SlideShare a Scribd company logo
1 of 26
How to pentest
Let’s make things easy: webapp test
Disclaimer
Never ever try to do a pentest based on this slideshow
Many things are not included because
I don’t know everything
90 minutes is not enough to explain this
How to hack - Hackers 1995 1:23:52
The source for this
http://www.pentest-standard.org
https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents
Structure of this presentation
Project management part
● 99% of the people think this is boring
● The more projects you do, the more you value a good project management
The hack part
● Bad news, only the second part will deal with this
● Business logic goodies
Is this legal?
Check that you own the system (warning, trolling potential ahead)
If not, check that the client who pays you owns the system
Check that the project already started - Once I did not check this :)
If possible, know ahead what is test env and what is production env
If possible, test the test environment
Basic tests should be done on prod as well
Check the IP range at least twice
Pre-engagement
Estimate time
Define scope
Define scope exactly - very very important
Avoid scope creep
Use a questionnaire (pentest-standard.org)
Pro-tip: provide your static external IP address to the client before any test starts
The Most Accurate Hacking Scene Ever
Typical web questionnaire
● How many web applications are being assessed?
● How many login systems are being assessed?
● How many static pages are being assessed? (approximate)
● How many dynamic pages are being assessed? (approximate)
● Will the source code be made readily available?
● Will there be any kind of documentation?
○ If yes, what kind of documentation?
● Will static analysis be performed on this application?
● Does the client want fuzzing performed against this application?
● Does the client want role-based testing performed against this application?
● Does the client want credentialed scans of web applications performed?
Define goal of the test!
Pentesters usually want to be domain admin!
Not every client wants this
Define limits
E.g. I promise not to use local root exploits to gain root privileges on prod
I promise not to use any memory corruption exploits
I promise not to dump the whole database
I promise not to lockout all the users from the prod
Communications - PGP / Signal instead of plain text email
Communications - just don’t use public IRC
Numb3rs' description of IRC
Blind test / double blind test
Blind test
Pentesters have same starting point as any hacker, no info, no credz
Double blind
Will the security monitoring group/ IT group know about the test?
If not, what happens when they detect an incident?
Gather intelligence
Most overlooked part of the test
People look at this as boring - I want XSS and SQLi and RCE!
Hot topic - find resources which are live for 1-2 minutes
Professionals know proper intelligence gathering is key to success
Can find new entries to the company network even the admins don’t know about
There are thousands of non-technical ways for intelligence gathering
Use your creativity
Check http://www.pentest-standard.org/index.php/Intelligence_Gathering
Gather intelligence - technical stuff
● Passive Reconnaissance
○ WHOIS Lookups
○ BGP looking glasses
○ Google Dork
● Active Footprinting
○ Port Scanning - Zsombor NMAP
○ Banner Grabbing
○ SNMP Sweeps
○ Zone Transfers
○ SMTP Bounce Back
○ DNS Discovery
○ Forward/Reverse DNS - SHARED HOSTING FTW!!!!!
○ DNS Bruteforce
○ Web Application Discovery
○ Virtual Host Detection & Enumeration
If this is an internal test system
Ask to turn off IPS/WAF
If behind cloud WAF, you might be able to completely bypass it
Ask to turn off Captcha
Discuss with the system admin/system
owner/whatever
Whitebox/grey box /black box???
Vulnerability assessment / ethical hacking / both
● https://silentsignal.hu/docs/S2_Fogalomtar_v1.pdf
Ask for users, probably users from different roles
Ask for 2 users on the same level
2 admin + 2 user == 4 user to test with
Threat agent/capability analysis
Internal External
Employees Business
Partners
Management (executive, middle) Competitors
Administrators (network, system, server) Contractors
Developers Suppliers
Engineers Nation
States
Technicians
Organized Crime
Contractors (with their external users) Hacktivists
General user community Script Kiddies (recreational
Understand the application
First, always click through the app
Map all the functionalities
Read the man/doc if any
● Check for credentials in the doc, it happens
What to test
A good test needs
An experienced, motivated tester with dedicated time
Good tools (e.g. automated scanner, …)
The tester should know how to use the tools, and when not to use it
The tester should know how to create new tool if needed
Automated scanners
Automated scanners are good at many things
● Find SQLi, test many many parameters, create a good baseline test
Automated scanners are bad at
● Find/exploit business logic flaws
● Exploiting found vulns
● Chaining vulns
● Find vulns in the not first step of a workflow (multi-page forms)
Chuck S05E05 29:41
Business logic tests
Rewrite the price for the item to be purchased
● A.k.a how college students were able to buy flat-screen TV when it was new
to the market
Navigate to last form page to bypass security checks
Rewrite the account ID to see someone else’s account
● Error, account #x belongs to client #z
○ Rewrite both #x and #z
Use the same coupon multiple times in the same session
Business logic tests
Bypass Captcha-s via OCR
Bypass password resets, bypass 2FA
Transfer -10000 USD to “friend”
Access “company news” before release - predictable sequential news ID
● Use for trading before market know this
Jeremiah Grossman; Arian Evans;Trey Ford
Get Rich or Die Trying - Making Money on the Web the black hat way - 2009
https://www.youtube.com/watch?v=SIMF8bp5-qg
MR Robot S01E03 - 35:03

More Related Content

Similar to Hogy néz ki egy pentest meló a gyakorlatban?

Intro to-ssdl--lone-star-php-2013
Intro to-ssdl--lone-star-php-2013Intro to-ssdl--lone-star-php-2013
Intro to-ssdl--lone-star-php-2013
nanderoo
 
Matt Eakin - The New Tester Skillset
Matt Eakin - The New Tester SkillsetMatt Eakin - The New Tester Skillset
Matt Eakin - The New Tester Skillset
QA or the Highway
 
OSMC 2015 | Testing in Production by Devdas Bhagat
OSMC 2015 | Testing in Production by Devdas BhagatOSMC 2015 | Testing in Production by Devdas Bhagat
OSMC 2015 | Testing in Production by Devdas Bhagat
NETWAYS
 

Similar to Hogy néz ki egy pentest meló a gyakorlatban? (20)

Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
Байки із пожежного депо або як працює Big Data в Sigma Software, Денис Пишьєв,
 
Intro to-ssdl--lone-star-php-2013
Intro to-ssdl--lone-star-php-2013Intro to-ssdl--lone-star-php-2013
Intro to-ssdl--lone-star-php-2013
 
It’s Time to Automate Your Exploratory Testing
It’s Time to Automate Your Exploratory TestingIt’s Time to Automate Your Exploratory Testing
It’s Time to Automate Your Exploratory Testing
 
Demise of test scripts rise of test ideas
Demise of test scripts rise of test ideasDemise of test scripts rise of test ideas
Demise of test scripts rise of test ideas
 
Jason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional ToolsJason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional Tools
 
Ui Testing with Ghost Inspector
Ui Testing with Ghost InspectorUi Testing with Ghost Inspector
Ui Testing with Ghost Inspector
 
Automated tests
Automated testsAutomated tests
Automated tests
 
Matt Eakin - The New Tester Skillset
Matt Eakin - The New Tester SkillsetMatt Eakin - The New Tester Skillset
Matt Eakin - The New Tester Skillset
 
Anomaly detection in deep learning
Anomaly detection in deep learningAnomaly detection in deep learning
Anomaly detection in deep learning
 
Secure at Speed @ Solent.tech
Secure at Speed @ Solent.techSecure at Speed @ Solent.tech
Secure at Speed @ Solent.tech
 
How to get started with Site Reliability Engineering
How to get started with Site Reliability EngineeringHow to get started with Site Reliability Engineering
How to get started with Site Reliability Engineering
 
Identifying a Compromised WordPress Site
Identifying a Compromised WordPress SiteIdentifying a Compromised WordPress Site
Identifying a Compromised WordPress Site
 
Five Easy Ways to QA Your Drupal Site
Five Easy Ways to QA Your Drupal SiteFive Easy Ways to QA Your Drupal Site
Five Easy Ways to QA Your Drupal Site
 
From SLO to GOTY
From SLO to GOTYFrom SLO to GOTY
From SLO to GOTY
 
OSMC 2015 | Testing in Production by Devdas Bhagat
OSMC 2015 | Testing in Production by Devdas BhagatOSMC 2015 | Testing in Production by Devdas Bhagat
OSMC 2015 | Testing in Production by Devdas Bhagat
 
OSMC 2015: Testing in Production by Devdas Bhagat
OSMC 2015: Testing in Production by Devdas BhagatOSMC 2015: Testing in Production by Devdas Bhagat
OSMC 2015: Testing in Production by Devdas Bhagat
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Test & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automatedTest & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automated
 
Building an Open Source AppSec Pipeline
Building an Open Source AppSec PipelineBuilding an Open Source AppSec Pipeline
Building an Open Source AppSec Pipeline
 
Lessons Learned When Automating
Lessons Learned When AutomatingLessons Learned When Automating
Lessons Learned When Automating
 

More from hackersuli

[HUN] 2023_Hacker_Suli_Meetup_Cloud_DFIR_Alapok.pptx
[HUN] 2023_Hacker_Suli_Meetup_Cloud_DFIR_Alapok.pptx[HUN] 2023_Hacker_Suli_Meetup_Cloud_DFIR_Alapok.pptx
[HUN] 2023_Hacker_Suli_Meetup_Cloud_DFIR_Alapok.pptx
hackersuli
 

More from hackersuli (20)

2024_hackersuli_mobil_ios_android ______
2024_hackersuli_mobil_ios_android ______2024_hackersuli_mobil_ios_android ______
2024_hackersuli_mobil_ios_android ______
 
[HUN[]Hackersuli] Hornyai Alex - Elliptikus görbék kriptográfiája
[HUN[]Hackersuli] Hornyai Alex - Elliptikus görbék kriptográfiája[HUN[]Hackersuli] Hornyai Alex - Elliptikus görbék kriptográfiája
[HUN[]Hackersuli] Hornyai Alex - Elliptikus görbék kriptográfiája
 
[Hackersuli]Privacy on the blockchain
[Hackersuli]Privacy on the blockchain[Hackersuli]Privacy on the blockchain
[Hackersuli]Privacy on the blockchain
 
[HUN] 2023_Hacker_Suli_Meetup_Cloud_DFIR_Alapok.pptx
[HUN] 2023_Hacker_Suli_Meetup_Cloud_DFIR_Alapok.pptx[HUN] 2023_Hacker_Suli_Meetup_Cloud_DFIR_Alapok.pptx
[HUN] 2023_Hacker_Suli_Meetup_Cloud_DFIR_Alapok.pptx
 
[Hackersuli][HUN] GSM halozatok hackelese
[Hackersuli][HUN] GSM halozatok hackelese[Hackersuli][HUN] GSM halozatok hackelese
[Hackersuli][HUN] GSM halozatok hackelese
 
Hackersuli Minecraft hackeles kezdoknek
Hackersuli Minecraft hackeles kezdoknekHackersuli Minecraft hackeles kezdoknek
Hackersuli Minecraft hackeles kezdoknek
 
HUN Hackersuli - How to hack an airplane
HUN Hackersuli - How to hack an airplaneHUN Hackersuli - How to hack an airplane
HUN Hackersuli - How to hack an airplane
 
[HUN][Hackersuli] Cryptocurrency scams
[HUN][Hackersuli] Cryptocurrency scams[HUN][Hackersuli] Cryptocurrency scams
[HUN][Hackersuli] Cryptocurrency scams
 
[Hackersuli] [HUN] Windows a szereloaknan
[Hackersuli] [HUN] Windows a szereloaknan[Hackersuli] [HUN] Windows a szereloaknan
[Hackersuli] [HUN] Windows a szereloaknan
 
[HUN][Hackersuli] Szol a szoftveresen definialt radio - SDR alapok
[HUN][Hackersuli] Szol a szoftveresen definialt radio - SDR alapok[HUN][Hackersuli] Szol a szoftveresen definialt radio - SDR alapok
[HUN][Hackersuli] Szol a szoftveresen definialt radio - SDR alapok
 
[HUN] Hackersuli - Console and arcade game hacking – history, present, future
[HUN] Hackersuli - Console and arcade game hacking – history, present, future[HUN] Hackersuli - Console and arcade game hacking – history, present, future
[HUN] Hackersuli - Console and arcade game hacking – history, present, future
 
Hackersuli - Linux game hacking with LD_PRELOAD
Hackersuli - Linux game hacking with LD_PRELOADHackersuli - Linux game hacking with LD_PRELOAD
Hackersuli - Linux game hacking with LD_PRELOAD
 
[HUN][hackersuli] Malware avengers
[HUN][hackersuli] Malware avengers[HUN][hackersuli] Malware avengers
[HUN][hackersuli] Malware avengers
 
[Hackersuli][HUN]MacOS - Going Down the Rabbit Hole
[Hackersuli][HUN]MacOS - Going Down the Rabbit Hole[Hackersuli][HUN]MacOS - Going Down the Rabbit Hole
[Hackersuli][HUN]MacOS - Going Down the Rabbit Hole
 
[HUN][Hackersuli] Androidos alkalmazássebészet, avagy gumikesztyűt fel és irá...
[HUN][Hackersuli] Androidos alkalmazássebészet, avagy gumikesztyűt fel és irá...[HUN][Hackersuli] Androidos alkalmazássebészet, avagy gumikesztyűt fel és irá...
[HUN][Hackersuli] Androidos alkalmazássebészet, avagy gumikesztyűt fel és irá...
 
[HUN][Hackersuli] iOS hekkelés, avagy egyik szemünk zokog, a másik meg kacagv...
[HUN][Hackersuli] iOS hekkelés, avagy egyik szemünk zokog, a másik meg kacagv...[HUN][Hackersuli] iOS hekkelés, avagy egyik szemünk zokog, a másik meg kacagv...
[HUN][Hackersuli] iOS hekkelés, avagy egyik szemünk zokog, a másik meg kacagv...
 
[Hackersuli][HUN] Greasemonkey, avagy fogod majd a fejed, hogy miért nem hasz...
[Hackersuli][HUN] Greasemonkey, avagy fogod majd a fejed, hogy miért nem hasz...[Hackersuli][HUN] Greasemonkey, avagy fogod majd a fejed, hogy miért nem hasz...
[Hackersuli][HUN] Greasemonkey, avagy fogod majd a fejed, hogy miért nem hasz...
 
Kriptovaluták, hashbányászat és okoscicák
Kriptovaluták, hashbányászat és okoscicákKriptovaluták, hashbányászat és okoscicák
Kriptovaluták, hashbányászat és okoscicák
 
Hogy jussunk ki lezárt hálózatokból?
Hogy jussunk ki lezárt hálózatokból?Hogy jussunk ki lezárt hálózatokból?
Hogy jussunk ki lezárt hálózatokból?
 
Hardware hacking 1x1 by Dnet
Hardware hacking 1x1 by DnetHardware hacking 1x1 by Dnet
Hardware hacking 1x1 by Dnet
 

Recently uploaded

Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 

Recently uploaded (20)

Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 

Hogy néz ki egy pentest meló a gyakorlatban?

  • 1. How to pentest Let’s make things easy: webapp test
  • 2. Disclaimer Never ever try to do a pentest based on this slideshow Many things are not included because I don’t know everything 90 minutes is not enough to explain this
  • 3. How to hack - Hackers 1995 1:23:52
  • 4. The source for this http://www.pentest-standard.org https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents
  • 5.
  • 6. Structure of this presentation Project management part ● 99% of the people think this is boring ● The more projects you do, the more you value a good project management The hack part ● Bad news, only the second part will deal with this ● Business logic goodies
  • 7. Is this legal? Check that you own the system (warning, trolling potential ahead) If not, check that the client who pays you owns the system Check that the project already started - Once I did not check this :) If possible, know ahead what is test env and what is production env If possible, test the test environment Basic tests should be done on prod as well Check the IP range at least twice
  • 8. Pre-engagement Estimate time Define scope Define scope exactly - very very important Avoid scope creep Use a questionnaire (pentest-standard.org) Pro-tip: provide your static external IP address to the client before any test starts
  • 9. The Most Accurate Hacking Scene Ever
  • 10. Typical web questionnaire ● How many web applications are being assessed? ● How many login systems are being assessed? ● How many static pages are being assessed? (approximate) ● How many dynamic pages are being assessed? (approximate) ● Will the source code be made readily available? ● Will there be any kind of documentation? ○ If yes, what kind of documentation? ● Will static analysis be performed on this application? ● Does the client want fuzzing performed against this application? ● Does the client want role-based testing performed against this application? ● Does the client want credentialed scans of web applications performed?
  • 11. Define goal of the test! Pentesters usually want to be domain admin! Not every client wants this Define limits E.g. I promise not to use local root exploits to gain root privileges on prod I promise not to use any memory corruption exploits I promise not to dump the whole database I promise not to lockout all the users from the prod Communications - PGP / Signal instead of plain text email
  • 12. Communications - just don’t use public IRC Numb3rs' description of IRC
  • 13. Blind test / double blind test Blind test Pentesters have same starting point as any hacker, no info, no credz Double blind Will the security monitoring group/ IT group know about the test? If not, what happens when they detect an incident?
  • 14. Gather intelligence Most overlooked part of the test People look at this as boring - I want XSS and SQLi and RCE! Hot topic - find resources which are live for 1-2 minutes Professionals know proper intelligence gathering is key to success Can find new entries to the company network even the admins don’t know about There are thousands of non-technical ways for intelligence gathering Use your creativity Check http://www.pentest-standard.org/index.php/Intelligence_Gathering
  • 15. Gather intelligence - technical stuff ● Passive Reconnaissance ○ WHOIS Lookups ○ BGP looking glasses ○ Google Dork ● Active Footprinting ○ Port Scanning - Zsombor NMAP ○ Banner Grabbing ○ SNMP Sweeps ○ Zone Transfers ○ SMTP Bounce Back ○ DNS Discovery ○ Forward/Reverse DNS - SHARED HOSTING FTW!!!!! ○ DNS Bruteforce ○ Web Application Discovery ○ Virtual Host Detection & Enumeration
  • 16. If this is an internal test system Ask to turn off IPS/WAF If behind cloud WAF, you might be able to completely bypass it Ask to turn off Captcha
  • 17. Discuss with the system admin/system owner/whatever Whitebox/grey box /black box??? Vulnerability assessment / ethical hacking / both ● https://silentsignal.hu/docs/S2_Fogalomtar_v1.pdf Ask for users, probably users from different roles Ask for 2 users on the same level 2 admin + 2 user == 4 user to test with
  • 18. Threat agent/capability analysis Internal External Employees Business Partners Management (executive, middle) Competitors Administrators (network, system, server) Contractors Developers Suppliers Engineers Nation States Technicians Organized Crime Contractors (with their external users) Hacktivists General user community Script Kiddies (recreational
  • 19. Understand the application First, always click through the app Map all the functionalities Read the man/doc if any ● Check for credentials in the doc, it happens
  • 21. A good test needs An experienced, motivated tester with dedicated time Good tools (e.g. automated scanner, …) The tester should know how to use the tools, and when not to use it The tester should know how to create new tool if needed
  • 22. Automated scanners Automated scanners are good at many things ● Find SQLi, test many many parameters, create a good baseline test Automated scanners are bad at ● Find/exploit business logic flaws ● Exploiting found vulns ● Chaining vulns ● Find vulns in the not first step of a workflow (multi-page forms)
  • 24. Business logic tests Rewrite the price for the item to be purchased ● A.k.a how college students were able to buy flat-screen TV when it was new to the market Navigate to last form page to bypass security checks Rewrite the account ID to see someone else’s account ● Error, account #x belongs to client #z ○ Rewrite both #x and #z Use the same coupon multiple times in the same session
  • 25. Business logic tests Bypass Captcha-s via OCR Bypass password resets, bypass 2FA Transfer -10000 USD to “friend” Access “company news” before release - predictable sequential news ID ● Use for trading before market know this Jeremiah Grossman; Arian Evans;Trey Ford Get Rich or Die Trying - Making Money on the Web the black hat way - 2009 https://www.youtube.com/watch?v=SIMF8bp5-qg
  • 26. MR Robot S01E03 - 35:03