320 likes | 958 Vues
Penetration Testing The Importance of Your Bank’s Perimeter Security Presented by: Brian Hunter & Philip Diekhoff BKD Risk Management Group A Brief History of Hacking The Penetration Tester Testing done by an Ethical Hacker who attempts to circumvent security of computer system or network
E N D
Penetration TestingThe Importance of Your Bank’s Perimeter Security Presented by: Brian Hunter & Philip Diekhoff BKD Risk Management Group
The Penetration Tester • Testing done by an Ethical Hacker who attempts to circumvent security of computer system or network • EH works under no constraints other than those that would apply to ordinary users • EH will use same methodology & tools used by Hackers
Types of Penetration Testing • External Penetration Testing • Taking role of hacker to gain access from Internet • Internal Penetration Testing • Taking on role of disgruntled employee or third-party vendor to gain access from inside network
Different types of Penetration Testing What kinds of testing can be done? • No knowledge –hacker from Internet. Test is performed with no information about organization • Knowledgeable –former employee. Test is performed with some knowledge but no access • Insider –consultants or vendors. Test is performed inside with physical access to network. Knowledge is limited • Knowledgeable insider –staff. Test is performed inside with knowledge. This is to test how secure network is & whether employees can access resources they shouldn’t be able to
Security Offerings – What’s out there? • Network Scanning • Vulnerability Scanning • Penetration Testing What is the difference?
What is it? Uses port scanners (ex. Nmap, Superscan) Scans network to determine what devices are there, what ports are open & what services are running on those ports Fast, efficient but doesn’t probe for vulnerabilities Network Scanning
Vulnerability Scanning What is it? • Identifies network hosts & services • Identifies network operating systems • Identifies applications running on those devices • Identifies potential vulnerabilities pertinent to those systems & applications • Based on a database of vulnerabilities & not actual testing • Fairly fast, provides list of vulnerabilities but has many false positives
Penetration Testing What is it? • Set of procedures designed to circumvent existing security controls of specific system or organization • Encompasses network scanning & vulnerability scanning, but includes human element & verification of vulnerabilities • True hacker approach, verifies vulnerabilities but takes time & expertise
Why do I Need Penetration Testing? • Risk assessment • Verification of security controls • Identify vulnerabilities • Regulatory compliance • Anticipate expenditure
It Won’t Happen to Me • No one would be interested in small organization like us • They think IT department has everything under control or • People become complacent with their network Consider This!
Check This Out • http://www.privacyrights.org/ar/ChronDataBreaches.htm • Hacked Sites
Questions to Ask • What is their methodology? • Is methodology proven, has it been successfully used before? • Ask for references—more is better! • How long have they been performing this kind of work?
Things to Keep in Mind • Need for independence • Testing of any type can be disruptive & damaging • Are we talking about network scanning, vulnerability scanning or penetration testing – compare scopes & methodologies • There is no one standard methodology for penetration testing, but there has been some standardizations
Key Methodology Steps • Scope of work/engagement letter • Footprinting • Scanning • Enumeration • Penetration • Privilege escalation • Find sensitive data • Conference with client (discuss findings) • Report (contains findings & recommendations)
Footprinting • Public information gathering to determine organization’s demographics, locations, address, hosts, etc. • Organizational reconnaissance • Network reconnaissance • Domain names • IP addresses • Pinpoint servers (web, email, DNS, etc.) • Employee information • Search newsgroups for company information
Scanning • Assess & identify listening services to focus attack on most promising avenues of entry • TCP and UDP port scanning • Locate publicly accessible devices on IP segment • Identify open ports on devices • Stealth is required not to alert Intrusion Detection Systems
Enumeration • Enumerate network devices & determine what is running & what it is running on • Identify hardware • Identify operating system • Identify services & their version • Identify applications • Identify potential vulnerability
Penetration • Use information from previous steps to gain access to systems. • Using all information gathered so far, prioritize targets by the severity of vulnerabilities found • Systematically address all potential vulnerabilities on all systems • Never perform Denial of Service (DoS) attacks • Demo: RPC Exploit
Privilege Escalation • Depending on privilege level obtained from penetration phase, it may be necessary to attempt to increase privilege level to gain total control of system • Demo: RPC Exploit • Demo: PWDump • Demo: File
Find Sensitive Data – a.k.a. Pilfer • Footprint & scan internal network • Identify internal servers & their purpose • Attempt to locate sensitive information • Crack password files • Databases • Accounting programs • Demo: LC4
Exit Meeting • Meet & discuss findings • Address largest security findings so you may begin immediately fixing them • Get all your questions answered
Report • The real value in penetration testing is in the report • It should identify vulnerabilities • It should give recommendations on fixing those vulnerabilities
What Will it Take to Keep Me Out? Not as much as you might think • New expensive equipment is not usually required • Most security issues can be addressed quickly & easily • Most time & energy will be spent on security awareness
What Will it Take to Keep Me Out? (cont.) • Understand that risks are real • Be proactive with your IT security • Clear, concise policies that define security requirements & expectations of employees • Patches – keep all computers & network devices current with latest service packs, patches and updates
What Will it Take to Keep Me Out? (cont.) • Configure routers & firewalls to block all unnecessary traffic • Develop an “Incident Response Team” • Have testing performed regularly • Use intrusion detection systems • Remember, all testing/scanning is snapshot of network at that point in time
Common Entry Points When locking down your network, pay attention to most common points of entry for hackers • Misconfigured routers • Misconfigured firewalls • Misconfigured Internet servers • Unpatched software • Unsecured remote access • Accounts with excessive permissions • Weak & easily guessed passwords
Key Take Aways • It is not a matter of “IF” but “WHEN” • Be proactive before you need to be reactive • Understand the importance of the methodology • Retest after significant changes • It’s a process not a destination
How to Contact Us Brian Hunter Supervising Consultant Springfield, MO 417.865.8701 bdhunter@bkd.com Philip Diekhoff Senior Consultant Springfield, MO 417.865.8701 pdiekhoff@bkd.com