be consistent
threat: crazy guy with gun
vuln: you are not bulletproof
risk: you are on same bus with crazy guy
ameliorate risk with layered defense
attack: violate C, I, or A of the target
active vs. passive attacks
pentesting is not about the tools, hence not passive
thinking through a problem is active
inside vs. outside
types of assessments
ethical hacking
pentesting
subset of ethical hacking
use tools and techniques similar to those of criminals
not writing exploits
goal: compromise systems and access the information
security assessment
find vuln, but do not exploit
aka "vuln assessment"
not necessarily gaining access to data
may not take risk into account
security audit
why pentest?
addressing discovered vulns
not all will be addressed.
infosec is about managing risk
present findings in business terms
-
rsnake
-
always wears a suit
types of pentests
attack phases
limitations of pentests
other approaches to finding vulns
why pentesting?
rubber meets road
attacker mindset
avoids many limitations
deeper than most audits
strike a balance with customer
free testing methodologies
OSSTMM
-
processes, roles, and sample tools
incentive for mgt: "NIST suggests we do this"
-
also see 800-53A
OWASP testing guide
pentesting framework
checklists, don't limit you
same pentest might suffice for all, just different checkboxes
Course DVD
report format
exec summary
get the business point across
main thing that needs to be fixed
actionable items
overall risks
3-6 significant findings
if something is done right, mention it (security team is effective)
execspeak
intro
date, time range
who did the test
methodology
findings
system
risk level
ease of exploit
summary
detailed tech
recommendation
screenshots
prove that compromise is real
if cmdline, run "hostname"
use big hideous yellow arrows
recreate using video, talking to camera
conclusion
don't break new ground
summarize
appendices
manpages for every tool
user guides for other tools
actual reports from tools
current versions of tools vs. tools used