70 likes | 235 Views
Chapter 15. Performing a Penetration Test. Defining Security Assessments. Penetration Tester Attempts to reveal potential consequences of a real attack Security Audit / Vulnerability Assessment Scan IP networks / hosts for weaknesses Do not try to gain access Penetration (Pen) test
E N D
Chapter 15 Performing a Penetration Test
Defining Security Assessments • Penetration Tester • Attempts to reveal potential consequences of a real attack • Security Audit / Vulnerability Assessment • Scan IP networks / hosts for weaknesses • Do not try to gain access • Penetration (Pen) test • Try to gain access
Penetration Testing • Two types • External • Uses publicly available information • Conduct network scanning and enumeration • Run exploits from outside the perimeter network • Internal • Performed from within the organization • Categories of knowledge • Black-box / zero-knowledge • Gray-box / partial-knowledge • White-box / complete-knowledge
Penetration Testing Steps • Phase 1: Preattack Phase • Reconnaissance / data gathering • Phase 2: Attack Phase • Penetrating the Perimeter • Acquiring the Target • Escalating Privileges • Executing, Implanting, and Retracing • Phase 3: Postattack Phase • Restore the system / clear logs / leave no trace
Penetration Testing Steps - cont • Phase 3: Postattack Phase • Remove all files uploaded onto the system • Cleaning all registry entries • Remove vulnerabilities created • Reversing all file and setting manipulations • Reversing all changes in privileges and user settings • Removing all tools & exploits from the tested systems • Restoring the network to the pretest stage • Documenting & capturing all logs • Analyzing results and making presentations
Making Pen Testing Legal • Signed documents include • Scope of work • Nondisclosure agreement • Liability release
Automated Pen Testing Tools • Nessus • LFI LANguard • SARA • MBSA • Metasploit Framework