penetration testing

14
Penetration Testing Matthew Leonard Troy Matthews COP4910

Upload: madrona-escovado

Post on 31-Dec-2015

54 views

Category:

Documents


1 download

DESCRIPTION

Penetration Testing. Matthew Leonard Troy Matthews COP4910. Overview. Vulnerability Testing How Vulnerability Scans Work What is Penetration Testing? Comparing The Two Need for Pen-Testing Process For Pen-Testing Planning Discovery Attack Reporting. Vulnerability Assessment. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Penetration Testing

Penetration Testing

Matthew LeonardTroy MatthewsCOP4910

Page 2: Penetration Testing

OverviewVulnerability TestingHow Vulnerability Scans WorkWhat is Penetration Testing?Comparing The TwoNeed for Pen-TestingProcess For Pen-Testing

◦Planning◦Discovery◦Attack◦Reporting

Page 3: Penetration Testing

Vulnerability AssessmentAka VulnScanAble to detect vulnerabilities on a

wide range of systemsAssessments conducted through

Vulnerability ScansNon-intrusiveReport focus on what

vulnerabilities exist and how they can be mitigated

Page 4: Penetration Testing

How do Vulnerability Scans work?Uses a database of well know

exploitsBegins with a specified range of

hostsDetects open TCP and UDP ports

within range, and determine which services are running on each host

Runs vulnerability checks based on the information gathered for each host

Creates report of exploitable vulnerabilities and remediation steps

Page 5: Penetration Testing

What is Penetration Testing?Aka PenTestingEvaluate security Simulating an attack against a

vulnerabilityCompromises systems to show

potential threatsReports focus on what data was

compromised and how

Page 6: Penetration Testing

VulnScan vs. PenTest

Vulnerability Scan

Penetration Test

How often to run

Monthly; before equipment is added to a network

Yearly

Reports Comprehensive list of vulnerabilities for each host. Remediation steps

Identifies what data was compromised and how

Performed by

In house staff Independent outside service

Page 7: Penetration Testing

Need for Pen-testingData is a company’s most

important assetPerform external security checkIdentify holes in systemHelps justify need to fixFix before system goes live

Page 8: Penetration Testing

Process of Pen-testing

Page 9: Penetration Testing

PlanningRules for testingFinal management approvalTesting goals are setNo testing occurs in this stage

Page 10: Penetration Testing

DiscoveryStarts actual system testingPort ScanningVulnerability analysisSystem is compared against

vulnerability databasesAutomated scanner can do this

Page 11: Penetration Testing

AttackExploit vulnerabilities found from

testsExploits fall into several

categoriesKernel FlawsBuffer OverflowsRace ConditionsTrojansSocial Engineering

Page 12: Penetration Testing

ReportingOccurs simultaneously with other

phasesTest plans, permission, rules of

engagement (Planning)Written logs, description of

vulnerabilities, risk ratings, (optional) guidance to fix (Discovery)

Attack results, how it was done, impact on system (Attack)

Page 13: Penetration Testing

Referenceshttp://www.pentest.com/overviewMesoploit Attacks by David

Kennedywww.offensive-security.com/

pentest

Page 14: Penetration Testing

Penetration Testing

Matthew LeonardTroy MatthewsCOP4910