

with KPMG International Cooperative("KPMG International"), a Swiss entity. All rights reserved. PDC no.8229.

Penetration Testing - Objectives and Targets

External penetration test:

Test the security of internet banking / mobile banking apps

Evaluate the security of internet facing applications

Perform fraudulent transactions in online shops

Access personal data in online medical applications

Gain physical access to company building and install rogue access point

Internal penetration test:

Obtain access to database server containing customer information

Gain control of Active Directory

Obtain administrative access to ERP application

Gain access to company assets (sensitive files, project plans, intellectual property)

Page 11: Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response

11©2014 KPMG Romania SRL, a Romanian limited liability company and a member firm of the KPMG network of independent member firms affiliated

with KPMG International Cooperative("KPMG International"), a Swiss entity. All rights reserved. PDC no.8229.

Penetration Testing - By example

Insufficient input

validation

Insecure session

configuration

Application logic

flaws

Insecure server

configuration

Internet

Banking

application

External attacker

- hacker

- industrial espionage

- organized crime

Internal attacker

- malicious employee

- collaborator

- consultant

- visitor

Threats Vulnerabilities RisksAssets

Vulnerable?

Exploitable?

SQL injection

OS command

execution

Authentication

bypass

Cross Site

Scripting

Password

autocomplete

Directory

browsing

H

H

H

M

M

L

Page 12: Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response

12©2014 KPMG Romania SRL, a Romanian limited liability company and a member firm of the KPMG network of independent member firms affiliated

with KPMG International Cooperative("KPMG International"), a Swiss entity. All rights reserved. PDC no.8229.

Example (1): Application logic flaw

Page 13: Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response

13©2014 KPMG Romania SRL, a Romanian limited liability company and a member firm of the KPMG network of independent member firms affiliated

with KPMG International Cooperative("KPMG International"), a Swiss entity. All rights reserved. PDC no.8229.

Example (2): Gaining root access

Page 14: Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response

14©2014 KPMG Romania SRL, a Romanian limited liability company and a member firm of the KPMG network of independent member firms affiliated

with KPMG International Cooperative("KPMG International"), a Swiss entity. All rights reserved. PDC no.8229.

Acting as Conclusion

Page 15: Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response

15©2014 KPMG Romania SRL, a Romanian limited liability company and a member firm of the KPMG network of independent member firms affiliated

with KPMG International Cooperative("KPMG International"), a Swiss entity. All rights reserved. PDC no.8229.

Automated vs. Manual

Vulnerability Assessment: Automated testing:

Configure scanner

Run scanner & wait for results

Validate findings where possible

Deliver report to client

Penetration Testing: Manual testing:

Use tools as helpers only

Validate findings by exploitation (no false positives)

Dig for sensitive data, escalate privileges, gain access to other systems

Model and simulate real threats: simulate attacker’s way of thinking, consider attacker’s resources, knowledge, culture, motivation

Several manual tests for exploitation of specific vulnerabilities

Strict control, logging, quick feedback

Interpret the findings according to business impact

Page 16: Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response

16©2014 KPMG Romania SRL, a Romanian limited liability company and a member firm of the KPMG network of independent member firms affiliated

with KPMG International Cooperative("KPMG International"), a Swiss entity. All rights reserved. PDC no.8229.

Limitations

Timeframe

Budget

Resources

Personnel awarenessKnown

Vulnerabilities

All software

vulnerabilities

Vulnerability Assessment

Discover “potential” vulnerabilities

on large number of servers.

Penetration Testing

Test a “real life” scenario: what is a

hacker looking for?

Page 17: Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response

17©2014 KPMG Romania SRL, a Romanian limited liability company and a member firm of the KPMG network of independent member firms affiliated

with KPMG International Cooperative("KPMG International"), a Swiss entity. All rights reserved. PDC no.8229.

Standards, Certifications and Knowledge

Security testing standards:

OSSTMM - Open Source Security Testing Methodology Manual

NIST 800-42 - The National Institute of Standards and Technology Special Publication

OWASP - The Open Web Application Security Project

Certifications:

Offensive Security OSCE, OSCP, OSWP

ISECOM OPST

SANS GPEN, GWAPT

EC-Council LPT, CEH

CHECK Team Leader, Team Member

CREST Registered Tester, Certified Tester

Knowledge:

System administration

Network administration

Software development

Quality assurance / software testing

Page 18: Penetration Testing Services - Cyber Security Day · Web application scanners General vulnerability scanners (OS, databases, services, network) Send requests and compare the response

Thank you!

Questions?

Gabriel Mihai Tanase, KPMG Director

[email protected]