IBM Pentest
IBM Pentest
Social Engineering
→ creating a feeling or a mentality of anxiety within somebody to gain access to information that you
normally would not.
1. Planning
Setting objectives
→ What are the goals of the pentest? What are your targets?
Establishing Boundaries
→ There are legal and ethical ramifications to consider. Since the attacks are real, they
have the potential to interrupt availability of key functions and services
2. Discovery
Offline attacks → Pre-computed hashes: data structures that use a hash function to store,
order, or access data in an array.
→ Distributed Network Attack (DNA):
- a password cracking system sold by Access Data.
- can mine suspects hard drive for potential passwords.
→ Rainbow:
- Rainbow table is a pre-computed table for reversing cryptographic hash
functions, usually for cracking password hashes.
Without → Social Engineering: related to the act of deceiving the user to surrender
technology enough information to obtain access or data.
→ Shoulder surfing: active spying by obtaining optic access input.
→ Dumpster diving: retrieval of information by examining the trash in
search of discarded but not destroyed information.
3. Attack
→ Gaining Access
→ Escalating Privileges
→ System Browsing
→ Install Additional Tools
➢ Exploited Vulnerabilities:
file descriptor attacks • are numbers used by the system to keep track of files in lieu of
file names.
• Specific types of file descriptors have implied uses.
Race conditions • can occur during the time a program or process has entered a
privileged mode.
Buffer overflows • can occur when programs do not check input for appropriate
length.
Incorrect file& • File and directory permissions control the access assigned to
Directory permissions users and processes.
• Poor permissions could allow many types of attacks, including
the reading or writing of password files or additions to the list
of trusted remote hosts.
4. Reporting
→ Executive summary (the who, what, when, and where of the penetration test)
- Background: providing an overview of everyone that was involved, the timeframe and goals of the
test
- Overall Posture: You can give a brief description of the issues that you encountered and if you
were able to overcome them and meet the goals.
- Risk Ranking: let them know where they are on the risk scale.
- General Findings: provide a summary of the issues found during the penetration test in a basic
statistical or graphical format. In addition, the cause of the issue should be presented in an easy-
to-read format.
- Recommendations: It is your recommendation to the company, letting them know what they
need to do to address the vulnerabilities that you exploited.
- Roadmap: breaking down your recommendations into a 30, 60, 90-day action plan. The most
critical or high-risk action items to be addressed first.
→ Technical Review