PenTest Proposal
PenTest Proposal
Proposed
By
Farhan Tanvir
We have entered into the digital era. To keep up with the digital world and to serve the people
better the government of Bangladesh is bringing more and more services online. Now more
people are using internet based services which means they are putting more information on the
internet. And if we don’t ensure the security of our information, it might hit us back. We need to
secure our cyberspace otherwise we will be at risk to expose our confidential information both at
government and personal level. The significant increase of cybercrime worldwide also puts us in
risk. There is no absolute security in cyber world, but if we take preventive measures to secure
our internet and web infrastructures, we might mitigate the risk of being attacked significantly.
A Proof of Concept:
As an effort to measure the security of our common online services provided by the government
of Bangladesh, we found numerous vulnerabilities in our web services which might lead us to a
cyber-disaster within a short period of time.
With a little effort any hacker with malicious purpose can access to our services illegally and
gain access to confidential information. As a proof of concept we hacked (with no malicious
purpose) into several government websites and dumped all the databases including education
board, stock exchange, police and Bangabhaban’s website. Any cyber-criminal with a decent
skill can do significant damage to most of the web services provided by government and
humiliate us as a nation.
We will conduct a penetration testing on the top 50 most important government websites to find
the security vulnerabilities and produce detailed reports on our findings. We will make sure that
during our testing no information which is intended to be hidden will not come out in public
from us. We welcome any measure taken by the authority to monitor our effort during the testing
process. And the authority can include or exclude any number of websites from the list of
websites we have chosen initially for penetration testing, but the total number of websites cannot
exceed 50 unless the duration of the project is extended.
Strategy:
We will follow the PTES (Penetration Testing Execution Standard) for this project.
We will use both available open source tools and customized scripts to exploit the holes
according to our search for vulnerabilities.
1. System Exploration:
In this stage we will scan the system to gather information about it. We will also go
through the websites to understand their purpose and later for threat modeling. We will
also identify any visual error related to quality assurance and produce a separate QA
report.
2. Identify Vulnerability:
We will use both automated vulnerability scanner as well as customized scripts to
identify the vulnerabilities in the system. We will also identify the threat level by
analyzing the vulnerabilities.
3. Vulnerability Exploitation:
During this stage we will actually attack the system to exploit the vulnerabilities and try
to compromise the system like the real hackers do. Also we will try to escalate the
privilege level of the compromised system and try to connect back to our system from the
compromised server.
Attack Vector:
Web:
Network:
2. Service Discovery:
Using more intensive scan to find the version of the services we will be able to determine
the common vulnerabilities exploitation. Also we will try to detect the OS fingerprint &
service software version.
3. Bypass firewall:
Different techniques will be used to bypass the firewall rules and establish a connection
to the server.
4. Security Misconfiguration:
Good security requires having a secure configuration defined and deployed for the
application, frameworks, application server, web server, database server, and platform.
Secure settings should be defined, implemented, and maintained, as defaults are often
insecure. Additionally, software should be kept up to date.
2. Nmap:
Nmap ("Network Mapper") is an open source utility for network exploration or security
auditing. It was designed to rapidly scan large networks, although it works fine against
single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are
available on the network, what services (ports) they are offering, what operating system
(and OS version) they are running, what type of packet filters/firewalls are in use, and
dozens of other characteristics.
3. Wireshark:
Wireshark is a free network protocol analyzer for UNIX and Windows. It allows you to
examine data from a live network or from a capture file on disk. You can interactively
browse the capture data, viewing summary and detail information for each packet.
Ethereal has several powerful features, including a rich display filter language and the
ability to view the reconstructed stream of a TCP session.
4. Kali-Linux:
The operating system based on Linux and specially crafted for penetration testing,
previously known as backtrack 5.
5. W3af:
W3af is a Web Application Attack and Audit Framework. The project’s goal is to create a
framework to help you secure your web applications by finding and exploiting all web
application vulnerabilities.
6. SQLmap:
SQLmap is an open source penetration testing tool that automates the process of
detecting and exploiting SQL injection flaws and taking over of database servers. It
comes with a powerful detection engine, many niche features for the ultimate penetration
tester and a broad range of switches lasting from database fingerprinting, over data
fetching from the database, to accessing the underlying file system and executing
commands on the operating system via out-of-band connections.
7. Arachni:
Arachni is an Open Source, feature-full, modular, high-performance penetration testing
framework aimed towards helping penetration testers and administrators evaluate the
security of web applications.
Report Generation:
For every website we will produce 2 reports:
In the penetration testing report we will include every information we could gather about the
website from different sources and detailed explanation about every vulnerability we found, how
we exploited it and what was the impact. We will also put our recommendations on how to
mitigate those errors that caused the vulnerabilities at the first place.
In the QA (Quality Assurance) report we will include all the visual errors like if some links are
not working or spelling mistakes etc.
Expected Outcome:
After successfully completing the penetration test we expect to identify most of the common
vulnerabilities of the hosting servers and the web applications. And if proper steps are taken to
mitigate those vulnerabilities then we can expect our government online services to be safer and
secured.