CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com Professionalizing Penetration Testing Professionalizing Penetration Tests Professionalizing Penetration Tests What will we discuss today? Agenda The Penetration Test – What is it? – How is it done? Problems in the current practice CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com – Why do we need an improved approach? Practical demonstration Professionalizing Penetration Tests CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com What is a Penetration Test? Rationale: “Improving the security of your site by breaking into it” Dan Farmer & Wietse Venema, 1993 http://www.fish.com/security/admin-guide-to-cracking.html A plausible definition: A localized and time-constrained attempt to breach the information security architecture using an attacker’s techniques Professionalizing Penetration Tests What are the goals of a Penetration Test? Goals To improve Information Security awareness To assess risk To mitigate risk immediately To reinforce the Information Security process CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com To assist in decision making processes To test the accuracy of the security policy in place Professionalizing Penetration Tests What are the final results? Final Results Clear description of scope and methodology Reproducible and accountable process High-level analysis and explanation (for upper/non-technical management) General recommendations and conclusions CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com Detailed findings Professionalizing Penetration Tests Why do we care? Growing Importance Penetration tests have become an integral part of standard security process Governments beginning to mandate periodic tests for certain agencies CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com Demand is rapidly increasing, and the process needs to be able to keep up Professionalizing Penetration Tests How are Penetration Tests done today? Penetration Test Stages Information Gathering Information Analysis and Planning Vulnerability Detection Penetration Attack/Privilege Escalation Analysis and Reporting CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com Clean-up Information Information Analysis and Vulnerability Detection Gathering Planning Penetration Attack/ Privilege Escalation Analysis and Reporting Clean Up Professionalizing Penetration Tests What works well today, and what does not? Penetration Test Stages Information Gathering Information Analysis and Planning Vulnerability Detection Penetration Attack/Privilege Escalation Analysis and Reporting CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com Clean-up Information Information Analysis and Vulnerability Detection Gathering Planning Penetration Attack/ Privilege Escalation Analysis and Reporting Clean Up Professionalizing Penetration Tests What are the problems today? Problems with ‘Information Analysis and Planning’ Stage Difficult and time consuming task of consolidating all information gathered and extracting high-level conclusions to help define attack strategy Hard to keep an up to date general overview of the components and their interaction CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com No specific tools aimed at addressing this phase Experienced and knowledgeable resources required for this stage, overall time constraint could limit the extent of their work Professionalizing Penetration Tests CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com What are the problems today? (cont.) Problems with ‘Penetration’ Stage Some tools available, but generally require customization and testing Publicly available exploits are generally unreliable and require customization and testing In-house developed exploits are generally aimed at specific tasks or engagements (mostly due to time constraints) Knowledge and specialization required for exploit and tool development Considerable lab infrastructure required for successful research, development and testing (platforms, OS flavors, OS versions, applications, networking equipment, etc.) Professionalizing Penetration Tests What are the problems today? (cont.) Problems with ‘Attack/Privilege Escalation’ Stage Some tools and exploits available, but usually require customization and testing (local host exploits, backdoors, sniffers, etc.) Monotonous and time consuming task: setting up the new “acquired” vantage point (installing software and tools, compiling for the new platforms, taking into account configuration specific CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com details, etc.) Considerable lab infrastructure required for research, development, customization and testing Lack of a security architecture for the Penetration Test itself Professionalizing Penetration Tests CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com What are the problems today? (cont.) Problems with ‘Analysis and Reporting’ Stage Manually gathering and consolidating all the log information from all phases is time consuming, boring and prone to error Logging of actions is left up to the team members, does not ensure compliance Organizing the information in a format suitable for analysis and extraction of high level conclusions and recommendations is not trivial Writing of final reports often considered the boring leftovers of the Penetration Test, security expertise and experience is required to ensure quality but such resources could be better assigned to more promising endeavors No specialized tools dedicated to cover these issues Professionalizing Penetration Tests What are the problems today? (cont.) Problems with ‘Clean Up’ Stage Requires detailed and exact list of all actions performed, but logging of actions still manual Clean up of compromised hosts must be done securely and without affecting normal operations (if possible) CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com The clean up process should be verifiable and non-repudiable, the current practice does not address this problem. Clean up often left as a backup restore job for the Penetration Test customer, affecting normal operations and IT resources Professionalizing Penetration Tests So what does all that mean? Inefficient due to reliance on disparate software packages and manual performance of tedious tasks Informal and non-standardized Difficult for companies to define and enforce their own methodology Inconsistent in execution CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com Error-prone and sometimes NOT secure due to manual logging and clean-up Difficult to centralize and share experience/knowledge across the firm Expensive due to a steep learning curve and laborintensiveness Not very scalable New tools are needed to improve the process Professionalizing Penetration Tests One possible solution to these problems: CORE IMPACT CORE IMPACT Provides a framework for Penetration Testing Increases productivity Builds knowledge and security expertise Provides an open and extensible architecture CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com Brings the practice to a new quality standard Professionalizing Penetration Tests How does CORE IMPACT work? The Model: – – – Simplifies and abstracts all the components of the system and their relations Provides a foundation on which to build Provides a common language Agents - “The pivoting point” or “the vantage point” – The context in which Modules are run – Installable on any host – Secure – Remotely control other Agents – Easy clean up CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com Modules - “Any executable task” – Information gathering, attacks, reporting, scripting of other Modules – Simple and easy to extend – Have access to every tool together, under the same framework Professionalizing Penetration Tests CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com What are the benefits? Provides a framework that encompasses all the Penetration Testing phases – Enables customers to define and standardize own methodology – Enforces the following of their methodology and ensures quality Drastically reduces time required to perform a Penetration Test – Agent/Module architecture simplifies target penetration and privilege escalation – Automates monotonous and time-consuming tasks – Frees valuable resources to focus on most important and difficult phases Improves the security of the Penetration Testing practice – Reduces errors, particularly in the clean-up stage – Strong authentication and encryption between console and Agents Enables knowledge acquisition and shared learning – Entity Database consolidates all work done for future reference and use Makes the Penetration Testing practice more professional and scalable CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com Professionalizing Penetration Tests IMPACT DEMO Pen Tester Console INTERNET DMZ Back Office Network Professionalizing Penetration Tests CORE SECURITY TECHNOLOGIES © 2002 http://www.corest.com CONTACT INFORMATION Jeffrey Cassidy Director of Business Development, USA jeffrey.cassidy@corest.com 44 Wall Street New York, NY 10005 Tel: (212) 461-2345 Fax: (212) 461-2346 info.usa@corest.com USA