180 likes | 452 Views
Tactics and Penetration Testing. Overview. Tactics: A procedure or set of maneuvers engaged in to achieve an end, an aim, or a goal. Tactics Penetration testing Methods Guidelines. Tactics. Reconnaissance Exploit Communication Command Effect Reserve Implications. Critical Issues.
E N D
Overview Tactics: A procedure or set of maneuvers engaged in to achieve an end, an aim, or a goal. • Tactics • Penetration testing • Methods • Guidelines
Tactics • Reconnaissance • Exploit • Communication • Command • Effect • Reserve • Implications
Critical Issues • What must you defend? • Mission of the organization • Assets of the organization • What can you defend? • Personnel limitations • Information limitations • What is likely to be attacked?
Reconnaissance Extend view of the World • Finding the network: Lookup, DNS, Routes • Locating key hosts: Services, Public Nodes • Profiling: Role, OS, Age, Content, Relations, hosts vs. decoys • Points of Access: Initial and Follow-on • Points of Vulnerability: technical, procedure • Points of Exploit: Change State • Points of Effect: Channel, Target, Cover
Exploit Methods by which to gain access or elevate privileges • System type: Service and OS • End goal: Impersonate, Intercept, Modify, Interrupt • Jump points: Local, Border, Remote • Methods: Vulnerability, Action, Reaction • Evidence: System, Defense, Network
Communication Transfer of information on progress • Indicators: External evidence of progress • Waypoints: Phases of method • Signaling: Present, Ready, Beacon • Reporting: Success, Fail, Options • Transfer: Information, Code, Command
Command Directing actions of hack • Manual vs. Automatic: interactive, shells • Command Channels: application, infrastructure • Encryption and encoding • Passive vs. Active • Intelligence: actions, options, productivity • Commanding Effects
Effect Mechanism for advancing hack • Employ, Corrupt, Install, Reconfigure • Phased effects • Split effects • Delegation, Propagation, Relocation • Confusion • Reconnaissance • Plant the flag, Capture the flag
Reserve Unused means of attack • Respond to defenses • Respond to detection • Branch points • Redundancy • Deception
Implications Replicating attacks Modifying attacks Operational damage Mission damage
Penetration Testing • Identify weakness • Inform response: Priority, Options, Effectiveness • Assess security performance • Communicate risk: “We think we’re really secure.”
Methods • Appropriate to goal • Within scenario • Deception • Bounded range • Bounded damage
Guidelines Agreement on terms of penetration • Goal • Constraints • Liabilities • Indemnification • Success and Failure
Goal • Personnel • Process • Technology • Service • Readiness • Exploration
Constraints • Where applied • When applied • Scenario • Resources: cost, effort, personnel, technology • Excluded methods
Liabilities • Technical instability • Personnel distraction • Financial dispersion • Public perception • Mission disruption
Indemnification • Authority • Accountability • Oversight and Decision • Reporting • Information handling • Non-disclosure