0% found this document useful (0 votes)
66 views

Vpen Testing

Penetration testing involves actively evaluating an organization's security measures by probing computer systems and networks to identify vulnerabilities. It is conducted to safeguard organizations from financial loss, non-compliance, and damage to reputation. The process generally involves reconnaissance, network mapping, port scanning, vulnerability identification, exploitation, privilege escalation, hiding tracks, and using gained privileges for benefit.

Uploaded by

Anaadi Jamwal
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views

Vpen Testing

Penetration testing involves actively evaluating an organization's security measures by probing computer systems and networks to identify vulnerabilities. It is conducted to safeguard organizations from financial loss, non-compliance, and damage to reputation. The process generally involves reconnaissance, network mapping, port scanning, vulnerability identification, exploitation, privilege escalation, hiding tracks, and using gained privileges for benefit.

Uploaded by

Anaadi Jamwal
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Penetration Testing

What is penetration Testing?


• It is the process of actively evaluating your
information security measures.
• involves probing a computer system or
network to identify and exploit vulnerabilities.
Why conduct a penetration test?
• business perspective: safeguard your organization against failure,
through
– Preventing financial loss through fraud or through lost revenue due to
unreliable business systems and processes.
– Proving due diligence and compliance to your industry regulators,
customers and shareholders
– Protecting your brand by avoiding loss of consumer confidence and
business reputation.
• operational perspective: shape information security strategy
through
– Identifying vulnerabilities and quantifying their impact and likelihood so
that they can be managed proactively; budget can be allocated and
corrective measures implemented.
Generic attack steps
10 stage Generic attack process in a nutshell (in chronological order)
1.      Reconnaissance
2.      Network mapping
3.      Port scanning and banner grabbing a host
4.      Vulnerability identification
5.      Exploitation
6.      Privilege escalation
7.      Rootkit installation
8.      Hiding tracks
9.      Monitoring
10.  Using unauthorized privilege gained for benefit
1.    Reconnaissance to find out about the target before attack.
• WhoIs Internet searches for administrative contact phone
numbers and emails
• DNS  Lookup for ISP details
http://www.networksolutions.com/whois/index.jsp 
• Google and google cache to find deleted information about
the victim http://www.googleguide.com/ and
http://johnny.ihackstuff.com/
• SamSpade (http://www.samspade.org/).
• Netcraft (http://www.netcraft.com).
2.    Network mapping of a subnet.
• nmap http://insecure.org/nmap/ is the
defacto network mapping tool.
• Paketo keiretsu enables faster scanning of
large networks by separating the send and
receive functionality of the scanner.
3.Port scanning of an individual host
• Nmap again as well as amap
http://www.thc.org/thc-amap/ . Nmap, by default,
works by using port number to identify the application
running so for instance if the Oracle Listener is on port
1522 then nmap will present this port as being rna-lm
as per the IANA default port assignments.
http://www.iana.org/assignments/port-numbers . By
using the additional –sV switch of nmap it will
correctly identify many applications by their banner.
4.    Banner grabbing a host to identify the actual service being ran and
vulnerability     identification from the version gained from the banner.
This will allow identification  of likely vulnerabilities.
• nessus will identify applications running and then match vulnerabilities
http://www.nessus.org/
• Typhon is a commercial banner grabbing network/host scanner.
http://www.ngssoftware.com/products/internet-security/ngs-typhon.php
• CANVAS is a commercially available tool that comes with exploits written
by Dave Aitel’s ImmunitySec
http://www.immunitysec.com/products-canvas.shtml
• CORE Impact is a similar commercially available tool.
http://www.coresecurity.com/?module=ContentMod&action=item&id=3
2
5.  Exploitation of a software flaw to gain
unauthorized access.
• Metasploit has pre-coded exploits for many
OS and applications
http://www.metasploit.com/
 6.  Cracking passwords and user names is basically the process of taking an
encrypted password and then decrypting it or guessing it correctly by attempting
many times until the correct password is gained.
• JTR (John the Ripper) is a good password cracker http://www.openwall.com/john/
. There is now a patch for John to be able to crack Oracle hashes.

• Also “Cain” is an easy to use Windows based password cracker


http://www.oxid.it/cain.html
• Rainbow crack is a tool used to pre-compute hash-to-cleartext correlations i.e.
“you give me the hash I will give you the password because I have already
computed all the possible permutations”. Rainbow crack has been converted to
allow generation of hashes for the Oracle usernames as discussed at this URL
http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049569.html
.These correlations can accessed online at http://www.rainbowcrack-online.com/
7.   Rootkit installation enables covert access at a
later date and generally involves the installation
of software by the attacker to hide their
presence after they have gained privileged
access to the target server.
• http://www.rootkit.com/ which has links to AFX
and hacker-defender rootkits for example.
• The concept of root kits has been transferred to
databases as will be discussed.
8.   Hiding tracks to clear up evidence involves deletion
of logs and tools as well as resetting timestamps.
• Change timestamps to show that files have not been
changed using  timestamps for instance

• Secure deletion of files so that recycle bin or forensic


data recovery cannot bring the attackers tools back
after they have deleted them. Oracle now has a
Recycle bin which uses the PURGE keyword to empty
or avoid it. We will look in detail at this command.
9.    Monitoring the system over time which
typically requires a covert channel.
• Loki sends shell commands over ICMP

• Time based covert channels also exist.


10. Using unauthorized privilege for benefit
• Credit card numbers and Social security IDs form a saleable
resource to a commercially minded hacker.
• An attacker might blackmail a bank if they were able to gain
customers data.
• A competitor may seek advantage in hiring a hacker to subvert
another company or spy upon them to gain their intellectual
property or list of customers.
• Internally an employee may seek advantage over an internal
competitor by taking an unauthorized action that disadvantages
their adversary e.g. causing a mistake to occur and making it look
like their adversary did it.
Penetration Testing steps
• involves three phases:
– Preparation phase - A formal contract is executed containing non-disclosure of the
client's data and legal protection for the tester. At a minimum, it also lists the IP
addresses to be tested and time to test.
– Execution phase - In this phase the penetration test is executed, with the tester
looking for potential vulnerabilities.
– Delivery phase - The results of the evaluation are communicated to the pre-defined
organizational contact, and corrective action is advised.
• The 5 Steps of PT are as below:

1. Reconnaissance (pre-test phase)


2. Scanning & enumeration (pre-test phase)
3. Gaining Access
4. Maintaining Access
5. Clearing Tracks
pen testing services
• Vulnerability scanning
• Infrastructure pen testing
– Metasploit or Core Impact test all externally visible IP
addresses
• Application pen testing
– use a Web application scanner (HP's WebInspect, IBM's
AppScan)
– Test application logic
– Test database
• User testing

You might also like