Lecture 2 - Penetration Testing, Rules of Engagement and Vulnerability Scanning
Lecture 2 - Penetration Testing, Rules of Engagement and Vulnerability Scanning
1 2 3 4
1.Understand 2. Identify the 3. Understand 4. Understand
what a rules of Vulnerability Different
Penetration test is engagement and scanning vulnerability
how to perform a resources
pen test
Studying penetration testing
involves:
Defining what it is and why
such a test should be conducted
Penetration
Examining who should perform
Testing
the tests and the rules for
engagement
Knowing how to perform a
penetration test
Penetration testing attempts to exploit
vulnerabilities in order to help:
Uncover new vulnerabilities
Provide a clearer picture of their nature
Determine how they could be used against
Defining the organization
Penetration The most important element in a “pen test” is the
first step: planning
Testing
A lack of planning can result in creep, which
is an expansion beyond the initial set of the
test’s limitations
The most dangerous result of poor planning
is creating unnecessary legal issues
Internal Security Personnel
Advantages to using internal employees
include:
There is little or no additional cost
The test can be conducted much more
quickly
Who should An in-house pen test can be used to
enhance the training of employees and
perform the test raise the awareness of security risks
Disadvantages of using internal security
employees:
Inside knowledge
Lack of expertise
Reluctance to reveal
External Pen Tester Consultants
Contracting with an external pen testing
consultant offers the following advantages:
Expertise
Credentials
Experience
Focus
Who should
A disadvantage of using external consultants
perform the test (2) is the usage of the information uncovered
A contractor who conducts a pen test
learns all about an organization’s
network and may receive extremely
sensitive information about systems and
how to access them
This knowledge could be sold to a
competitor
Crowdsourced Pen Testers
A bug bounty is a monetary reward given
for uncovering a software vulnerability
Bug bounty programs take advantage of
crowdsourcing, which involves obtaining
input into a project by enlisting the services
of many people through the internet
Who should Advantages of crowdsourced pen testers
perform the test (3) include the following:
Faster testing, resulting in quicker
remediation of vulnerabilities
Ability to rotate teams so different
individuals test the system
Option of conducting multiple pen tests
simultaneously
Rules of engagement in a penetration test
are its limitations or parameters
Categories for rules of engagement are:
Timing
Rules of Scope
Authorization
Engagement
Exploitation
Communication
Cleanup
Reporting
Timing
The timing parameter sets when the
testing will occur
Some considerations include: the start
and stop dates of the test and should the
active portions of the pen test be
conducted during normal business hours
Rules of Scope
Engagement (2) Scope involves several elements that
define the relevant test boundaries:
Environment
Internal targets
External targets
Target locations
Other boundaries
Authorization
Authorization is the receipt of prior written approval to
conduct the pen test
A formal written document must be signed by all
parties before a pen test begins
Exploitation
Correlation
SIEM Dashboard
SIEMS can also perform sentiment analysis,
which is the process of computationally identifying
and categorizing opinions to determine the writer’s
attitude toward a particular topic
Sentiment analysis has been used when
tracking postings threat actors make in
discussion forums with other attackers to better
Data Management determine the behavior and mindset of threat
actors
Tool (2)
Security Orchestration, Automation, and Response
(SOAR)
A SOAR is similar to a SIEM in that it is
designed to help security teams manage and
respond to security warnings and alarms
SOARs combine more comprehensive data
gathering and analytics to automate incident
responses
Threat hunting is proactively searching for cyber
threats that thus far have gone undetected in a
network
It begins with a critical premise: threat actors
have already infiltrated our network
It proceeds to find unusual behavior that may
indicate malicious activity
Threat hunting investigations often use
Threat Hunting crowdsourced attack data such as:
Advisories and bulletins
Cybersecurity threat feeds – data feeds of
information on the latest threats
Information from a fusion center – a formal
repository of information from enterprises and
the government used to share information on
the latest attacks
External cybersecurity resources are
available to organizations:
Frameworks
Regulations
Cyber Security
Legislation
Resources
Standards
Benchmarks/secure configuration
guides
Information sources
A cybersecurity framework is a series of
documented processes used to define policies and
procedures for implementing and managing
security controls in an enterprise environment
The most common frameworks are from the:
National Institute of Standards and Technology
(NIST)
Frameworks
International Organization for Standardization
(ISO)
American Institute of Certified Public
Accountants (AICPA)
Center for Internet Security (CIS)
Cloud Security Alliance (CSA)
Frameworks
NIST FRAMEWORK
The process of adhering to regulations is
called regulatory compliance
Broadly applicable
regulations
Industry-specific
Sample of cybersecurity regulations
regulations categories: U.S. state regulations
International
regulations
Specific legislation can also These include
national,
be enacted by governing territorial, and
bodies state laws
Legislations
Due to a lack of
comprehensive federal
regulations for data breach No two state
notification, many states laws are the
have amended their breach same
notification laws from the
basic definitions
A standard is a It provides for
framework, rules,
document approved guidance, or
characteristics for
through consensus by products or related
a recognized processes and
production
standardization body methods
Standards
One cybersecurity standard is the
Payment Card Industry Data Security
Standard (PCI DSS
Benchmark/secur Usually, they are Guides are
Benchmarks & e configuration
guides are usually
platform/vendor-
specific guides
available for:
Ukeje, N., Gutierrez, J., & Petrova, K. (2024). Information security and privacy challenges of cloud
computing for government adoption: a systematic review. International Journal of Information
Security, 1-17.
Ali, A. S., Zaaba, Z. F., & Singh, M. M. (2024). The rise of “security and privacy”: bibliometric analysis of
computer privacy research. International Journal of Information Security, 23(2), 863-885.
Farayola, O. A., Olorunfemi, O. L., & Shoetan, P. O. (2024). Data privacy and security in IT: a review of
techniques and challenges. Computer Science & IT Research Journal, 5(3), 606-615.