2-Ethical Hacking Methodology
2-Ethical Hacking Methodology
OWASP Web Sec A comprehensive guide focused on web application testing. It is a compilation of many years of work by OWASP
urity Testing Guid members. It covers the high-level phases of web application security testing and digs deeper into the testing
e (WSTG) methods used. For instance, it goes as far as providing attack vectors for testing cross-site scripting (XSS),
cross-site request forgery (CSRF), and SQL injection attacks; as well as how to prevent and mitigate these attacks.
It is the most detailed and comprehensive guide available.
NIST SP 800-115 A document created by the National Institute of Standards and Technology (NIST), which is part of the U.S.
Department of Commerce. It provides organizations with guidelines on planning and conducting information security
testing. It superseded the previous standard document, SP 800-42. It is considered an industry standard for
penetration testing guidance and is called out in many other industry standards and documents.
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Exploring Penetration Testing Methodologies
PTES The Penetration Testing Execution Standard (PTES) provides information about types of attacks and
methods, and it provides information on the latest tools available to accomplish the testing methods
outlined. PTES involves seven distinct phases: Pre-engagement interactions, Intelligence
gathering, Threat modeling, Vulnerability analysis, Exploitation, Post-exploitation, and Reporting.
ISSAF The Information Systems Security Assessment Framework (ISSAF) is another penetration testing
methodology like the others on this list with some additional phases. It covers the following
phases: Information gathering, Network mapping, Vulnerability identification, Penetration, Gaining access
and privilege escalation, Enumerating further, Compromising remote users/sites, Maintaining access,
and Covering the tracks.
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Why Pen Testing is needed
• Identify the threats facing an organization's information assets.
• For testing and validating the efficacy of security protections and controls.
• Reduce an organization's expenditure on IT security and enhance Return On
Security Investment {ROSI) by identifying and remediating vulnerabilities or
weaknesses
• For changing or upgrading existing infrastructure of software, hardware, or network design
• Provide assurance with a comprehensive assessment of the organization's
security including policy, procedure, design, and implementation
contd
• Focus on high-severity vulnerabilities and emphasize application-level
security issues to development teams and management.
• Gain and maintain certification to an industry regulation (BS7799,HIPAA etc.)
• Provide a comprehensive approach of preparation steps that can be taken to
prevent upcoming exploitation.
• Adopt best practices in compliance with legal and industry regulations.
• Evaluate the efficacy of network security devices such as firewalls, routers,
and web servers.
Comparing Security Audit, Vulnerability Assessment and Pen
Testing
• A Security Audit just checks whether the organization is
following a set of standard security policies and
procedures.
• A Vulnerability Assessment focuses on discovering the
vulnerabilities in the information system but provides
NO indication if the vulnerabilities can be exploited or the
amount of damage that may result from the successful
exploitation of the vulnerability.
• Penetration testing is a methodological approach to
security assessment that encompasses the security
audit and vulnerability assessment and demonstrates if
the vulnerabilities in the system can be successfully
exploited by attackers.
Pentest vs. Hacking
Pentest Hacking
• Testers must clean up all unwanted • Attackers don’t want to get caught
changes that resulted from their so they try to hide any trails that
tests might lead to them
• They usually keep a list of what • In doing so, they can continue to
they have done access the system and delete
• This may require backups and evidence that can lead to
restores prosecution
• Must be verified by the organization • Examples: overwrite system and/or
• Example: remove accounts created application logs
for testing
Penetration Testing Models revisited.
• White box (known environment) model
• Tester is told about network topology and technology
• Tester is permitted to interview IT personnel and company employees
• No need for reconnaissance
• Specific targeting
• Black box (unknown environment) model
• Tester is not given details about technologies used
• Staff does not know about the test
• Tests security personnel’s ability to detect an attack
• Gray box (partially known environment) model
• Hybrid of the white and black box models
• Company gives tester partial information (e.g., OSs are used, but no network diagrams)
Example of information you could give to the white hacker