Tactics and Penetration Testing 1 Overview Tactics A
- Slides: 18
Tactics and Penetration Testing 1
Overview Tactics: A procedure or set of maneuvers engaged in to achieve an end, an aim, or a goal. • Tactics • Penetration testing • Methods • Guidelines 2
Tactics • • Reconnaissance Exploit Communication Command Effect Reserve Implications 3
Critical Issues • What must you defend? – Mission of the organization – Assets of the organization • What can you defend? – Personnel limitations – Information limitations • What is likely to be attacked? IW-Strategy: 4
Reconnaissance Extend view of the World • Finding the network: Lookup, DNS, Routes • Locating key hosts: Services, Public Nodes • Profiling: Role, OS, Age, Content, Relations, hosts vs. decoys • Points of Access: Initial and Follow-on • Points of Vulnerability: technical, procedure • Points of Exploit: Change State • Points of Effect: Channel, Target, Cover IW-Strategy: 5
Exploit Methods by which to gain access or elevate privileges • System type: Service and OS • End goal: Impersonate, Intercept, Modify, Interrupt • Jump points: Local, Border, Remote • Methods: Vulnerability, Action, Reaction • Evidence: System, Defense, Network 6
Communication Transfer of information on progress • Indicators: External evidence of progress • Waypoints: Phases of method • Signaling: Present, Ready, Beacon • Reporting: Success, Fail, Options • Transfer: Information, Code, Command 7
Command Directing actions of hack • Manual vs. Automatic: interactive, shells • Command Channels: application, infrastructure • Encryption and encoding • Passive vs. Active • Intelligence: actions, options, productivity • Commanding Effects 8
Effect Mechanism for advancing hack • Employ, Corrupt, Install, Reconfigure • Phased effects • Split effects • Delegation, Propagation, Relocation • Confusion • Reconnaissance • Plant the flag, Capture the flag 9
Reserve Unused means of attack • Respond to defenses • Respond to detection • Branch points • Redundancy • Deception 10
Implications Replicating attacks Modifying attacks Operational damage Mission damage 11
Penetration Testing • Identify weakness • Inform response: Priority, Options, Effectiveness • Assess security performance • Communicate risk: “We think we’re really secure. ” 12
Methods • • • Appropriate to goal Within scenario Deception Bounded range Bounded damage 13
Guidelines Agreement on terms of penetration • Goal • Constraints • Liabilities • Indemnification • Success and Failure 14
Goal • • • Personnel Process Technology Service Readiness Exploration 15
Constraints • • Where applied When applied Scenario Resources: cost, effort, personnel, technology • Excluded methods 16
Liabilities • • • Technical instability Personnel distraction Financial dispersion Public perception Mission disruption 17
Indemnification • • • Authority Accountability Oversight and Decision Reporting Information handling Non-disclosure 18
- Web penetration testing roadmap
- Ncrack vs hydra
- Going rate pricing example
- Week 16 homework: penetration testing 1
- Owasp methodology
- Cryptography penetration testing
- Crystal box penetration testing
- Penetration testing portland
- Kali pentest
- Metasploit offensive security
- Osvdb-3268:
- Water penetration test for windows
- 666
- Logic based testing
- Definition of software testing
- Algori
- Positive testing vs negative testing
- Static testing and dynamic testing
- Spt hammer types