Penetration testing dont just leave it to chance

Dr. Anish Cheriyan (PhD)
Dr. Anish Cheriyan (PhD)Head of Quality & Global Engineering Tools- Harman Automotive, IEEE Sr. Member, ASQ-IT Chair Bangalore LMC um Harman International
Name of the Speakers :
 Anish Cheriyan, Director Quality and Centre of Excellence-Cyber Security
 Sriharsha Narayanam , Test Architect and Cyber Security Test Engineering -COE Team
Company Name : Huawei Technologies India Private Limited
● Introduction
● Principles of Security for Secure Products
● Security in Product Development Life Cycle
● Penetration Testing Approach
● Details of Pen Test
● Cyber Security- a mindset and some anti
patterns
● Conclusion
http://einstueckvomglueck.com/wp-content/uploads/2010/11/philiplumbang.jpg
http://thevarguy.com/site-files/thevarguy.com/files/archive/thevarguy.com/wp-content/uploads/2008/12/canonical-unison-attack-microsoft-e
Just Attack Testing
http://thevarguy.com/site-files/thevarguy.com/files/archive/thevarguy.com/wp-content/uploads/2008/12/canonical-unison-attack-microsoft-e
http://7428.net/wp-content/uploads/2013/05/Color-Feather.jpg
Feather Touch Testing
http://http://blog.courtmetrange.eu/?attachment_id=1487
Time Bound Testing
http://www.zazzle.com/innocent+until+proven+guilty+gifts
Penetration testing dont just leave it to chance
 Favor simplicity
◦ Use fail safe defaults
◦ Do not expect expert users
 Trust with reluctance
◦ Employ a small trusted computing base
◦ Grant the least privilege possible
 Promote privacy
 Compartmentalize
 Defend in Depth
◦ Use Community resource-no security by obscurity
 Monitor and trace
Reference: Reference: Software Security by Michael Hicks, Coursera
Reference: Reference: Software Security by Michael Hicks, Coursera
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
www.unicomlearning.com/ethicalha
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
Requirement Design Coding Testing Release
•General
Security
Requirement
Analysis
•Attack
Surface
Analysis
• Threat
Modeling -
STRIDE(Micro
soft)
•Testability
Analysis
•Secure
Architecture
and Design.
•Security
Design
guidelines
•Security
Test Strategy
and Test
Case
•Secure
Coding
Guidelines
(cert.org-
good
reference)
•Static Check
Tools like
Fortify,
Coverity (Ref-
owasp.org)
•Code
Reviews
•Security Test
Cases
•Penetration
Testing
Approach
(Reconnaissa
nce,
Scanning,
Attack,
Managing
access)
•Anti Virus
•Continuous
Delivery
System
(Inspection
and Secure
Test)
Reference: https://msdn.microsoft.com
Identify assets. Identify the valuable assets
that your systems must protect.
Create an architecture overview. Use simple
diagrams and tables to document the
architecture of your application, including
subsystems, trust boundaries, and data flow.
Decompose the application. Decompose the
architecture of your application, including the
underlying network and host infrastructure
design, to create a security profile for the
application.
Identify the threats. Keeping the goals of an
attacker in mind, and with knowledge of the
architecture and potential vulnerabilities of
your application, identify the threats that
could affect the application.
Document the threats. Document each threat
using a common threat template that defines
a core set of attributes to capture for each
threat.
Rate the threats. Rate the threats to prioritize
and address the most significant threats first.
Reference: https://msdn.microsoft.com
Reference: https://msdn.microsoft.com
Reference: https://msdn.microsoft.com
Reference:
https://www.owasp.org/index.php/Application_Security_Architecture_Cheat_Sheet#DRAFT_CHEAT_SHEET_-
_WORK_IN_PROGRESS
•Business Model
•Data Essential
•End Users
•Third Party
•Administrators
•Regulations
Business
Requirements
•Network
•Systems
•Infrastructure Monitoring
•Virtualization and
Externalization
Infrastructure
Requirements •Environments
•Data Processing
•Access
•Application Monitoring
•Application Design
Application
Requirements
•Operations
•Change Management
•Software Development
•Corporate
Security Program
Requirements
www.unicomlearning.com/IT_Security_and_Ethical_Hacking
Reference: https://owasp.org
Input
Validation
Output
Encoding
Authn. & Pwd.
Mgmt.
Session
Management
Access
Control
Cryptographic
Practices
Error
Handling and
Logging
Data
Encryption
Communicati
on Security
System
Configuration
File
Management
Memory
Management
Gen. Coding
Practices
www.unicomlearning.com/IT_Security_and_Ethical_Hacking
Further Reading: Threat Modeling- Frank Swiderski, Window Snyder, A Few Billion Lines of Code Later: Using Static Analysis to
Find Bugs in the Real World - http://cacm.acm.org/magazines/2010/2/69354-a-few-billion-lines-of-code-later/fulltext
Trust
boundary
code (Threat
Model)
Static Tool
Execution
Manual Code
Review
While doing the code review we can take the inputs from the code
in the trust boundary, issues from the static tools like Fortiy,
Coverity etc and put the focus at the right place for the Code
Review
•Information
Gathering
(About the
system,
environment
etc.)
•Scan the system
•Threat Analysis
•Usage of the Static
analyzer (Run fortify,
Coverity, Appscan,
Nessus, NMAP etc)
•Right tool usage
•Vulnerability
Analysis
•Fuzz Testing
•Penetration
testing
•Use /Develop
right set of tools
to attack
•Raise
Defects
Reconnaiss
ance
Scanning Attack
Managing
Access
Test Strategy
Picture Courtesy: http://sd.keepcalm-o-matic.co.uk/i/assume-nothing-believe-nobody-and-check-
everything--1.png
Understands the typical application scenario. Analyse the system
topology, architecture etc.
Analyse the Threat Model , Security design and identifies the trust
boundaries., Apply Penetration Test Analysis and Design
Review and Analyse the Open source and third party software
Analyse report of non dynamic examination like Fortify, Coverity.
Analyze the information like communication matrix, product manual. .
etc
Conduct the code verification from security perspective
Conduct penetration testing (Information gathering, Scanning, Attack,
Defects)
Web Security
Network
Security
DB Security OS Security
Mobile
Security
Open Source
Security
Password
Security
Tools to be
used
Code
Vulnerabilities
Validation
Penetration
Test Analysis
and Design
Top 3
Attacks to
be Focused
Customer
Deployment
Topology
Threat
Modeling
based
Scenarios
Penetration
Test
Approach
Attack
Vectors /
Surface
Automation
?
Country
Specific
Security
Test Case
Database
Good practice
inheritance from
Security defects
from past
Security Test Strategy - What to Cover ?
Threat modeling Analysis
Level Vulnerability analysis.
System Level and Feature
Tools & Version Analysis
Gather Overall Information
Inputs from Baseline
Test Case from Test
Scenarios
Exploratory
Pen Testing With
designed Cases
Perform Scanning
Defect Based Test Cases
Defects Analysis
Manage Access
Penetration Testing Analysis overall flow
Output
Penetration Test
Scenarios
Penetration Test
Cases
Defects
1. Damage potential
Assessment
2. New Test Cases
 Reconnaissance is a the first and the key phase of penetration testing where the
information is gathered.
 The more time you spend collecting information on your target, the more likely
you are to be successful in the later phases. There can be a checklist based
approach for information gathering but it need not be constrained to the list.
 Information Gathering helps teams to think about the product properties upfront.
...So On
Reconnaissance / Information Gathering
Category
Suggestive Informations to be gathered /
verified
Actual Information
General
Informatio
n
List of IP addresses that can be scanned
Target OS and File permission information
Information about the LOG FILE and their paths
Information about the DATA FILE Location, and their
format
Storage mechanism of the USERNAME/PASSWORD of
the application
Reconnaissance / Information Gathering
Few Tools for WebApplication Reconnaissance
 Wappalyzer
 Passive Recon
 Ground Speed
[http://www.slideshare.net/groundspeed/groundspeed-
presentation-at-the-owasp-nynj]
Software URL Description
Maltego
http://www.paterva.com/web5
The defacto standard for mining data on individuals and companies.
Comes in a free community version and paid version.
Nessus
http://tenable.com/products/nessus
A vulnerabilty scanning tool available in paid and free versions. Nessus
is useful for finding and documenting vulnerabilities mostly from the
inside of a given network.
IBM AppScan
http://www-
01.ibm.com/software/awdtools/appscan
IBM's automated Web application security testing suite.
eEye Retina
http://www.eeye.com/Products/Retina.asp
x
Retina is an an automated network vulnerability scanner that can be
managed from a single web-based console. It can be used in
conjunction with Metasploit where if an exploit exists in Metasploit, it
can be launched directly from Retina to verify that the vulnerability
exists.
Nexpose
http://www.rapid7.com
Nexpose is a vulnerability scanner from the same company that brings
you Metasploit. Available in both free and paid versions that differ in
levels of support and features.
OpenVAS
http://www.openvas.org
OpenVAS is a vulnerability scanner that originally started as a fork of
the Nessus project. The actual security scanner is accompanied with a
daily updated feed of Network Vulnerability Tests (NVTs), over 20,000
in total (as of January 2011)
HP WebInspect
https://www.fortify.com/products/web_ins
pect.html
HP WebInspect performs web application security testing and
assessment for complex web applications. Supports JavaScript, Flash,
Silverlight and others.
HP SWFScan
https://h30406.www3.hp.com/campaigns/
2009/wwcampaign/1-
5TUVE/index.php?key=swf
HP SWFScan is a free tool developed by HP Web Security Research
Group to automatically find security vulnerabilities in applications built
on the Flash platform. Useful for decompiling flash apps and finding
hard-coded credentials, etc.
THC IPv6 Attack
Toolkit
http://www.thc.org/thc-ipv6
The largest single collection of tools designed to exploit vulnerabilities
in the IPv6 and ICMP6 protocols.
Pen Test Tools and Guidelines- http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines
Security Tools and Version Analysis
Tools Analysis helps the teams to select the applicable tools upfront and build required
competency to use them / acquire license , well before test execution phase.
 Scanning is the phase where the
vulnerabilities and the weak areas in
the system / target can be identified.
 Tools to be finalized based on the
application scope.
• Based on the Threat Modeling Analysis,
understand the Trust Boundary.
– Analyze the present Risk Mitigation
mechanism and derive test scenarios
– Analysis the proposed Risk Mitigation
mechanism and device the test scenarios
• Threat Modeling analysis to be done both at
System and at Sub system level
...So On
...So On
System Scanning and further Analysis
Test Scenarios from Threat Modeling Analysis
Category Tool / Technique
Applicability
Analysis
Scanning of the system
under test using Static
Code Analyzer Fortify , Coverity
Determining if a system
is alive
Scanning Application
AppScan , Acunetix,
RSAS , QRADAR. .
Entity or
Process
Threat
Type
Applicable ?
Test Scenario
based on Current
Mitigation
Test Scenario based
on Proposed
Mitigation
Requirement 1
S Yes
T No
R
I
D
E
 Vulnerability analysis is a process in which the vulnerability analysis of the system & Feature are
conducted. The various ways in which it can be done are :
◦ Threat Modeling analysis
◦ Reconnaissance – Information Gathering
◦ System Level Vulnerability based on the Security area (Overlap with Threat Modeling Analysis)
◦ Feature level Vulnerability based on the Security area (Overlap with Threat Modeling Analysis)
Security Area
Does this Feature
interact with
Trust Boundary
SSL
Configuratio
n used
Encryption
Algorithm used
Anti-
Attack
Protection
Identity
Manageme
nt
Password
Management
System Level
Analysis
Feature 1
...So On
System and Feature level Vulnerability Analysis
Systematic Penetration Testing – Defects Examples
Web Server version
based Defects
Web Server version
based Defects
Encryption issues
Address ID issue
Session ID bases
Privilege Escalation
CSRF issue – Form key
User scenario Bases
SQL injection
Penetration Testing Practice platforms
 Attack Surface analysis, Threat modeling not
deeply practiced
 Secure design and code practices not practiced
well
 Ignoring some errors of Fortify /Coverity and
other tools. Sometimes considering them as false
positives
 Relying too much on Testing
 “This is not a valid scenario. Customer would
never test this way”.
 “Innocent until Proven”- It should be “Guilty
unless proven”
Reference: Reference: Software Security by Michael Hicks, Coursera
 Build Security into the Life Cycle of product
development
 Focus on Security Competency
 Assume Nothing, Believe Nobody, Check
Everything.
 Following Penetration Test Design Methods-
Reconnaissance-Scanning-Attack-Manage
Access.
Penetration testing dont just leave it to chance
 www.cert.org
 www.owasp.org
 http://pr.huawei.com/en/connecting-the-
dots/cyber-security/
 http://pr.huawei.com/en/connecting-the-
dots/cyber-security/hw-
401493.htm#.VV6DBfBCijM
 https://msdn.microsoft.com/en-
us/security/aa570330.aspx
 Building Secure Software –John Viega, Gary
McGraw
 Coursera Course - Software Security by Michael
Hicks, University of Maryland
Organized by: UNICOM Trainings & Seminars Pvt. Ltd.
contact@unicomlearning.com
www.unicomlearning.com/IT_Security_and_Ethical_Hacking
Speaker Name: Anish Cheriyan , Sriharsha Narayanam
Email ID: anishcheriyan@huawei.com, @anishcheriyan
sriharsha.narayanam@huawei.com
1 von 45

Recomendados

Introduction to Application Security Testing von
Introduction to Application Security TestingIntroduction to Application Security Testing
Introduction to Application Security TestingMohamed Ridha CHEBBI, CISSP
2.2K views38 Folien
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation von
Owasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentationOwasp A9 USING KNOWN VULNERABLE COMPONENTS   IT 6873 presentation
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentationDerrick Hunter
1.6K views15 Folien
Secure programming von
Secure programming Secure programming
Secure programming Solita Oy
531 views40 Folien
"CERT Secure Coding Standards" by Dr. Mark Sherman von
"CERT Secure Coding Standards" by Dr. Mark Sherman"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark ShermanRinaldi Rampen
2.1K views61 Folien
Client-Side Penetration Testing Presentation von
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationChris Gates
6.9K views67 Folien
Cloud Security vs Security in the Cloud von
Cloud Security vs Security in the CloudCloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudTjylen Veselyj
1.1K views29 Folien

Más contenido relacionado

Was ist angesagt?

Security testing von
Security testingSecurity testing
Security testingRihab Chebbah
1.5K views31 Folien
Threat Modeling for the Internet of Things von
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsEric Vétillard
4.9K views33 Folien
Offensive cyber security engineer updated von
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updatedInfosecTrain
75 views24 Folien
Web Application Security Testing von
Web Application Security TestingWeb Application Security Testing
Web Application Security TestingMarco Morana
17.6K views39 Folien
Web Application Security von
Web Application SecurityWeb Application Security
Web Application SecurityAbdul Wahid
49K views181 Folien
Secure Coding and Threat Modeling von
Secure Coding and Threat ModelingSecure Coding and Threat Modeling
Secure Coding and Threat ModelingMiriam Celi, CISSP, GISP, MSCS, MBA
2.3K views50 Folien

Was ist angesagt?(20)

Threat Modeling for the Internet of Things von Eric Vétillard
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
Eric Vétillard4.9K views
Offensive cyber security engineer updated von InfosecTrain
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
InfosecTrain75 views
Web Application Security Testing von Marco Morana
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
Marco Morana17.6K views
Web Application Security von Abdul Wahid
Web Application SecurityWeb Application Security
Web Application Security
Abdul Wahid49K views
Penetration testing reporting and methodology von Rashad Aliyev
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev5.3K views
Security Testing von Kiran Kumar
Security TestingSecurity Testing
Security Testing
Kiran Kumar5.3K views
Security hole #5 application security science or quality assurance von Tjylen Veselyj
Security hole #5 application security   science or quality assuranceSecurity hole #5 application security   science or quality assurance
Security hole #5 application security science or quality assurance
Tjylen Veselyj1.4K views
Web Application Penetration Testing Introduction von gbud7
Web Application Penetration Testing IntroductionWeb Application Penetration Testing Introduction
Web Application Penetration Testing Introduction
gbud78.5K views
we45 - Web Application Security Testing Case Study von we45
we45 - Web Application Security Testing Case Studywe45 - Web Application Security Testing Case Study
we45 - Web Application Security Testing Case Study
we45997 views
What Every Developer And Tester Should Know About Software Security von Anne Oikarinen
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software Security
Anne Oikarinen793 views
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication" von Nazar Tymoshyk, CEH, Ph.D.
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"
OWASP Secure Coding Practices - Quick Reference Guide von Ludovic Petit
OWASP Secure Coding Practices - Quick Reference GuideOWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference Guide
Ludovic Petit3K views
The bare minimum that you should know about web application security testing ... von Ken DeSouza
The bare minimum that you should know about web application security testing ...The bare minimum that you should know about web application security testing ...
The bare minimum that you should know about web application security testing ...
Ken DeSouza965 views

Destacado

ODell - Resume von
ODell - ResumeODell - Resume
ODell - ResumeBruce O'Dell
1.4K views12 Folien
Physical Penetration Testing (RootedCON 2015) von
Physical Penetration Testing (RootedCON 2015)Physical Penetration Testing (RootedCON 2015)
Physical Penetration Testing (RootedCON 2015)Eduardo Arriols Nuñez
1.7K views69 Folien
Common Test Problems Checklist von
Common Test Problems ChecklistCommon Test Problems Checklist
Common Test Problems ChecklistDonald Firesmith
2.3K views20 Folien
In house penetration testing pci dss von
In house penetration testing pci dssIn house penetration testing pci dss
In house penetration testing pci dssRichard Thompson
2K views42 Folien
How penetration testing techniques can help you improve your qa skills von
How penetration testing techniques can help you improve your qa skillsHow penetration testing techniques can help you improve your qa skills
How penetration testing techniques can help you improve your qa skillsMarian Marinov
586 views32 Folien
The (In)Security of Topology Discovery in Software Defined Networks von
The (In)Security of Topology Discovery in Software Defined NetworksThe (In)Security of Topology Discovery in Software Defined Networks
The (In)Security of Topology Discovery in Software Defined NetworksTalal Alharbi
490 views4 Folien

Destacado(20)

How penetration testing techniques can help you improve your qa skills von Marian Marinov
How penetration testing techniques can help you improve your qa skillsHow penetration testing techniques can help you improve your qa skills
How penetration testing techniques can help you improve your qa skills
Marian Marinov586 views
The (In)Security of Topology Discovery in Software Defined Networks von Talal Alharbi
The (In)Security of Topology Discovery in Software Defined NetworksThe (In)Security of Topology Discovery in Software Defined Networks
The (In)Security of Topology Discovery in Software Defined Networks
Talal Alharbi490 views
Welcome to the United States: An Acculturation Conversation von Suzanne M. Sullivan
Welcome to the United States: An Acculturation ConversationWelcome to the United States: An Acculturation Conversation
Welcome to the United States: An Acculturation Conversation
Ajit-Legiment_Techniques von guest66dc5f
Ajit-Legiment_TechniquesAjit-Legiment_Techniques
Ajit-Legiment_Techniques
guest66dc5f562 views
Automated JavaScript Deobfuscation - PacSec 2007 von Stephan Chenette
Automated JavaScript Deobfuscation - PacSec 2007Automated JavaScript Deobfuscation - PacSec 2007
Automated JavaScript Deobfuscation - PacSec 2007
Stephan Chenette1.5K views
Code obfuscation, php shells & more von Mattias Geniar
Code obfuscation, php shells & moreCode obfuscation, php shells & more
Code obfuscation, php shells & more
Mattias Geniar11.2K views
Physical Penetration Testing - RootedCON 2015 von Hykeos
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015
Hykeos5.6K views
Security Policy Checklist von backdoor
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
backdoor6.8K views
A combined approach to search for evasion techniques in network intrusion det... von eSAT Journals
A combined approach to search for evasion techniques in network intrusion det...A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...
eSAT Journals230 views
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang von Lyon Yang
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon YangPractical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Lyon Yang3.5K views
Topics in network security von Nasir Bhutta
Topics in network securityTopics in network security
Topics in network security
Nasir Bhutta10.1K views
Bsides to 2016-penetration-testing von Haydn Johnson
Bsides to 2016-penetration-testingBsides to 2016-penetration-testing
Bsides to 2016-penetration-testing
Haydn Johnson847 views
LUG-BG - Kostadin Slavkov - PostgreSQL 10 von Marian Marinov
LUG-BG - Kostadin Slavkov - PostgreSQL 10LUG-BG - Kostadin Slavkov - PostgreSQL 10
LUG-BG - Kostadin Slavkov - PostgreSQL 10
Marian Marinov436 views
Web attacks using obfuscated script von Amol Kamble
Web attacks using  obfuscated scriptWeb attacks using  obfuscated script
Web attacks using obfuscated script
Amol Kamble621 views

Similar a Penetration testing dont just leave it to chance

Ethical Hacking Conference 2015- Building Secure Products -a perspective von
 Ethical Hacking Conference 2015- Building Secure Products -a perspective Ethical Hacking Conference 2015- Building Secure Products -a perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspectiveDr. Anish Cheriyan (PhD)
1.5K views39 Folien
Security Checkpoints in Agile SDLC von
Security Checkpoints in Agile SDLCSecurity Checkpoints in Agile SDLC
Security Checkpoints in Agile SDLCRahul Raghavan
1.1K views27 Folien
Software Security Assurance for DevOps von
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOpsBlack Duck by Synopsys
640 views29 Folien
Fendley how secure is your e learning von
Fendley how secure is your e learningFendley how secure is your e learning
Fendley how secure is your e learningBryan Fendley
798 views62 Folien
Experience Sharing on School Pentest Project (Updated) von
Experience Sharing on School Pentest Project (Updated)Experience Sharing on School Pentest Project (Updated)
Experience Sharing on School Pentest Project (Updated)eLearning Consortium 電子學習聯盟
476 views40 Folien
smpef von
smpefsmpef
smpefrsharmam
85 views41 Folien

Similar a Penetration testing dont just leave it to chance(20)

Ethical Hacking Conference 2015- Building Secure Products -a perspective von Dr. Anish Cheriyan (PhD)
 Ethical Hacking Conference 2015- Building Secure Products -a perspective Ethical Hacking Conference 2015- Building Secure Products -a perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspective
Security Checkpoints in Agile SDLC von Rahul Raghavan
Security Checkpoints in Agile SDLCSecurity Checkpoints in Agile SDLC
Security Checkpoints in Agile SDLC
Rahul Raghavan1.1K views
Fendley how secure is your e learning von Bryan Fendley
Fendley how secure is your e learningFendley how secure is your e learning
Fendley how secure is your e learning
Bryan Fendley798 views
David Patterson IT Security Resumes 2016 von David Patterson
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
David Patterson750 views
OWASP Secure Coding Quick Reference Guide von Aryan G
OWASP Secure Coding Quick Reference GuideOWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference Guide
Aryan G935 views
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach von IRJET Journal
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET Journal28 views
5 howtomitigate von richarddxd
5 howtomitigate5 howtomitigate
5 howtomitigate
richarddxd410 views
Current Topics paper A4 submission 4.30.2015 Master Copy von Tommie Walls
Current Topics paper A4 submission 4.30.2015 Master CopyCurrent Topics paper A4 submission 4.30.2015 Master Copy
Current Topics paper A4 submission 4.30.2015 Master Copy
Tommie Walls192 views
CohenNancyPresentation.ppt von mypc72
CohenNancyPresentation.pptCohenNancyPresentation.ppt
CohenNancyPresentation.ppt
mypc721 view
Continuous Security Testing von Ray Lai
Continuous Security TestingContinuous Security Testing
Continuous Security Testing
Ray Lai325 views
How to develop an AppSec culture in your project von 99X Technology
How to develop an AppSec culture in your project How to develop an AppSec culture in your project
How to develop an AppSec culture in your project
99X Technology191 views
How PCI And PA DSS will change enterprise applications von Ben Rothke
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
Ben Rothke683 views

Más de Dr. Anish Cheriyan (PhD)

Introducing MLOps.pdf von
Introducing MLOps.pdfIntroducing MLOps.pdf
Introducing MLOps.pdfDr. Anish Cheriyan (PhD)
872 views36 Folien
Cyber Security Threat Modeling von
Cyber Security Threat ModelingCyber Security Threat Modeling
Cyber Security Threat ModelingDr. Anish Cheriyan (PhD)
444 views39 Folien
ABC of developer test von
ABC of developer testABC of developer test
ABC of developer testDr. Anish Cheriyan (PhD)
125 views14 Folien
Software defined vehicles,automotive standards (safety, security), agile cont... von
Software defined vehicles,automotive standards (safety, security), agile cont...Software defined vehicles,automotive standards (safety, security), agile cont...
Software defined vehicles,automotive standards (safety, security), agile cont...Dr. Anish Cheriyan (PhD)
787 views24 Folien
Taking a Career Path which you are deeply passionate about von
Taking a Career Path which you are deeply passionate aboutTaking a Career Path which you are deeply passionate about
Taking a Career Path which you are deeply passionate aboutDr. Anish Cheriyan (PhD)
139 views9 Folien
Quality 4.0 and reimagining quality von
Quality 4.0 and reimagining qualityQuality 4.0 and reimagining quality
Quality 4.0 and reimagining qualityDr. Anish Cheriyan (PhD)
380 views27 Folien

Más de Dr. Anish Cheriyan (PhD)(15)

Software defined vehicles,automotive standards (safety, security), agile cont... von Dr. Anish Cheriyan (PhD)
Software defined vehicles,automotive standards (safety, security), agile cont...Software defined vehicles,automotive standards (safety, security), agile cont...
Software defined vehicles,automotive standards (safety, security), agile cont...
Quality management in continuous delivery and dev ops world pm footprints v1 von Dr. Anish Cheriyan (PhD)
Quality management in continuous delivery and dev ops world  pm footprints v1Quality management in continuous delivery and dev ops world  pm footprints v1
Quality management in continuous delivery and dev ops world pm footprints v1
Best of Lean Startup and Scrum for product development and enhancement von Dr. Anish Cheriyan (PhD)
Best of  Lean Startup and Scrum  for product development and enhancementBest of  Lean Startup and Scrum  for product development and enhancement
Best of Lean Startup and Scrum for product development and enhancement

Último

Plant Design Report-Oil Refinery.pdf von
Plant Design Report-Oil Refinery.pdfPlant Design Report-Oil Refinery.pdf
Plant Design Report-Oil Refinery.pdfSafeen Yaseen Ja'far
9 views10 Folien
Pitchbook Repowerlab.pdf von
Pitchbook Repowerlab.pdfPitchbook Repowerlab.pdf
Pitchbook Repowerlab.pdfVictoriaGaleano
8 views12 Folien
Integrating Sustainable Development Goals (SDGs) in School Education von
Integrating Sustainable Development Goals (SDGs) in School EducationIntegrating Sustainable Development Goals (SDGs) in School Education
Integrating Sustainable Development Goals (SDGs) in School EducationSheetalTank1
11 views29 Folien
Design_Discover_Develop_Campaign.pptx von
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptxShivanshSeth6
55 views20 Folien
REACTJS.pdf von
REACTJS.pdfREACTJS.pdf
REACTJS.pdfArthyR3
37 views16 Folien
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx von
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptxlwang78
188 views19 Folien

Último(20)

Integrating Sustainable Development Goals (SDGs) in School Education von SheetalTank1
Integrating Sustainable Development Goals (SDGs) in School EducationIntegrating Sustainable Development Goals (SDGs) in School Education
Integrating Sustainable Development Goals (SDGs) in School Education
SheetalTank111 views
Design_Discover_Develop_Campaign.pptx von ShivanshSeth6
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptx
ShivanshSeth655 views
REACTJS.pdf von ArthyR3
REACTJS.pdfREACTJS.pdf
REACTJS.pdf
ArthyR337 views
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx von lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78188 views
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf von AlhamduKure
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
AlhamduKure10 views
MongoDB.pdf von ArthyR3
MongoDB.pdfMongoDB.pdf
MongoDB.pdf
ArthyR351 views
Design of machine elements-UNIT 3.pptx von gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy38 views
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... von csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn13 views
GDSC Mikroskil Members Onboarding 2023.pdf von gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil68 views

Penetration testing dont just leave it to chance

  • 1. Name of the Speakers :  Anish Cheriyan, Director Quality and Centre of Excellence-Cyber Security  Sriharsha Narayanam , Test Architect and Cyber Security Test Engineering -COE Team Company Name : Huawei Technologies India Private Limited
  • 2. ● Introduction ● Principles of Security for Secure Products ● Security in Product Development Life Cycle ● Penetration Testing Approach ● Details of Pen Test ● Cyber Security- a mindset and some anti patterns ● Conclusion
  • 9.  Favor simplicity ◦ Use fail safe defaults ◦ Do not expect expert users  Trust with reluctance ◦ Employ a small trusted computing base ◦ Grant the least privilege possible  Promote privacy  Compartmentalize  Defend in Depth ◦ Use Community resource-no security by obscurity  Monitor and trace Reference: Reference: Software Security by Michael Hicks, Coursera
  • 10. Reference: Reference: Software Security by Michael Hicks, Coursera
  • 21. Requirement Design Coding Testing Release •General Security Requirement Analysis •Attack Surface Analysis • Threat Modeling - STRIDE(Micro soft) •Testability Analysis •Secure Architecture and Design. •Security Design guidelines •Security Test Strategy and Test Case •Secure Coding Guidelines (cert.org- good reference) •Static Check Tools like Fortify, Coverity (Ref- owasp.org) •Code Reviews •Security Test Cases •Penetration Testing Approach (Reconnaissa nce, Scanning, Attack, Managing access) •Anti Virus •Continuous Delivery System (Inspection and Secure Test)
  • 22. Reference: https://msdn.microsoft.com Identify assets. Identify the valuable assets that your systems must protect. Create an architecture overview. Use simple diagrams and tables to document the architecture of your application, including subsystems, trust boundaries, and data flow. Decompose the application. Decompose the architecture of your application, including the underlying network and host infrastructure design, to create a security profile for the application. Identify the threats. Keeping the goals of an attacker in mind, and with knowledge of the architecture and potential vulnerabilities of your application, identify the threats that could affect the application. Document the threats. Document each threat using a common threat template that defines a core set of attributes to capture for each threat. Rate the threats. Rate the threats to prioritize and address the most significant threats first.
  • 26. Reference: https://www.owasp.org/index.php/Application_Security_Architecture_Cheat_Sheet#DRAFT_CHEAT_SHEET_- _WORK_IN_PROGRESS •Business Model •Data Essential •End Users •Third Party •Administrators •Regulations Business Requirements •Network •Systems •Infrastructure Monitoring •Virtualization and Externalization Infrastructure Requirements •Environments •Data Processing •Access •Application Monitoring •Application Design Application Requirements •Operations •Change Management •Software Development •Corporate Security Program Requirements www.unicomlearning.com/IT_Security_and_Ethical_Hacking
  • 27. Reference: https://owasp.org Input Validation Output Encoding Authn. & Pwd. Mgmt. Session Management Access Control Cryptographic Practices Error Handling and Logging Data Encryption Communicati on Security System Configuration File Management Memory Management Gen. Coding Practices www.unicomlearning.com/IT_Security_and_Ethical_Hacking
  • 28. Further Reading: Threat Modeling- Frank Swiderski, Window Snyder, A Few Billion Lines of Code Later: Using Static Analysis to Find Bugs in the Real World - http://cacm.acm.org/magazines/2010/2/69354-a-few-billion-lines-of-code-later/fulltext Trust boundary code (Threat Model) Static Tool Execution Manual Code Review While doing the code review we can take the inputs from the code in the trust boundary, issues from the static tools like Fortiy, Coverity etc and put the focus at the right place for the Code Review
  • 29. •Information Gathering (About the system, environment etc.) •Scan the system •Threat Analysis •Usage of the Static analyzer (Run fortify, Coverity, Appscan, Nessus, NMAP etc) •Right tool usage •Vulnerability Analysis •Fuzz Testing •Penetration testing •Use /Develop right set of tools to attack •Raise Defects Reconnaiss ance Scanning Attack Managing Access Test Strategy
  • 31. Understands the typical application scenario. Analyse the system topology, architecture etc. Analyse the Threat Model , Security design and identifies the trust boundaries., Apply Penetration Test Analysis and Design Review and Analyse the Open source and third party software Analyse report of non dynamic examination like Fortify, Coverity. Analyze the information like communication matrix, product manual. . etc Conduct the code verification from security perspective Conduct penetration testing (Information gathering, Scanning, Attack, Defects)
  • 32. Web Security Network Security DB Security OS Security Mobile Security Open Source Security Password Security Tools to be used Code Vulnerabilities Validation Penetration Test Analysis and Design Top 3 Attacks to be Focused Customer Deployment Topology Threat Modeling based Scenarios Penetration Test Approach Attack Vectors / Surface Automation ? Country Specific Security Test Case Database Good practice inheritance from Security defects from past Security Test Strategy - What to Cover ?
  • 33. Threat modeling Analysis Level Vulnerability analysis. System Level and Feature Tools & Version Analysis Gather Overall Information Inputs from Baseline Test Case from Test Scenarios Exploratory Pen Testing With designed Cases Perform Scanning Defect Based Test Cases Defects Analysis Manage Access Penetration Testing Analysis overall flow Output Penetration Test Scenarios Penetration Test Cases Defects 1. Damage potential Assessment 2. New Test Cases
  • 34.  Reconnaissance is a the first and the key phase of penetration testing where the information is gathered.  The more time you spend collecting information on your target, the more likely you are to be successful in the later phases. There can be a checklist based approach for information gathering but it need not be constrained to the list.  Information Gathering helps teams to think about the product properties upfront. ...So On Reconnaissance / Information Gathering Category Suggestive Informations to be gathered / verified Actual Information General Informatio n List of IP addresses that can be scanned Target OS and File permission information Information about the LOG FILE and their paths Information about the DATA FILE Location, and their format Storage mechanism of the USERNAME/PASSWORD of the application
  • 35. Reconnaissance / Information Gathering Few Tools for WebApplication Reconnaissance  Wappalyzer  Passive Recon  Ground Speed [http://www.slideshare.net/groundspeed/groundspeed- presentation-at-the-owasp-nynj]
  • 36. Software URL Description Maltego http://www.paterva.com/web5 The defacto standard for mining data on individuals and companies. Comes in a free community version and paid version. Nessus http://tenable.com/products/nessus A vulnerabilty scanning tool available in paid and free versions. Nessus is useful for finding and documenting vulnerabilities mostly from the inside of a given network. IBM AppScan http://www- 01.ibm.com/software/awdtools/appscan IBM's automated Web application security testing suite. eEye Retina http://www.eeye.com/Products/Retina.asp x Retina is an an automated network vulnerability scanner that can be managed from a single web-based console. It can be used in conjunction with Metasploit where if an exploit exists in Metasploit, it can be launched directly from Retina to verify that the vulnerability exists. Nexpose http://www.rapid7.com Nexpose is a vulnerability scanner from the same company that brings you Metasploit. Available in both free and paid versions that differ in levels of support and features. OpenVAS http://www.openvas.org OpenVAS is a vulnerability scanner that originally started as a fork of the Nessus project. The actual security scanner is accompanied with a daily updated feed of Network Vulnerability Tests (NVTs), over 20,000 in total (as of January 2011) HP WebInspect https://www.fortify.com/products/web_ins pect.html HP WebInspect performs web application security testing and assessment for complex web applications. Supports JavaScript, Flash, Silverlight and others. HP SWFScan https://h30406.www3.hp.com/campaigns/ 2009/wwcampaign/1- 5TUVE/index.php?key=swf HP SWFScan is a free tool developed by HP Web Security Research Group to automatically find security vulnerabilities in applications built on the Flash platform. Useful for decompiling flash apps and finding hard-coded credentials, etc. THC IPv6 Attack Toolkit http://www.thc.org/thc-ipv6 The largest single collection of tools designed to exploit vulnerabilities in the IPv6 and ICMP6 protocols. Pen Test Tools and Guidelines- http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines Security Tools and Version Analysis Tools Analysis helps the teams to select the applicable tools upfront and build required competency to use them / acquire license , well before test execution phase.
  • 37.  Scanning is the phase where the vulnerabilities and the weak areas in the system / target can be identified.  Tools to be finalized based on the application scope. • Based on the Threat Modeling Analysis, understand the Trust Boundary. – Analyze the present Risk Mitigation mechanism and derive test scenarios – Analysis the proposed Risk Mitigation mechanism and device the test scenarios • Threat Modeling analysis to be done both at System and at Sub system level ...So On ...So On System Scanning and further Analysis Test Scenarios from Threat Modeling Analysis Category Tool / Technique Applicability Analysis Scanning of the system under test using Static Code Analyzer Fortify , Coverity Determining if a system is alive Scanning Application AppScan , Acunetix, RSAS , QRADAR. . Entity or Process Threat Type Applicable ? Test Scenario based on Current Mitigation Test Scenario based on Proposed Mitigation Requirement 1 S Yes T No R I D E
  • 38.  Vulnerability analysis is a process in which the vulnerability analysis of the system & Feature are conducted. The various ways in which it can be done are : ◦ Threat Modeling analysis ◦ Reconnaissance – Information Gathering ◦ System Level Vulnerability based on the Security area (Overlap with Threat Modeling Analysis) ◦ Feature level Vulnerability based on the Security area (Overlap with Threat Modeling Analysis) Security Area Does this Feature interact with Trust Boundary SSL Configuratio n used Encryption Algorithm used Anti- Attack Protection Identity Manageme nt Password Management System Level Analysis Feature 1 ...So On System and Feature level Vulnerability Analysis
  • 39. Systematic Penetration Testing – Defects Examples Web Server version based Defects Web Server version based Defects Encryption issues Address ID issue Session ID bases Privilege Escalation CSRF issue – Form key User scenario Bases SQL injection
  • 41.  Attack Surface analysis, Threat modeling not deeply practiced  Secure design and code practices not practiced well  Ignoring some errors of Fortify /Coverity and other tools. Sometimes considering them as false positives  Relying too much on Testing  “This is not a valid scenario. Customer would never test this way”.  “Innocent until Proven”- It should be “Guilty unless proven” Reference: Reference: Software Security by Michael Hicks, Coursera
  • 42.  Build Security into the Life Cycle of product development  Focus on Security Competency  Assume Nothing, Believe Nobody, Check Everything.  Following Penetration Test Design Methods- Reconnaissance-Scanning-Attack-Manage Access.
  • 44.  www.cert.org  www.owasp.org  http://pr.huawei.com/en/connecting-the- dots/cyber-security/  http://pr.huawei.com/en/connecting-the- dots/cyber-security/hw- 401493.htm#.VV6DBfBCijM  https://msdn.microsoft.com/en- us/security/aa570330.aspx  Building Secure Software –John Viega, Gary McGraw  Coursera Course - Software Security by Michael Hicks, University of Maryland
  • 45. Organized by: UNICOM Trainings & Seminars Pvt. Ltd. contact@unicomlearning.com www.unicomlearning.com/IT_Security_and_Ethical_Hacking Speaker Name: Anish Cheriyan , Sriharsha Narayanam Email ID: anishcheriyan@huawei.com, @anishcheriyan sriharsha.narayanam@huawei.com