WM4
WM4
2
Before We Get Started
♦ My Background:
– In The IT Field for 22 Years – Security for About 16
– Currently President & CEO of Privisec, Inc.
– Previously President and CEO of PoliVec, Inc.
– Before That, SVP and CTO of Trident Data Systems
– Academic Credentials:
• Doctorate in Computer Science From Colorado Technical University,
Masters and Bachelors Degrees in Computers as Well…So I’m a
Geek…And, Remember: Geek is Sheik!
• CISSP Since Forever as Well
– Other Information:
• Technical Editor for Business Security Advisor Magazine, Formally
Internet Security Advisor Magazine
• Numerous Publications, Conferences, etc.
3
Ethical Hacking:
An Assessment Mechanism
Why Penetration Testing?
♦ Taking a Look at the Environment
Airline Netware and Dial-up Dial-in – Used remote Complete system Dial-in Yes. Commercial firewall
Connections control program to access to entire installed on a Windows
connect to a Novell client Network: File NT Server.
machine without any
Servers, Mail
authentication. Client
had an active session on a Servers, Applications
network server. Using a Servers, Database
Novell default account Servers, and Personal
gained full system Workstations.
privileges.
43
More Penetrations
Industry Type of Attack Penetration Method Level of Access Vulnerability Firewall Installed
Publishing NIS Vulnerability Internet and Dial-in - Complete system Vulnerability on Yes. Commercial firewall
Exploited a known access to internal an exposed installed on a UNIX
vulnerability on an networks. UNIX server to Server.
exposed UNIX server to gain access via
gain access via Internet. internet.
Penetrated a client PC
running Windows 95 via
modem access using
remote control software,
and a UNIX host via a
terminal program and a
default account. Gained
root access by exploiting
a known vulnerability.
44
Penetration Tests: Lessons
♦ In Each Case, the Penetration Could Have Been
Prevented IF:
– A Comprehensive Security Policy had Been
Implemented Across the Enterprise
– Good Systems Administration Practices Were Utilized
– A More Proactive Security Process was in Place
• Security Audits and/or Assessments
• Investment in Security Assessment Technology
• Better User Security Education and Awareness
• Minimal Incident Response Capability
Conclusions
♦ Penetration Testing Can Be Used to Significantly
Improve Your Security Posture
♦ A Reasonably Secure Infrastructure is Achievable
– Must View Security as a Process, Not a Project
– Embrace Technology and Use it!
– Be Consistent Throughout the Enterprise
– Consider the Entire Business Process, Not Just the
Transaction Component
719.651.6651 (Phone)
719.495.8532 (Fax)
[email protected]
www.privisec.com