Penetration test

From Wikipedia, the free encyclopedia

A penetration test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious user, commonly known as a hacker. The process involves an active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures. This analysis is carried out from the position of a potential attacker, and can involve active exploitation of security vulnerabilities. Any security issues that are found will be presented to the system owner together with an assessment of their impact and often with a proposal for mitigation or a technical solution. the intent of a penetration test is to determine feasibility of an attack, the amount of business impact of a successful exploit, if discovered.

Black box vs. White box Penetration tests can be conducted in several ways. The most common difference is the amount of knowledge of the implementation details of the system being tested that are available to the testers. Black box testing assumes no prior knowledge of the infrastructure to be tested. The testers must first determine the location and extent of the systems before commencing their analysis. At the other end of the spectrum, white box testing provides the testers with complete knowledge of the infrastructure to be tested, often including network diagrams, source code and IP addressing information. There are also several variations in between, often known as gray box tests. Penetration tests may also be described as Full disclosure, partial disclosure or blind tests based on the amount of information provided to the testing party.

The relative merits of these approaches are debatable. It is argued that black box testing most closely simulates the actions of an actual malicious user. This ignores the fact that any targeted attack on a system will most probably require some knowledge of the system. typically, an insider may have access to as much information as the system owners. In most cases it is preferable to assume a worst-case scenario and provide the testers with as much information as they require, assuming that any determined attacker would already have acquired this through some other means.

In practice, the services offered by penetration testing firms range from a simple scan of an organisation's IP address space for open ports and identification banners to a full audit of source code for an application.

Contents

[edit] Rationale

A penetration test should be carried out on any computer system that is to be deployed in a hostile environment, in particular any Internet facing site, before it is deployed. This provides a level of practical assurance that any malicious user will not be able to penetrate the system.

[edit] Methodology

The Open Source Security Testing Methodology Manual (OSSTMM)is a peer-reviewed methodology for performing security tests and metrics. The OSSTMM test cases are divided into five channels which collectively test: information and data controls, personnel security awareness levels, fraud and social engineering control levels, computer and telecommunications networks, wireless devices, mobile devices, physical security access controls, security processes, and physical locations such as buildings, perimeters, and military bases.

The OSSTMM focuses on the technical details of exactly which items need to be tested, what to do before, during, and after a security test, and how to measure the results. OSSTMM is also known for its Rules of Engagement which define for both the tester and the client how the test needs to properly run starting from denying false advertising from testers to how the client can expect to receive the report. New tests for international best practices, laws, regulations, and ethical concerns are regularly added and updated.

The National Institute of Standards and Technology (NIST) discusses penetration testing in Special Publication 800-42, Guideline on Network Security Testing. NIST's methodology is less comprehensive than the OSSTMM; however, it is more likely to be accepted by regulatory agencies. For this reason NIST refers to the OSSTMM.

There is a new Methodology known as the Information Systems Security Assessment Framework (ISSAF) by the Open Information Systems Security Group.

The Information Systems Security Assessment Framework (ISSAF) is a peer reviewed structured framework that categorizes information system security assessment into various domains and details specific evaluation or testing criteria for each of these domains. It aims to provide field inputs on security assessment that reflect real life scenarios. ISSAF should primarily be used to fulfill an organization's security assessment requirements and may additionally be used as a reference for meeting other information security needs. ISSAF includes the crucial facet of security processes and, their assessment and hardening to get a complete picture of the vulnerabilities that might exist. The ISSAF however is still in its infancy.

Methodology for penetration testing :

1. port scanning

2. task to perform for a through port scan

3. system fingerprint

4. service probing

[edit] Standards & certification

The process of carrying out a penetration test can reveal sensitive information about an organization. It is for this reason that most security firms are at pains to show that they do not employ ex-black hat hackers and that all employees adhere to a strict ethical code. There are several professional and government certifications that indicate the firms trustworthiness and conformance to industry best practice.

In the UK, the main standard/accreditation is the CHECK scheme, administered by CESG (the Communications-Electronics Security Group; part of GCHQ). This standard is a mandatory pre-requisite for all government (central, local, police forces etc.) and many commercial blue-chip organisations. Subscriber organisations to the scheme are required to maintain strict ethical standards, and certified individuals are automatically vetted to at least SC level security clearance.

Government backed testing also exists in the US with standards such as the NSA Infrastructure Evaluation Methodology IEM

For web applications, the Open Web Application Security Project (OWASP) provides a framework of recommendations that can be used as a benchmark.

The International Council of E-Commerce Consultants (EC-Council) has created the Certified Ethical Hacker certification [1], which covers penetration testing as well as many other nefarious computer skills.

ISECOM [2] provides a Professional Security Testing certification and a Professional Security Analyst certification.

[edit] See also

[edit] External links

In other languages