encription it security services penetration testing

46
encription IT security services Penetration Testing

Upload: annabella-boone

Post on 25-Dec-2015

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Encription IT security services Penetration Testing

encription IT security services

Penetration Testing

Page 2: Encription IT security services Penetration Testing

encription IT security services

• Campbell Murray

• Technical Director of Encription

• Technical Panel Chair for Tigerscheme

• CHECK Team Leader (GCHQ/CESG)

Who am I?

Page 3: Encription IT security services Penetration Testing

encription IT security services

• Penetration Tester aka– ITSHCE (IT Security Health Check

Engineer)– IATP (Information Assurance Testing

Professional)– Ethical Hacker

• Many names for the same thing

What do I do?

Page 4: Encription IT security services Penetration Testing

encription IT security services

• Vulnerability Research

• Exploit development

• Defensive research

• Community projects– BSides / 44Con / MCSG / OWASP & more

What else do I do?

Page 5: Encription IT security services Penetration Testing

encription IT security services

Why do people have pen tests done?

Page 6: Encription IT security services Penetration Testing

encription IT security services

• To protect?

• Detect the risk of:

• Loss to confidentiality (theft)

• Loss to integrity (changes to data)

• Loss of availability (denial of service)

• CIA

Why?

Page 7: Encription IT security services Penetration Testing

encription IT security services

• Identify all threat arising from:

• Exploitation

• Privilege escalation

• Malware / Virus infection

• Poor passwords

• Network misconfiguration

Why (cont.)?

Page 8: Encription IT security services Penetration Testing

encription IT security services

• Malicious users

• Poor segregation of duties

• Vulnerability in code

• Opportunists / Recreational

• etc

Why (cont.) ?

Page 9: Encription IT security services Penetration Testing

encription IT security services

• The threats faced by all organisations are similar

• Insiders

• Outsiders

• Accidents

• Variously motivated

Threats

Page 10: Encription IT security services Penetration Testing

encription IT security services

• State led

• Criminal

• Political

• Social

• Opportunist / Recreational

• Malevolent

Motivations

Page 11: Encription IT security services Penetration Testing

encription IT security services

• Honestly, no

• Majority of companies are indifferent

• Banks accept risk and loss

• Rarely a desire to meet best practice or be ‘secure’

• Post ‘hacked’ testing very common

Is this the reason we exist?

Page 12: Encription IT security services Penetration Testing

encription IT security services

• Most commonly for compliance e.g.• GCSx / Gsi / PSN CoCo• PCI DSS• ISO* e.g. 27001• Protected environments e.g. MoD• Protecting IPR• Commercially sensitive

So why then?

Page 13: Encription IT security services Penetration Testing

encription IT security services

Jumping inHow do we test?

Page 14: Encription IT security services Penetration Testing

encription IT security services

• White Box– Full disclosure

• Grey Box– Appropriate disclosure

• Black Box– Zero disclosure

• Red Team– NO RULES TESTING

Types of test?

Page 15: Encription IT security services Penetration Testing

encription IT security services

• Everything and anything that we are asked to!

• E.g. Desktop OS / Laptop / Servers / Phones / Web Applications / 3G / VoIP /WiFi / Thin Clients / SAN / DR / Network topology / Network protocols / People / Policy / Process etc etc etc.

• Defined by the SCOPE OF WORK

What do we test?

Page 16: Encription IT security services Penetration Testing

encription IT security services

• Broad and DETAILED expertise– Programming– Server Admin (Win / *nix / Solaris / AIX etc)– Network Admin– Application Development– etc

What makes us effective?

Page 17: Encription IT security services Penetration Testing

encription IT security services

• Current market is leaning to Vulnerability Assessment i.e. Tools based testing

• Cheaper but ...

• Limited value compared to a pen test

• Tools are helpful but without experience are misleading

I thought it was simpler :(

Page 18: Encription IT security services Penetration Testing

encription IT security services

• Market is splitting into ...

• ... Scan based assessment e.g. PCI DSS

• Seen as low end

• And pen testing ...

• ... High end but quality still varies

• Return of Red Teaming!

Polarity

Page 19: Encription IT security services Penetration Testing

encription IT security services

• We cannot FIND issues beyond that which tools provide if we do not know how to secure systems, networks or correct code

• We cannot RECOMMEND appropriate remedial action if we do not know how to secure systems, networks or correct code

Expertise is crucial

Page 20: Encription IT security services Penetration Testing

encription IT security services

• We cannot JUSTIFY our results if we cannot prove them

• Clients / IT admins will not ACT on reported issues unless they understand the full risk

Expertise is crucial

Page 21: Encription IT security services Penetration Testing

encription IT security services

• Methodology is key to success

• 5 common stages– Passive reconnaissance / OSINT– Fingerprinting– Vulnerability identification– Exploitation– Extraction / Covering tracks

What else makes us effective?

Page 22: Encription IT security services Penetration Testing

encription IT security services

• How I hacked a bank without ever going anywhere near it!

Quick Story

Page 23: Encription IT security services Penetration Testing

encription IT security services

• Pen testing is about SECURITY

• That means identifying ALL possible attack vectors

• And knowing how we could use them

• Frequently two minor vulnerabilities, when combined, can be devastating

• Requires experience, not certification.

Moral of the story

Page 24: Encription IT security services Penetration Testing

encription IT security services

• Crucial – Defines methodology to be used–What is ‘in scope’– Details given legal permission to test

• Going out of scope will see you fall foul of the CMA

• Not to mention the clients wrath!!!!

Scope of Work?

Page 25: Encription IT security services Penetration Testing

encription IT security services

• CMA holds stiff penalties• Potential extradition to other countries• Criminal record• You MUST have written permission from

someone AUTHORISED to give that permission

• Research only performed in air gapped networks!

Cautionary notes

Page 26: Encription IT security services Penetration Testing

encription IT security services

• You can be prosecuted for owning ‘hacking’ and malware creation tools

• Unless you can justify possesion

• Akin to ‘going equipped’ to commit crime, even if you haven’t

Cautionary notes

Page 27: Encription IT security services Penetration Testing

encription IT security services

All the ducks are lined up, what next?

Page 28: Encription IT security services Penetration Testing

encription IT security services

• Identify clients soft requirements

• If on site go prepared– Health and Safety– USB / Phone limitation– Dress code– Point of contact– Etc

Delivery

Page 29: Encription IT security services Penetration Testing

encription IT security services

• People skills are essential

• Polite but firm

• Do not allow others to impede your activity

• Sense of humour essential

• As is fully operational kit and plan B

• Pen and paper just as important!

Delivery

Page 30: Encription IT security services Penetration Testing

encription IT security services

• The GOLDEN RULE is ...

• .... NEVER leave a system less secure than how you found it!

• E.g. Creating user accounts or other objects

• If a high risk issue is found the client must be informed immediately

Execution

Page 31: Encription IT security services Penetration Testing

encription IT security services

• Good use of language

• Lots of people will read the report, make it readable.

• Ability to express technical concepts simply and accurately

• Face to face washup meetings require presentation skills

Reporting

Page 32: Encription IT security services Penetration Testing

encription IT security services

Applying your methodology

Page 33: Encription IT security services Penetration Testing

encription IT security services

• Methodology!!!!!!

• Reconnaisance (what is it)

• Fingerprinting – (Scan e.g. Nmap)

• Identification

• Exploit – (escalate privilege)

• Clean up – (e.g. grab info, passwd, create user, clear history and exit)

How?

Page 34: Encription IT security services Penetration Testing

encription IT security services

• Avoid temptation to focus on ‘critical’ issues

• Remember, two low risk issues can make a high risk attack vector

• Observation is as important as running tools

Reporting and Testing

Page 35: Encription IT security services Penetration Testing

encription IT security services

Android App Testing Demo

Page 36: Encription IT security services Penetration Testing

encription IT security services

• Mercury

• Android app testing toolkit

• Bit fiddly to set up tbh

• Worth the effort

Lets have a look at …

Page 37: Encription IT security services Penetration Testing

encription IT security services

• Install Android SDK

• Install Mercury

• Start VM Android device

• Install Mercury agent and the app you want to look at

Testing Android Apps

Page 38: Encription IT security services Penetration Testing

encription IT security services

• Start adb (linux)

• $adb forward tcp:31415 tcp:31415

• Connect with mercury

• mercury console connect

• Party!

Testing Android Apps

Page 39: Encription IT security services Penetration Testing

encription IT security services

• Get started commands

• list

• run scanner.provider.injection

• Derp!

• Now write an app to steal the data!

Testing Android Apps

Page 40: Encription IT security services Penetration Testing

encription IT security services

Getting into security

Page 41: Encription IT security services Penetration Testing

encription IT security services

• I won’t lie ...

• Pen testing is not for everyone

• Competition for junior positions

• Not great pay at first :(

• Increase your chances by getting involved

• Lots of community activity

Finding a job

Page 42: Encription IT security services Penetration Testing

encription IT security services

• BSides conferences are free

• OWASP conferences are very low cost

• BSC Groups and meetings

• Find online resources and contribute

Community

Page 43: Encription IT security services Penetration Testing

encription IT security services

• Gain expert level knowledge in programming, servers, network protocols

• Understanding what security is

• ... It’s not just about exploits

More than anything

Page 44: Encription IT security services Penetration Testing

encription IT security services

• Lasantha Priyankara

It works!

Page 45: Encription IT security services Penetration Testing

encription IT security services

• Listened to this talk

• Blogged about the demo

• Went to Bsides London

• Met his current employer there

• Employed!

Success story

Page 46: Encription IT security services Penetration Testing

encription IT security services

Questions?