Vulnerability Testing Approach

advertisement
Vulnerability Testing Approach
Prepared By: Phil Cheese
Nov 2008
Outline
• Structure of Technology UK Security Team
• Why we test
• What we test
• When we test
• How we test
• Demo of a unix platform test
• Hot topics
• Questions and Answers
2
UK Technology Security teams
UK Tech. Security Mgr
Group CISO
Review New Systems
Security
Consultants
Vulnerability
Testing
Vulnerability Test Team
Security Monitoring
Mail, Logs, IDS, Firewall
Security Operations
3
Definition
Penetration testing v Vulnerability testing ?
• Wikepedia
“Security testing techniques scour for vulnerabilities or security holes in
applications. These vulnerabilities leave applications open to exploitation.
Ideally, security testing is implemented throughout the entire software
development life cycle (SDLC) so that vulnerabilities may be addressed in
a timely and thorough manner. Unfortunately, testing is often conducted as
anafterthought at the end of the development cycle.”
Why ? – test against standards, identify misconfigurations, old
vunerable versions of software, test drive
• Ethics & Legality
4
Why testing
• Preventing financial loss through fraud (hackers, extortionists and disgruntled
employees) or through lost revenue due to unreliable business systems and
processes.
• Proving due diligence and compliance to your industry regulators, customers
and shareholders. Non-compliance can result in your organisation losing
business, receiving heavy fines, gathering bad PR or ultimately failing.
Protecting your brand by avoiding loss of consumer confidence and business
reputation.
• vulnerability testing helps shape information security strategy through
identifying vulnerabilities and quantifying their impact and likelihood so that
they can be managed proactively; budget can be allocated and corrective
measures implemented.
5
Defining the scope
• Full-Scale vs. Targeted Testing
• Platform, Network, Database,
Applications
• Remote vs. Local Testing
• In-house v outsourcing
6
Defense in depth
• Network
• Operating System
• Database
• Application
7
www.vodafone.co.uk
Tester
Nmap
Nessus
Network
elements
e.g
SGSN’s,
HLR’s
Sun
Solaris
Application
Server
8
HP-UX
Redhat
Oracle
DB
Apache Web
server
Windows File
server
Nmap
9
Nessus
10
www.vodafone.co.uk
Tester
Network
elements
e.g
SGSN’s,
HLR’s
Assuria
Agents
Sun
Solaris
Application
Server
11
HP-UX
Redhat
Oracle
DB
Apache Web
server
Windows File
server
Assuria Auditor Console
12
www.vodafone.co.uk
Tester
NGS Squirrel
Network
elements
e.g
SGSN’s,
HLR’s
Sun
Solaris
Application
Server
13
HP-UX
Redhat
Oracle
DB
Apache Web
server
Windows File
server
NGS Squirrel
14
Appscan, Superwalk
Tester
Network
elements
e.g
SGSN’s,
HLR’s
Sun
Solaris
Application
Server
15
HP-UX
Redhat
Oracle
DB
Apache Web
server
Windows File
server
www.vodafone.co.uk
Appscan
16
Backtrack
17
www.vodafone.co.uk
Tester
Network
elements
e.g
SGSN’s,
HLR’s
Assuria CLI Remote test (Data
Centre)
18
Sun
Solaris
Application
Server
HP-UX
Redhat
Oracle
DB
Apache Web
server
Windows File
server
Remote platform vulnerability assessment using
Assuria Auditor & workbench via the command line
• “It is better to voyage hopefully than to drive to Oldham”
•
FTP and install scripts
•
Run scans
•
Copy off raw results files
•
Generate csv files
•
Import results into workbench
•
Review scan results
•
Producing reports
•
Agreeing remedial actions and re-testing
19
Log onto remote server
20
FTP onto a remote server
21
unzip tarball file
22
23
Areas checked by ‘Initial’ policies
The table below details the initial policies referenced against the areas checked.
Policy
Area To Check
UNIX
NT
Initial-1
External Attack
Network Services, Secure Files,
Terminal Configuration
Network Services - FTP, RAS,
Registry Access, Trust
Relationships Logon Failure
Auditing
Initial-2
Superusers
Configuration Home Files,
Environment Setuid Files
Accounts in Domain Admins and
Administrators Groups, Audit
Configuration, Examine Audit
Logs
Initial-3
Ordinary Users
General User Configuration,
Home Files and Environment
Account Policy, User Properties,
User Rights
Initial-4
Files And Devices
Mount Points, Special Devices
Initial-5
System Files
All Files in predefined
directories(/usr/etc /lib Etc.)
Frozen Files
Directories under
%SYSTEMROOT%, Frozen
Files. Sensitive Registry Keys
Guessable passwords, password
shadowing, user shared
password, uid 0 user's home
directories, default login
environment
Forced password changes,
password reuse settings,
minimum password age and
length, passwords required,
password strength
password
24
Name
Run scans
25
FTP results back to desktop
26
Generate CSV files
27
Import into Workbench
28
Reconcile results
29
Filter results
30
Vulnerability testing - hot topics
• PCI-DSS – keeping Security vendor industry going!
https://www.pcisecuritystandards.org/
• Appliances and automation – keep your auditors happy
http://www.qualys.com/products/qg_suite/
http://www.ncircle.com/index.php?s=products
• Virtualisation and middleware vulnerabilities – don’t forget’em….
http://labs.mwrinfosecurity.com/
• Exploitation tools – Metasploit framework, Canvas, Core Impact. BEEF
http://www.metasploit.com/
http://www.immunitysec.com/
http://www.coresecurity.com/
http://www.bindshell.net/tools/beef
31
Conclusions
• In depth, holistic approach to security testing
• Testing needs to take place during the development lifecycle
• Can be complex and time consuming
• Outsource specialist testing to third party vendors
• Commercial tools easy to maintain and use but can be expensive
• “A fool with a tool is still a fool”
• Results from tools need analysis and put into a ‘business risk’ context
32
Any Questions ?
33
Download