Penetration Testing & CountermeasuresSecurity Penetration ServicesAnnounced vs. Unannounced Penetration TestingRules of EngagementPenetration Testing PhasesFootprintingScanning/Probing: nmapScanning/Probing: nessusEnumeration: hackbotGaining Access: packet capturesPhysical AccessWireless SecurityCounter Measures 1Counter Measures 2Counter Measures 3Future ImprovementsDemo: Retina Network Security ScannerBibliographyPenetration Testing & CountermeasuresPaul Fong & Cai YuCS6915 May 2003Security Penetration ServicesGoal: help organizations secure their systemsSkill set: equivalent to system administratorsRecord keeping & ethicsAnnounced vs. Unannounced Penetration TestingAnnounced testingProsEfficientTeam orientedConsHoles may be fixed as discovered & block further penetrationFalse sense of securityUnannounced testingProsGreater range of testingConsResponse may block further penetrationRequires strict escalation processImpact operationsRules of EngagementType of attacks allowed (no DoS)Off-limits machines & files (passwords)Designated machines or networksTest PlanContactsPenetration Testing PhasesFootprintScanning/ProbingEnumerationGain AccessEscalate PrivilegesExploitCover TracksCreate BackdoorsFootprintingProfile target passivelyAddress blocksInternet IP addressesAdministratorsTechniquesGooglingWhois lookupsScanning/Probing: nmapActive probingNMAPPort scannerwww.insecure.orgDiscovers:Available HostsPorts (services)OS & versionFirewallsPacket filtersScanning/Probing: nessuswww.nessus.orgVulnerability scanningCommon configuration errorsDefault configuration weaknessesWell-known vulnerabilitiesEnumeration: hackbotIdentify accounts, files & resourcesWs.obit.nl/hackbotFinds:CGIServicesX connection checkGaining Access: packet capturesEavesdroppingEthereal, www.ethereal.comPhysical AccessBoot loader & BIOS vulnerabilitiesGRUB loaderNo passwordAllows hacker to boot into single-user w/root accessPassword crackersJohn the RipperCrackWireless SecurityWar driving with directional antennaWired Equivalent Privacy (WEP) vulnerabilitiesPenetration Tools:WEPcrackAirSnortCounter Measures 1Update latest patches.Change default settings/optionsSetup password and protect your password file.Install anti-virus software and keep it updated.Counter Measures 2Install only required softwares, open only required ports.Maintain a good backup.Set BIOS password, system loader password, or other passwords that necessary.Have a good emergency plan.Counter Measures 3Monitor your system if possible.Have a good administrator.Future ImprovementsCorrection of weaknesses uncovered by the penetration exerciseAutomate and customize the penetration test processUse of intrusion detection systemsUse of honeypots and honeynetsDemo: Retina Network Security ScannerCreated by eEye Digital Security, Retina Network Security Scanner is recognized as the #1 rated network vulnerability assessment scanner by Network World magazine. Retina sets the standard in terms of speed, ease of use, reporting, non-intrusiveness and advanced vulnerability detection capabilities. Retina incorporates the most comprehensive and up-to-date vulnerabilities database -- automatically downloaded at the beginning of every Retina session.BibliographyKlevinsky, et. al. Hack I.T.-Security Through Penetration Testing. ISBN 0-201-71956-8.McClure, et. al. Hacking Exposed: Network Security Secrets and Solutions, 2nd edition, ISBN 0-07-222742-7.Sage, Scott & Lear, Lt. Col. Tom. “A Penetration Analysis of UCCS Network Lab Machines,” March, 2003. UCCS course CS691c.Warren Kruse, et. al. Computer Forensics. ISBN 0-201-70719-5Ed Skoudis, et. al. Counter Hack. ISBN 0-13-033273-9Lance Spitzner, et. al. Honeypots. ISBN 0-321-10895-7Retina network security scanner,
View Full Document