penetration testing training day penetration testing methodology mike westmacott,security consultant...

16
Penetration Testing Training Day Penetration Testing Methodology Mike Westmacott,Security Consultant IRM plc, Chair BCS YPISG Supported by

Upload: annabel-horn

Post on 17-Dec-2015

227 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Penetration Testing Training Day Penetration Testing Methodology Mike Westmacott,Security Consultant IRM plc, Chair BCS YPISG Supported by

Penetration Testing Training Day

Penetration Testing Methodology

Mike Westmacott,Security Consultant IRM plc, Chair BCS YPISG

Supported by

Page 2: Penetration Testing Training Day Penetration Testing Methodology Mike Westmacott,Security Consultant IRM plc, Chair BCS YPISG Supported by

How it used to be

•http://youtu.be/AByemfK_qD4

Page 3: Penetration Testing Training Day Penetration Testing Methodology Mike Westmacott,Security Consultant IRM plc, Chair BCS YPISG Supported by

The Russian Business Networkis a multi-faceted cybercrime organization,specializing in andin some cases monopolizingpersonal identity theft for resale.

How it is now

Page 4: Penetration Testing Training Day Penetration Testing Methodology Mike Westmacott,Security Consultant IRM plc, Chair BCS YPISG Supported by

Presentation to insert name here 4

Threats and Threats

From BAU•Activities that form part of a business create arisk to the organisation•Internal (process) and external (product)•Threat actor unknown

Specific Threats•APTs

Incident Response•Capture evidence•Document and eliminate threat

Page 5: Penetration Testing Training Day Penetration Testing Methodology Mike Westmacott,Security Consultant IRM plc, Chair BCS YPISG Supported by

Presentation to insert name here 5

APTs – real threats

Page 6: Penetration Testing Training Day Penetration Testing Methodology Mike Westmacott,Security Consultant IRM plc, Chair BCS YPISG Supported by

Presentation to insert name here 6

Incident Response

Page 7: Penetration Testing Training Day Penetration Testing Methodology Mike Westmacott,Security Consultant IRM plc, Chair BCS YPISG Supported by

Presentation to insert name here 7

Hacking As Profession

Legitimacy is keyPermission is essentialDamage is not an objectiveProvide a serviceImprove industry

Page 8: Penetration Testing Training Day Penetration Testing Methodology Mike Westmacott,Security Consultant IRM plc, Chair BCS YPISG Supported by

Presentation to insert name here 8

The Engagement Lifecycle

Client understands they need to gauge riskRequests tenders from consultanciesSelects security providerScope of work is determinedTesting performedReport writtenClient debriefed

Page 9: Penetration Testing Training Day Penetration Testing Methodology Mike Westmacott,Security Consultant IRM plc, Chair BCS YPISG Supported by

Presentation to insert name here 9

Job Scoping

•What risks concern the client?•PII, PCI, reputational…•What assets are there?•How do they fit into to business?

Page 10: Penetration Testing Training Day Penetration Testing Methodology Mike Westmacott,Security Consultant IRM plc, Chair BCS YPISG Supported by

Presentation to insert name here 10

Project Management

Multiple clients, multiple consultantsVaried job locationsClearance requirementsTechnical requirementsCertification requirementsResource allocation is difficult

Page 11: Penetration Testing Training Day Penetration Testing Methodology Mike Westmacott,Security Consultant IRM plc, Chair BCS YPISG Supported by

Presentation to insert name here 11

Testing - Onsite

The fun begins! …. Well…Pre-engagement discussions?Are pre-requisites in place?Where’s the site?Where’s the system?Is it ready to test?Where do I eat?Where are the loos?

Page 12: Penetration Testing Training Day Penetration Testing Methodology Mike Westmacott,Security Consultant IRM plc, Chair BCS YPISG Supported by

Presentation to insert name here 12

Testing - Onsite

Finally! Laptop out :)Stop – look aroundTesting should be discreteCheck the findingsRecord them in a logVerify them againCapture evidenceDon’t get too excited…

Page 13: Penetration Testing Training Day Penetration Testing Methodology Mike Westmacott,Security Consultant IRM plc, Chair BCS YPISG Supported by

Presentation to insert name here 13

Discussing Findings

Softly softly catchy monkeyTake care not to insult anyoneDevelopers take great pride in their workYou may have just destroyed itThey have to fix itNow you’re not friendsAnd you’re there all week

Page 14: Penetration Testing Training Day Penetration Testing Methodology Mike Westmacott,Security Consultant IRM plc, Chair BCS YPISG Supported by

Presentation to insert name here 14

Client Debriefing

Discuss findingsHigh risk issues?Who is attending?Are there process issues?Development problems?Chance to upsell!RetestsSecure code reviews

Page 15: Penetration Testing Training Day Penetration Testing Methodology Mike Westmacott,Security Consultant IRM plc, Chair BCS YPISG Supported by

Presentation to insert name here 15

Report Writing

Write the report whilst testingNever enough timeBe succinctProvide detailed stepsShow evidenceGive recommendationsResearch referencesExecutive summaryIt’s what clients pay for

Page 16: Penetration Testing Training Day Penetration Testing Methodology Mike Westmacott,Security Consultant IRM plc, Chair BCS YPISG Supported by

Presentation to insert name here 16

QA, Delivery, and Closure

Peer review of work producedKey to good qualityJunior staff review firstSenior staff review lastReport is finalised to prevent tamperingIssued securely – sensitive!Ensure records of work are maintained