Penetration Testing
Penetration Testing
SECURITY ASSESSMENT–PENETRATION
TESTING AND VULNERABILITY ANALYSIS
DOCUMENT P8
The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply
specifically to IS auditing. One of the goals of the Information Systems Audit and Control Association (ISACA) is to advance globally
applicable standards to meet its vision. The development and dissemination of the IS Auditing Standards are a cornerstone of the
ISACA professional contribution to the audit community. The framework for the IS Auditing Standards provides multiple levels of
guidance.
Standards define mandatory requirements for IS auditing and reporting. They inform:
− IS auditors of the minimum level of acceptable performance required to meet the professional responsibilities set out in the ISACA
Code of Professional Ethics for IS auditors
− Management and other interested parties of the profession’s expectations concerning the work of practitioners
®
− Holders of the Certified Information Systems Auditor (CISA ) designation of requirements. Failure to comply with these standards
may result in an investigation into the CISA holder’s conduct by the ISACA Board of Directors or appropriate ISACA committee and,
ultimately, in disciplinary action.
Guidelines provide guidance in applying IS Auditing Standards. The IS auditor should consider them in determining how to achieve
implementation of the standards, use professional judgment in their application and be prepared to justify any departure. The objective of
the IS Auditing Guidelines is to provide further information on how to comply with the IS Auditing Standards.
Procedures provide examples of procedures an IS auditor might follow in an audit engagement. The procedure documents provide
information on how to meet the standards when performing IS auditing work, but do not set requirements. The objective of the IS
Auditing Procedures is to provide further information on how to comply with the IS Auditing Standards.
COBIT resources should be used as a source of best practice guidance. Each of the following is organised by IT management process,
as defined in the COBIT Framework. COBIT is intended for use by business and IT management, as well as IS auditors; therefore, its
usage enables the understanding of business objectives, communication of best practices and recommendations to be made around a
commonly understood and well-respected standard reference. COBIT includes:
− Control Objectives—High-level and detailed generic statements of minimum good control
− Control Practices—Practical rationales and “how to implement” guidance for the control objectives
− Audit Guidelines—Guidance for each control area on how to obtain an understanding, evaluate each control, assess compliance and
substantiate the risk of controls not being met
− Management Guidelines—Guidance on how to assess and improve IT process performance, using maturity models, metrics and
critical success factors
Glossary of terms can be found on the ISACA web site at www.isaca.org/glossary. The words audit and review are used
interchangeably.
Disclaimer: ISACA has designed this guidance as the minimum level of acceptable performance required to meet the professional
responsibilities set out in the ISACA Code of Professional Ethics for IS auditors. ISACA makes no claim that use of this product will
assure a successful outcome. The publication should not be considered inclusive of any proper procedures and tests or exclusive of
other procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific
procedure or test, the controls professional should apply his/her own professional judgment to the specific control circumstances
presented by the particular systems or information technology environment.
The ISACA Standards Board is committed to wide consultation in the preparation of the IS Auditing Standards, Guidelines and
Procedures. Prior to issuing any documents, the Standards Board issues exposure drafts internationally for general public comment.
The Standards Board also seeks out those with a special expertise or interest in the topic under consideration for consultation where
necessary. The Standards Board has an ongoing development programme and welcomes the input of ISACA members and other
interested parties to identify emerging issues requiring new standards. Any suggestions should be e-mailed ([email protected]),
faxed (+1.847. 253.1443) or mailed (address at the end of document) to ISACA International Headquarters, for the attention of the
director of research, standards and academic relations.
2. PENETRATION TESTING
4.1 Internet
4.1.1 The purpose of Internet testing is to compromise the target network. The methodology needed to perform this test allows for a
systematic checking for known vulnerabilities and pursuit of potential security risks. The methodology ordinarily employed
includes the processes of:
Information gathering (reconnaissance)
Network enumeration
Vulnerability analysis
Exploitation
Results analysis and reporting
4.1.2 There are several variations to the processes listed in section 4.1.1. However, a common, standardised and objective script is
ordinarily followed and should provide a detailed and exact method of execution. In addition, the intricacies of new
vulnerabilities and methods of exploitation require detailed study with a history of information to draw upon.
4.2 Dial-in
4.2.1 War dialling is the systematic calling of each number in the target range in search of listening modems. Once all listening
modems are identified, brute force default password attempts or strategic guessing attempts are made on the
username/password challenge (sometimes only passwords are necessary) to gain unauthorised access.
4.2.2 Access to the login screen banner is crucial to accessing any system. Some systems require only a password, which can be a
vendor-provided default password or just hitting “enter.”
4.2.3 At times of poor configuration, even a login banner does not appear and access is granted directly devoid of any
authentication mechanism.
5.1 Goal
5.1.1 The goal of internal penetration testing is to ascertain vulnerabilities inside the network perimeter. The testing performed
closely parallels that which an internal IS auditor will be assigned to audit, given the size, complexity and financial resources
devoted to risk associated with lack of security concerns. The overall objective is to identify potential vulnerabilities within the
internal network and weaknesses in controls in place to prevent and/or detect their exploitation by a hacker/malicious
employee/contractor who may obtain unauthorised access to information resources or cause system disruption or a system
outage.
5.1.2 The first phase relates to information gathering, which is comprised of public information search, googling, obtaining maximum
information about business, employees, etc., thereby profiling the target. For instance this phase may result in obtaining
resumes/CVs of employees which may be useful in understanding technologies employed at the attack site.
5.1.2 The first testing goal is to ascertain the internal network topology or footprint that provides a map of the critical access
paths/points and devices including their Internet protocol (IP) address ranges. This is the network discovery stage.
5.1.3 Once critical points/devices are identified within the network, the next step is to attack those devices given the various types of
known vulnerabilities within the system and operating software running on the devices (e.g., UNIX, NT, Apache, Netscape and
9. WEB APPLICATION
Collectively review results of the survey evaluation and results of the portal testing steps to
ascertain the vulnerabilities that could be exploited to gain access to sensitive information by an
outsider with no information of the system and no login account andan insider with knowledge of the
system with a login account.
Note: Since there are significant numbers of exploits detected via port 80, as time goes by, it is
recommended that those performing this test possess current knowledge that would exceed
that which is defined in various research documents, white pages and web sites. In addition,
there is a series of audit testing of the web servers, including standard access control list
evaluation and TCP/IP weakness, that should be performed and are included in other
sections of this procedure.
Run commercial or open source application vulnerability assessment tools to verify results. Popular
tools include Nikto, WebInspect, ScanDo and Appscan.
There are numerous potential vulnerabilities that could be detected by performing the above testing.
Accordingly, the second step is to exploit potential vulnerabilities, which would include, but are not
limited to, the following:
Alter contents of cookies (e.g., altering the parameters passed to the application through a
URL) resulting in access to sensitive information or impersonating another user.
Change JavaScript within the application or hidden form files on application forms, parameter
tampering, SQL injection (passing SQL code into an application that was not intended),
cross-site scripting (entering executable commands into web site buffers).
Insert code into text fields to take control of an application.
Directly access a web page that can ordinarily only be reached through authentication by a
brute force attack. Collect user IDs where wrong passwords are entered and execute the
dictionary against them.
Directly exploit backdoors and debug options including executing debug syntax on URLs
(e.g., there is a listing of vulnerabilities on various web sites including CERT and vendor sites,
such as www.nstalker.com).
Exploit any configuration errors in third-party applications, such as web or database servers.
Specific attempts should be made to exploit web server default configuration vulnerabilities
that are known.
Insert scripting languages in a text field that other users will see.
Pass excessive data in an application request (e.g., sending large numbers of characters to a
web site form/field).
Report Prepare report in accordance with ISACA IS Auditing Standards including:
Defining the scope
Objectives
Period of work performed
APPENDIX
COBIT Reference
Selection of the most relevant material in COBIT applicable to the scope of the particular audit is based on the choice of specific COBIT IT
processes and consideration of COBIT information criteria:
PO6—Communicate Management Aims and Direction
PO9—Assess Risks
A13—Acquire and Maintain Technology Infrastructure
DS5—Ensure Systems Security
DS7—Educate and Train Users
DS10—Manage Problems and Incidents
The information criteria most relevant to a penetration testing and vulnerability assessment are:
Primary: confidentiality, integrity and availability
Secondary: efficiency and reliability
References
th
Bosworth, Seymour; Michel E. Kabay, Editor; Computer Security Handbook, 4 edition, John Wiley & Sons, Indianapolis, Indiana, USA,
April 2002
st
The CERT Guide to System and Network Security Practices, 1 Edition, Addison-Wesley Publishing Co., June 2001
e-Commerce Security: Security the Network Perimeter, IT Governance Institute, Rolling Meadows, Illinois, USA, 2002
Klevinsky, T.J.; Scott Laliberte; Ajay Gupta; Hack I.T.—Security Through Penetration Testing, Addison-Wesley, Boston, Massachusetts,
USA, June 2002
Kreutz, Vines,;“The CISSP Prep Guide;” John Wiley & Sons, Inc.; 2001
Rhoades, David; “Hacking and Securing Web-based Applications,” Maven Security Consulting Inc., 12th USENIX Security Symposium,
Washingtong DC, USA, 4-8 August 2003
nd
Scambray, Joel; Stuart McClure; George Kurtz; Hacking Exposed—Network Security Secrets & Solutions, 2 Edition,
Osborne/McGraw-Hill, Berkeley, California, USA, 2001
Yeager, Nancy J.; Robert E. McGrath; Web Server Technology, Morgan Kaufmann Publishers Inc.
Copyright © 2004
Information Systems Audit and Control Association
3701 Algonquin Road, Suite 1010
Rolling Meadows, IL 60008 USA
Telephone: +1.847.253.1545
Fax: +1.847.253.1443
E-mail: [email protected]
Web site: www.isaca.org