0% found this document useful (0 votes)
55 views37 pages

Chapter 1 - PenTest - en

Uploaded by

1711anhyeuem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views37 pages

Chapter 1 - PenTest - en

Uploaded by

1711anhyeuem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 37

Penetration Testing

(PenTest)

Dr. Tran The Son


Vietnam – Korea University
Bio
[Link]
Hometown: Quang Tri, Hue, Binh Dinh, HCMC
Degree:
Msc (2004)
Ph.D (2014)
Northumbria Unniversity, Newcatle Upon
Tyne, UK.
Major: Computer Networks and
Communications.
Thesis title: “An Mobility State Adaptive
Routing Protocol for Mobile Ad Hoc Netwoks”.

Research Interests:
Mobile Ad Hoc and Sensor Networks, QoS
Routing, Network Security, Visible Light
Communications (VLC), Chaos theory.
Institute:
Vietnam – Korea University (VKU)
Bio
[Link]

• Teaching
– Computer networks
– Broadband networks
– Wireless and Sensor networks
– Cloud computing
– Linux OS
– IP routing
– Web programming

– Network security
– Malware analysis • C/C++
– PenTest • Python
– Cryptography • MATLAB
Course Outline
– Penetration Testing Primer
• Pen testing Roles
• Basic Skills to Pen Testing
• The Goals of Pen Testing
• The Stages of the Penetration Test
– Basic knowledge and tools
• Basic networking and security: TCP/IP, IP Switching, Firewall, etc.
• Virtual lab: VMWare, Kali, Win XP SP3, Win 7, Ubuntu
• Lab: Using Nesus, Kali, Metasploit Framework, nmap, etc.
– Assessment
• Information Gathering
• Finding Vulnerabilities
• Capturing Traffic
– Attack/Exploitation:
• Exploitation, Password Attacks, Social Engineering, Bypassing Anti-virus App, etc.
– Exploit Development
Text-books
• Georgia Weidman, “Penetration
Testing: A Hands-On
Introduction to Hacking”, No
Starch Press, ISBN-13: 978-
1593275648, June 2014, 528 pp.

• Robert Shimonski, “Penetration


Testing For Dummies”, John
Wiley & Sons, Inc, ISBN-13 978-1-
119-57747-8, 2020

• Phillip L. Wylie, Kim Crawley, “The


Web Resources
• Penetration Testing Lab ([Link]/log)
Basic Networking and Security
• Architecture
General security technology
• In the general security technology category are
firewalls

• Other general: intrusion


prevention and detection
systems, load balancers,
access control lists (ACLs)
on routers and wireless
access points,
controllers, and mobile
extenders
Systems infrastructure and applications
• Servers:
– web, mail,
DNS, etc.
• Devices:
– Routers,
switches,
hubs, load
balancers,
• Security
– Firewalls,
intrusion
prevention
devices
Computer Security Objectives
Confidentiality
• Data confidentiality
• Assures that private or confidential information is not made available or disclosed to
unauthorized individuals
• Privacy
• Assures that individuals control or influence what information related to them may be
collected and stored and by whom and to whom that information may be disclosed

Integrity
• Data integrity
• Assures that information and programs are changed only in a specified and authorized
manner
• System integrity
• Assures that a system performs its intended function in an unimpaired manner, free
from deliberate or inadvertent unauthorized manipulation of the system

Availability
• Assures that systems work promptly and service is not denied to authorized
users
CIA Triad
Possible additional concepts:

Authenticity Accountability
• Verifying that users are • The security goal that
who they say they are generates the
and that each input requirement for
arriving at the system actions of an entity to
came from a trusted be traced uniquely to
source that entity
Breach of Security - Levels of Impact
• The loss could be expected to have a severe or
catastrophic adverse effect on organizational
operations, organizational assets, or individuals
High

• The loss could be expected to have a


serious adverse effect on organizational

Moderate operations, organizational assets, or


individuals

• The loss could be expected to


have a limited adverse effect
on organizational operations,

Low organizational assets, or


individuals
Computer Security Challenges
• Security is not simple • Security mechanisms
• Potential attacks on the typically involve more than a
security features need to particular algorithm or
be considered protocol
• Procedures used to • Security is essentially a
provide particular services battle of wits between a
are often counter-intuitive perpetrator and the
designer
• It is necessary to decide
• Little benefit from security
where to use the various
investment is perceived until
security mechanisms
a security failure occurs
• Requires constant • Strong security is often
monitoring viewed as an impediment to
• Is too often an efficient and user-friendly
afterthought operation
OSI* Security Architecture
• Security attack
– Any action that compromises the security of information
owned by an organization
• Security mechanism
– A process (or a device incorporating such a process) that is
designed to detect, prevent, or recover from a security
attack
• Security service
– A processing or communication service that enhances the
security of the data processing systems and the information
transfers of an organization
– Intended to counter security attacks, *(OSI)
andOpen
they make use of
Systems Interconnection model
one or more security mechanisms to provide the service
Table 1.1
Threats and Attacks (RFC 4949)
Security Attacks

A means of classifying security attacks,


used both in X.800 and RFC 4949, is in
terms of passive attacks and active
attacks
• A passive attack attempts to
learn or make use of
information from the system
but does not affect system
resources
• An active attack attempts to
alter system resources or
affect their operation
Passive Attacks

• Are in the nature of


eavesdropping on, or
monitoring of, transmissions
• Goal of the opponent is to
obtain information that is
being transmitted
• Two types of passive
attacks are:
– The release of message
contents
– Traffic analysis
Active Attacks
• Involve some modification of the • Takes place when one entity
pretends to be a different
data stream or the creation of a
false stream Masquerade entity
• Usually includes one of the
• Difficult to prevent because of the other forms of active attack
wide variety of potential physical,
• Involves the passive capture
software, and network of a data unit and its
vulnerabilities Replay subsequent retransmission to
• produce an unauthorized
Goal is to detect attacks and to effect
recover from any disruption or
delays caused by them • Some portion of a legitimate
message is altered, or
Modification messages are delayed or
of messages reordered to produce an
unauthorized effect

• Prevents or inhibits the


Denial of normal use or management
service of communications facilities
Security Services
• Defined by X.800 as:
• A service provided by a protocol layer of communicating
open systems and that ensures adequate security of the
systems or of data transfers

• Defined by RFC 4949 as:


• A processing or communication service provided by a
system to give a specific kind of protection to system
resources

A central issue for Security Service design and implementation:


Policy and Mechanism ! Policy versus Mechanism ?
X.800 Service Categories

• Authentication
• Access control
• Data confidentiality
• Data integrity
• Non-repudiation
Table 1.2

Security
Services
(X.800)

(This table is found on page


18 in textbook)
Security Mechanisms (X.800)

Specific Security Mechanisms


• Encipherment
• Digital signatures
• Access controls
• Data integrity
• Authentication exchange Pervasive Security Mechanisms
• Traffic padding • Trusted functionality
• Routing control • Security labels
• Notarization • Event detection
• Security audit trails
• Security recovery
Table 1.3

Security
Mechanisms
(X.800)

(This table is found on pages


20-21 in textbook)
Model for Network Security
Network Access Security Model
Unwanted Access
• Placement in a computer system of logic
that exploits vulnerabilities in the system and that
can affect application programs as well as utility
programs such as editors and compilers
• Programs can present two kinds of threats:
– Information access threats
• Intercept or modify data on behalf of users who
should not have access to that data
– Service threats
• Exploit service flaws in computers to
inhibit use by legitimate users
Security technologies and techniques
• Encryption: can ensure all 3 factors to ensure
information security
– Symmetric: DES, AES, …
– Asymmetric: RSA, Diffie-Hellman
– Hash: MD-5, SHA, …
• Authentication - Authorization & Access Control
– Username/password, certificate, digital signature,
CHAP, Kerberos, ….
• Firewall & Intrusion Detection

© 2023, Vietnam-Korea University of ICT 28


Vulnerability

• Vulnerability: where an attacker can exploit to


perform attacks on the system. Vulnerabilities may
exist in the network system or in network
administration procedures.
• Program vulnerabilities (back-door)
• OS: Windows, Linux
• Application: Web, Mail, Database, …
• Protocols: TCP/IP 3-way handshake
• Physical
• Policies/management (password, sharing,…)
• Social engineering
© 2023, Vietnam-Korea University of ICT 29
Vulnerability
• Common web vulnerability

• Authentication and Authorization


• Injection Flaws
• Broken Authentication
• Cross-Site Scripting (XSS)
• Insecure Direct Object References
• Security Misconfiguration
• Sensitive data exposure
• Missing Function Level Access Control
• Cross-Site Request Forgery (CSRF)
…..

© 2023, Vietnam-Korea University of ICT 30


Risk Assessment

Vulnerabilities Threats

Risk

Techniques/Policies

© 2023, Vietnam-Korea
31
University of ICT
Penetration testing (pen testing)
• Penetration testing, or pen testing involves
simulating real attacks to assess the risk associated
with potential security breaches
• On a pen testing (as opposed to a vulnerability
assessment), the testers not only discover
vulnerabilities that could be used by attackers but
also exploit vulnerabilities, where possible, to assess
what attackers might gain after a successful
exploitation.
The Stages of the Penetration Test
• Pre-engagement
• Information Gathering (Reconnaissance)
• Threat Modeling
• Vulnerability Analysis/Assessment
• Exploitation
• Post Exploitation
• Reporting
Pentest Types
• Penetrate and Exploit
• Social engineering; Client-side and server-side attacks
• Password cracking.
• Assumption (Man in the Middle)
• Address spoofing; Eavesdropping; Packet capture and analysis
• Overwhelm and Disrupt
• DoS/DDoS; Buffer Overflow
• Destroy
• Malware; Ransomware
• Subvert (Controls Bypass)
• Attack vectors, Phishing, Spoofing, Malware
Pentest Targets and Specializations
• Generalist (network, Wi-Fi, and light web app)
• Application (web app, mobile, thick client, and cloud)
• Internet of Things (IoT)
• Industrial Control Systems (ICS)
• Hardware (including medical devices)
• Social engineering (people)
• Physical (buildings)
• Transportation (vehicles, airplanes)
• Red team (adversarial simulation)
Job opportunity
• Pentester
• Cryptanalyst
• Reverse Engineer

© 2023, Vietnam-Korea University of ICT 36


Homework
• Implement
– Chapter 1
– Chapter 2
– Chapter 3

You might also like