SlideShare una empresa de Scribd logo
1 de 24
Descargar para leer sin conexión
PRACTICE MAKES PERFECT. CREATION OF A PENETRATION TESTING
   LABORATORY, PROCEDURES AND TOOLS, START TO FINISH.




        LQT2 Multimedia Presentation by Thomas Butler
        Presented to the Information Technology College Faculty
                    of Western Governors University
        in Partial Fulfillment of the Requirements for the Degree
        Master of Science in Information Security and Assurance
                       February 26, 2013


                          Powerpoint Templates
                                                                    Page 1
root@bt:~# WHOAMI?

                 Thomas Butler……Houston, Texas

        CPA, CIA, CISA, CISSP, Security+, Network+, PMP

               Over 20 years in DoD IT Audit (Retired)

           Interested in IT Security & Penetration Testing

Started IT Security Consulting Co.-Dec 2011-http://www.butleritsec.com

                Started WGU MS Degree-1 July 2012

          WGU MS Degree Offers Credibility in IT Security

                        Powerpoint Templates
                                                                  Page 2
PRESENTATION OVERVIEW-PER THE RUBRIC

          Why I Chose This Project

             Overview of Problem

          What Project Consisted Of

            Special Strategies Used

       Successes In Achieving Milestones

            Obstacles Encountered

               What I Learned

       How I Will Apply What I Learned



              Powerpoint Templates
                                            Page 3
WHY I CHOSE THIS PROJECT

    A SERIOUS PROBLEM TO THE CYBERSECURITY OF THE NATION.
     RESPONSE TO CURRENT CRITICISM THAT AVAILABLE SECURITY
    CERTIFICATIONS DO NOT TEACH ENOUGH HANDS-ON PROCEDURES
    AND THAT THEIR EXAMS DO NOT REQUIRE HANDS-ON BUT ARE
    INSTEAD MULTIPLE CHOICE.

 DOD AND OTHER GOVERNMENT AGENCIES CLAIM EMPLOYEES
OBTAINING AVAILABLE CERTIFICATIONS CANNOT DO THE JOB REQUIRED
DUE TO LACK OF HANDS-ON SKILLS. TRAINING NEEDS TO EMPHASIZE
MORE HANDS-ON AND LESS BOOK KNOWLEDGE. (refer to news article in page 6)

 I COULD NOT FIND A TURN-KEY, OFF –THE-SHELF SOLUTION SO
I DECIDED TO CREATE ONE.

 I GOT ALL THE CERTS , THE CEH, CHFI, CISSP, SECURITY+, CCENT, BUT I NEED
HANDS-ON PRACTICE OR I WILL COMPLETELY FORGET EVERYTHING
I LEARNED.

 HANDS ON PRACTICE MAKES PERFECT AND INSTILLS CONFIDENCE.


                              Powerpoint Templates
                                                                           Page 4
OVERVIEW OF PROBLEM DISCUSSED IN PROJECT
THE PROBLEM! Practice on systems you do not own without
written permission is illegal.
Need more hands-on.
                   I needed:
           A way to practice, ethically and legally

           All-in-one document

        Easy to follow. Easy to setup and use.

        Free and/or cheap

   I could not find anything that satisfied all my needs, therefore, I decided to do
   this project to create a practice lab for myself. Hopefully the project will benefit
   others as well.


                                Powerpoint Templates
                                                                              Page 5
CAUSES OF THE PROBLEM
High demand for penetration tests>government regulations & industry standards

    a.     PCI-DSS (Penetration Testing. Wikipedia, 2013) requires both annual and ongoing penetration testing
           (after system changes).

    a.     FISMA -Federal Information Security Management Act (FISMA) via procedures promulgated by
           NIST 800-53, Appendix E. (NIST 800-53, Rev. 3, 2009)

Shortage of well-trained penetration testers-THERE IS ARTICLE AFTER ARTICLE AFTER ARTICLE

    a.    A Barclay Simpson Corporate Governance Recruitment report on Information Security found that
          the demand exceeds the supply of qualified penetration testers (Barclay Simpson, Corporate
          Governance Recruitment, 2011).

    b.    US Air Force is planning on going on a “hiring binge” to hire 1,000 persons in cyber operations in
          2014 (Magnuson, 1/17/2013). National Defense Industrial Association Magazine, 2111 Wilson Blvd.,
          Suite 400, Arlington, VA 22201, Air Force Cyber-Operations Wing to Go on Hiring Binge).

     c.   Experts say DoD cyber workers undertrained By Zachary Fryer-Biggs - Staff writer
            Posted : Saturday Feb 16, 2013 12:38:06 EST in the Federal Times a Gannett Pub.
          http://www.marinecorpstimes.com/news/2013/02/dn-cyber-certification-
          021613/?goback=.gde_54384_member_216288717

          ”Money is not being spent on hands-on training.” Others focused on the lack of hands-on training
           required, resulting in broad certifications that are required for many jobs but are not specific
           to any of them. Book training is simply not enough.”

                                      Powerpoint Templates
                                                                                                  Page 6
MORE CAUSES OF THE PROBLEM
Requires almost daily training reinforcement practice, or skills rapidly lost.
Every day new hacking software is introduced. Every day new vulnerabilities
are discovered.

How do you keep up if everything changes so rapidly?

Penetration testing is unique and very difficult because skills must be
transferred by computer keyboard>very labor intensive>requires humans to
think “outside the box”. No two infrastructures or system requires the same
penetration testing procedures.

How do you use what was learned in CEH when testing the client’s systems?




                           Powerpoint Templates
                                                                      Page 7
STILL MORE CAUSES OF THE PROBLEM




         Powerpoint Templates
                                   Page 8
WHAT THE PROJECT CONSISTED OF

The project is documented in appendices A through G.

 Appendix A: Creation of the Penetration Testing Lab
 Appendix B: Penetration Testing Methodology
 Appendix C: Reconnaissance and Information
  Gathering
 Appendix D: Active Scanning and Enumeration
 Appendix E: Exploitation
 Appendix F: Post-exploitation and Covering Tracks
 Appendix G: Technology Terms/Acronyms



                    Powerpoint Templates
                                                 Page 9
WHAT THE PROJECT CONSISTED OF
Appendix A: Creation of the Penetration Testing Lab

Three virtual machines created within a Windows Vista OS using FREE
VMWare Player community edition

“Attack Machine” FREE Linux Ubuntu “Backtrack5R3”
”The pen testers premier OS and toolkit.”

“Victim Machine” FREE Linux “Metasploitable”-
OS-Created by Metasploit Project to allow hands-on practice

“Victim Machine” FREE Trinux “Badstore.net”-
  vulnerable OS and Web App

                              Did I say FREE?



                          Powerpoint Templates
                                                                Page 10
WHAT THE PROJECT CONSISTED OF

                Appendix B: Penetration Testing Methodologies

Penetration Testing Execution Standard, (2013) PTES. Retrieved 2013 from:
http://www.pentest-standard.org/index.php/Main_Page

Open System Security Testing Methodology Manual, (2013) ISECOM. Retrieved
2013 from: http://www.isecom.org/research/osstmm.html

Certified Ethical Hacker (CEH), (2013) Ethical Hacking. Retrieved 2013 from:
http://eccouncil.org

NIST 800-53, Appendix E. Retrieved from:
 http://csrc.nist.gov/publications/PubsSPs.html#800-53




                            Powerpoint Templates
                                                                         Page 11
WHAT THE PROJECT CONSISTED OF
                Appendix C: Reconnaissance and Information Gathering

In summary of reconnaissance and foot printing, we have used the following for legal, passive,
reconnaissance and information gathering on J.C.Penney and have provided screen print proof
of concept (picture worth a thousand words). These tools are included in Backtrack5R3 or built
into command line.

    Google-website URL, tons of other info;

    Netcraft-OS & Web server running and IP address;

    SmartWhoIs-Domain Registrar information

    theHarvester-Emails and Sub-domains;

    Maltego-Subdomains;

     traceroute/tracert command line-traces routers from origin to destination;

     nslookup command line-finds IP address from domain name>Linux “dig” and “host” are
    alternatives, but NA in Windows

                                Powerpoint Templates
                                                                                     Page 12
WHAT THE PROJECT CONSISTED OF


    Appendix D: Active Scanning and Enumeration

Using scanning tools in Backtrack5R3, we performed active scanning of
Metasploitable and Badstore.net, our “victims.” We provided screen
prints (picture worth a thousand words)for proof of concept. All these
tools are included in BT5R3.

 Nmap-port scan, OS version, services running;

 Nessus-port scans and vulnerability scans;

 Nikto (Wikto-Windows)-port scans and vulnerability scans;

 Metasploit-port, OS version, services running, vulnerability

                      Powerpoint Templates
                                                                 Page 13
WHAT THE PROJECT CONSISTED OF

                 Appendix E: Exploitation with Metasploit

Metasploit-included free in Backtrack5R3-msfconsole. Proof of concept
screen prints (picture worth a thousand words) included in project.

Command line:     root@bt:~# /pentest/exploits/framework2/msfconsole

                                   OR>

root@bt:~# /opt/metasploit/msf3/msfconsole

                 modules: auxiliary, exploits, payloads

We also used Armitage-a GUI for Metasploit

Command line:    root@bt:~# /opt/metasploit/msf3/armitage
                 modules: auxiliary, exploits, payloads
                         Powerpoint Templates
                                                                   Page 14
WHAT THE PROJECT CONSISTED OF

Appendix F: Post-exploitation and Covering Tracks


Not a lot of in-depth information available on this topic!

Post-Exploitation: Got Root?, Elevation of privilege=Create
user, Add user to Admin Group; Offline and online password
attacks, John the Ripper, Pass the Hash, Cain and Abel.

Covering Tracks: Use Metaspoit to delete Event Logs. Use
 Metasploit to remove file timestamps.




                      Powerpoint Templates
                                                          Page 15
WHAT THE PROJECT CONSISTED OF

  Appendix G: Technology Terms/Acronyms

Includes 33 definition of terms




            Powerpoint Templates
                                          Page 16
SPECIAL STRATEGIES USED

Member of 41 Linked-In IT Security Groups>To share
 information with IT security groups


Subscriptions to 35 IT Security Tutorial Blogs>To learn IT
 security and ethical hacking


750 Linked-In Connections>To share information with IT
 security individuals

Some basic knowledge of HTML, SQL, PYTHON




                          Powerpoint Templates
                                                              Page 17
SUCCESSES IN ACHIEVING MILESTONES


All files were downloaded and installed successfully with no problems

All three virtual machines were successfully created, opened
 simultaneously, and run simultaneously on my Windows Vista box
 with no memory problems. My Windows box has 4 G RAM and
 I allocated 1G RAM for the “attack” machine and .5G RAM for each
 “victim machine” leaving approx. 2 G RAM for the Windows box.

All penetration testing tools were run successfully and proof of concept
 screen prints were obtained for all tools.




                           Powerpoint Templates
                                                                      Page 18
OBSTACLES ENCOUNTERED

Limitation: Lab only includes software. Practice in this lab will not encounter
 Hardware firewalls, routers, switches, hardware intrusion systems,
 and other hardware security devices that would be encountered in a
 real world penetration test.

I somewhat lacked an intermediate programming knowledge. I recommend
that the penetration testing student learn the following programming languages:

HTML to understand http requests and responses for use of
 web proxies like Paros Proxy, Webscarab Proxy, Burp Proxy

SQL to understand SQL injection for use of tools like
 SQLMap and manual injection of code

PYTHON to understand most of the penetration testing tools
 in Backtrack5R3 for tools like theHarvester. The predominant
 language for most tools in BT5R3 is python.

           root@bt:~# ./theHarvester.py
                             Powerpoint Templates
                                                                            Page 19
WHAT I LEARNED
A penetration test should not just be to gain access and get a shell and quit. It should be an audit of
the IT security posture and the goal should be to identify as many vulnerabilities as possible that need
fixing.

Money is wasted on training-Companies with a lot of money and the US Government (DoD) will send
 their employees to SANS training for a 4 day crash course. Costs of travel, hotel, per diem, salary,
 SANS Course fee could be > $10K for one student. Student returns to work and still cannot
 do the job. (refer to recent news article in slide 6)

There has to be a better way. WGU is part of the solution to a better way

Cyberlaw, regulations, and compliance-Penetration testing without written permission is
 illegal. Some regulations and industry standards require periodic penetration testing, i.e.
 PCI-DSS, FISMA.

Leadership and professionalism-penetration testing is not a true profession like CPA, law,
 medicine, etc. There is no barrier to entry. A barber needs a state license;
 a penetration tester does not. Anyone can hold themselves out to be a penetration tester.

          High ethical standards should be required for penetration testers.

         Background checks, criminal checks, financial and credit checks, REFERENCES,
         memberships in IT security organizations, and certifications.
                                       Powerpoint Templates
                                                                                               Page 20
WHAT I LEARNED

      Security Planning and Management- Organizations need to:
Start with a framework and set of internal controls such as ISO 27000/27001/27002;

Set a reasonable policy that can be followed and enforced;

Employee training ;

Create policy that requires vulnerability scans, periodic penetration testing,
 periodic IT security audits, and periodic IT policy compliance audits.

                                       Systems Security
No such thing as 100% security;

Penetration test is only one part of “defense in depth.” Perimeter defenses such as firewalls,
 routers, switches, IDS/IPS, web application and database monitoring systems must be properly
 configured;

 Patches and AV must be kept up to date.

Log files must be filtered (quantity reduced) and suspicious log entries must be examined.

                                      Powerpoint Templates
                                                                                          Page 21
HOW I WILL APPLY WHAT I LEARNED


I will apply the knowledge to running the company
http://www.butleritsec.com , an IT Security consultant
Company

I will apply the knowledge to provide best value to
 clients in a highly ethical way.

I will continuously study and practice hands-on.

I am just beginning to learn.




                      Powerpoint Templates
                                                         Page 22
REFERENCES
Penetration Test, (2013) Wikipedia. Retrieved 2013 from: http://en.wikipedia.org/wiki/Penetration_test

NIST 800-53 and Federal Information Processing Standards (FIPS) 200 Retrieved from:
http://csrc.nist.gov/publications/PubsSPs.html#800-53.

Barclay Simpson, Corporate Governance Recruitment, (2011) Market Report on Information Security. Retrieved 2013
from: http://www.barclaysimpson.com/document_uploaded/BS_InfoSec_2011.pdf

Magnuson, (2013) National Defense Industrial Association Magazine, Air Force Cyber-Operations Wing to Go on
Hiring Binge. Retrieved 2013 from:
http://www.nationaldefensemagazine.org/blog/Lists/Posts/Post.aspx?ID=1026&goback=.gde_1836487_member_20563
4892

Penetration Testing Execution Standard, (2013) PTES. Retrieved 2013 from: http://www.pentest-
standard.org/index.php/Main_Page

Open System Security Testing Methodology Manual, (2013) ISECOM. Retrieved 2013 from:
http://www.isecom.org/research/osstmm.html

Certified Ethical Hacker (CEH), (2013) Ethical Hacking. Retrieved 2013 from: http://eccouncil.org

Experts say DoD cyber workers undertrained By Zachary Fryer-Biggs - Staff writer
Posted : Saturday Feb 16, 2013 12:38:06 EST in the Federal Times a Gannett Pub.
http://www.marinecorpstimes.com/news/2013/02/dn-cyber-certification-
021613/?goback=.gde_54384_member_216288717

                                            Powerpoint Templates
                                                                                                         Page 23
FINIS
  A THANK YOU TO ALL THE WGU IT FACULTY
                  CINDY
                 WENDY
                 NORMA
                CHARLES
          AND MY MENTOR, BRETT

I HAVE THOROUGHLY ENJOYED THE EXPERIENCE




           QUESTIONS FOR ME?




             Powerpoint Templates
                                           Page 24

Más contenido relacionado

La actualidad más candente

The Curious Case of Fuzzing for Automated Software Testing
The Curious Case of Fuzzing for Automated Software TestingThe Curious Case of Fuzzing for Automated Software Testing
The Curious Case of Fuzzing for Automated Software Testingmboehme
 
Process_to_Produce_Secure_Software-DHS_White-House_Geoff-Shively
Process_to_Produce_Secure_Software-DHS_White-House_Geoff-ShivelyProcess_to_Produce_Secure_Software-DHS_White-House_Geoff-Shively
Process_to_Produce_Secure_Software-DHS_White-House_Geoff-ShivelyCurious Geoff (Shively)
 
The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015Major Hayden
 
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan brugginkATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan brugginkGert-Jan Bruggink
 
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...ESET Middle East
 
Sans cti summit the joy of threat landscaping - bruggink - final
Sans cti summit   the joy of threat landscaping - bruggink - finalSans cti summit   the joy of threat landscaping - bruggink - final
Sans cti summit the joy of threat landscaping - bruggink - finalGert-Jan Bruggink
 
Jerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTJerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTcentralohioissa
 
Analytics for smarter software development
Analytics for smarter software development Analytics for smarter software development
Analytics for smarter software development Thomas Zimmermann
 
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class TenFRSecure
 
Characterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedCharacterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedThomas Zimmermann
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patchingphanleson
 
2020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 12020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 1FRSecure
 
Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingMehrdad Jingoism
 
Infromation Security as an Institutional Priority
Infromation Security as an Institutional PriorityInfromation Security as an Institutional Priority
Infromation Security as an Institutional Priorityzohaibqadir
 
Rugged DevOps (eBook): 10 Ways to Start Embedding Security into DevOps Patterns
Rugged DevOps (eBook): 10 Ways to Start Embedding Security into DevOps PatternsRugged DevOps (eBook): 10 Ways to Start Embedding Security into DevOps Patterns
Rugged DevOps (eBook): 10 Ways to Start Embedding Security into DevOps PatternsEvident.io
 
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...Clare Nelson, CISSP, CIPP-E
 
2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging ThreatsLumension
 
2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three 2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three FRSecure
 

La actualidad más candente (20)

The Curious Case of Fuzzing for Automated Software Testing
The Curious Case of Fuzzing for Automated Software TestingThe Curious Case of Fuzzing for Automated Software Testing
The Curious Case of Fuzzing for Automated Software Testing
 
Process_to_Produce_Secure_Software-DHS_White-House_Geoff-Shively
Process_to_Produce_Secure_Software-DHS_White-House_Geoff-ShivelyProcess_to_Produce_Secure_Software-DHS_White-House_Geoff-Shively
Process_to_Produce_Secure_Software-DHS_White-House_Geoff-Shively
 
The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015The New Normal - Rackspace Solve 2015
The New Normal - Rackspace Solve 2015
 
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan brugginkATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
ATT&CKcon Power Hour - ATT&CK-onomics - gert-jan bruggink
 
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
 
Sans cti summit the joy of threat landscaping - bruggink - final
Sans cti summit   the joy of threat landscaping - bruggink - finalSans cti summit   the joy of threat landscaping - bruggink - final
Sans cti summit the joy of threat landscaping - bruggink - final
 
Jerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINTJerod Brennen - What You Need to Know About OSINT
Jerod Brennen - What You Need to Know About OSINT
 
Analytics for smarter software development
Analytics for smarter software development Analytics for smarter software development
Analytics for smarter software development
 
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten
 
Characterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get ReopenedCharacterizing and Predicting Which Bugs Get Reopened
Characterizing and Predicting Which Bugs Get Reopened
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patching
 
2020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 12020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 1
 
Tech w23
Tech w23Tech w23
Tech w23
 
Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hacking
 
Infromation Security as an Institutional Priority
Infromation Security as an Institutional PriorityInfromation Security as an Institutional Priority
Infromation Security as an Institutional Priority
 
Rugged DevOps (eBook): 10 Ways to Start Embedding Security into DevOps Patterns
Rugged DevOps (eBook): 10 Ways to Start Embedding Security into DevOps PatternsRugged DevOps (eBook): 10 Ways to Start Embedding Security into DevOps Patterns
Rugged DevOps (eBook): 10 Ways to Start Embedding Security into DevOps Patterns
 
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledg...
 
AEPWP09292016
AEPWP09292016AEPWP09292016
AEPWP09292016
 
2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats
 
2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three 2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three
 

Similar a Creating a Penetration Testing Lab from Start to Finish

IRJET- Analysis of Forensics Tools in Cloud Environment
IRJET-  	  Analysis of Forensics Tools in Cloud EnvironmentIRJET-  	  Analysis of Forensics Tools in Cloud Environment
IRJET- Analysis of Forensics Tools in Cloud EnvironmentIRJET Journal
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chanceDr. Anish Cheriyan (PhD)
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing SuiteIRJET Journal
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This chedavieec5f
 
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...DevOps Indonesia
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.uNIX Jim
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comamaranthbeg113
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comamaranthbeg53
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comamaranthbeg73
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAPNIC
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Barry Greene
 
Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident responsepersons20ar
 
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET Journal
 
Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident responsepersons20ar
 
Clone of an organization
Clone of an organizationClone of an organization
Clone of an organizationIRJET Journal
 

Similar a Creating a Penetration Testing Lab from Start to Finish (20)

IRJET- Analysis of Forensics Tools in Cloud Environment
IRJET-  	  Analysis of Forensics Tools in Cloud EnvironmentIRJET-  	  Analysis of Forensics Tools in Cloud Environment
IRJET- Analysis of Forensics Tools in Cloud Environment
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
 
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...
Securing a Great Developer Experience - DevOps Indonesia Meetup by Stefan Str...
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.
 
Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.com
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.com
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
 
2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil
 
Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident response
 
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
 
Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident response
 
Marc perillo
Marc perilloMarc perillo
Marc perillo
 
Itech 1005
Itech 1005Itech 1005
Itech 1005
 
Clone of an organization
Clone of an organizationClone of an organization
Clone of an organization
 

Creating a Penetration Testing Lab from Start to Finish

  • 1. PRACTICE MAKES PERFECT. CREATION OF A PENETRATION TESTING LABORATORY, PROCEDURES AND TOOLS, START TO FINISH. LQT2 Multimedia Presentation by Thomas Butler Presented to the Information Technology College Faculty of Western Governors University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Security and Assurance February 26, 2013 Powerpoint Templates Page 1
  • 2. root@bt:~# WHOAMI? Thomas Butler……Houston, Texas CPA, CIA, CISA, CISSP, Security+, Network+, PMP Over 20 years in DoD IT Audit (Retired) Interested in IT Security & Penetration Testing Started IT Security Consulting Co.-Dec 2011-http://www.butleritsec.com Started WGU MS Degree-1 July 2012 WGU MS Degree Offers Credibility in IT Security Powerpoint Templates Page 2
  • 3. PRESENTATION OVERVIEW-PER THE RUBRIC Why I Chose This Project Overview of Problem What Project Consisted Of Special Strategies Used Successes In Achieving Milestones Obstacles Encountered What I Learned How I Will Apply What I Learned Powerpoint Templates Page 3
  • 4. WHY I CHOSE THIS PROJECT A SERIOUS PROBLEM TO THE CYBERSECURITY OF THE NATION. RESPONSE TO CURRENT CRITICISM THAT AVAILABLE SECURITY CERTIFICATIONS DO NOT TEACH ENOUGH HANDS-ON PROCEDURES AND THAT THEIR EXAMS DO NOT REQUIRE HANDS-ON BUT ARE INSTEAD MULTIPLE CHOICE.  DOD AND OTHER GOVERNMENT AGENCIES CLAIM EMPLOYEES OBTAINING AVAILABLE CERTIFICATIONS CANNOT DO THE JOB REQUIRED DUE TO LACK OF HANDS-ON SKILLS. TRAINING NEEDS TO EMPHASIZE MORE HANDS-ON AND LESS BOOK KNOWLEDGE. (refer to news article in page 6)  I COULD NOT FIND A TURN-KEY, OFF –THE-SHELF SOLUTION SO I DECIDED TO CREATE ONE.  I GOT ALL THE CERTS , THE CEH, CHFI, CISSP, SECURITY+, CCENT, BUT I NEED HANDS-ON PRACTICE OR I WILL COMPLETELY FORGET EVERYTHING I LEARNED.  HANDS ON PRACTICE MAKES PERFECT AND INSTILLS CONFIDENCE. Powerpoint Templates Page 4
  • 5. OVERVIEW OF PROBLEM DISCUSSED IN PROJECT THE PROBLEM! Practice on systems you do not own without written permission is illegal. Need more hands-on. I needed:  A way to practice, ethically and legally  All-in-one document  Easy to follow. Easy to setup and use.  Free and/or cheap I could not find anything that satisfied all my needs, therefore, I decided to do this project to create a practice lab for myself. Hopefully the project will benefit others as well. Powerpoint Templates Page 5
  • 6. CAUSES OF THE PROBLEM High demand for penetration tests>government regulations & industry standards a. PCI-DSS (Penetration Testing. Wikipedia, 2013) requires both annual and ongoing penetration testing (after system changes). a. FISMA -Federal Information Security Management Act (FISMA) via procedures promulgated by NIST 800-53, Appendix E. (NIST 800-53, Rev. 3, 2009) Shortage of well-trained penetration testers-THERE IS ARTICLE AFTER ARTICLE AFTER ARTICLE a. A Barclay Simpson Corporate Governance Recruitment report on Information Security found that the demand exceeds the supply of qualified penetration testers (Barclay Simpson, Corporate Governance Recruitment, 2011). b. US Air Force is planning on going on a “hiring binge” to hire 1,000 persons in cyber operations in 2014 (Magnuson, 1/17/2013). National Defense Industrial Association Magazine, 2111 Wilson Blvd., Suite 400, Arlington, VA 22201, Air Force Cyber-Operations Wing to Go on Hiring Binge). c. Experts say DoD cyber workers undertrained By Zachary Fryer-Biggs - Staff writer Posted : Saturday Feb 16, 2013 12:38:06 EST in the Federal Times a Gannett Pub. http://www.marinecorpstimes.com/news/2013/02/dn-cyber-certification- 021613/?goback=.gde_54384_member_216288717 ”Money is not being spent on hands-on training.” Others focused on the lack of hands-on training required, resulting in broad certifications that are required for many jobs but are not specific to any of them. Book training is simply not enough.” Powerpoint Templates Page 6
  • 7. MORE CAUSES OF THE PROBLEM Requires almost daily training reinforcement practice, or skills rapidly lost. Every day new hacking software is introduced. Every day new vulnerabilities are discovered. How do you keep up if everything changes so rapidly? Penetration testing is unique and very difficult because skills must be transferred by computer keyboard>very labor intensive>requires humans to think “outside the box”. No two infrastructures or system requires the same penetration testing procedures. How do you use what was learned in CEH when testing the client’s systems? Powerpoint Templates Page 7
  • 8. STILL MORE CAUSES OF THE PROBLEM Powerpoint Templates Page 8
  • 9. WHAT THE PROJECT CONSISTED OF The project is documented in appendices A through G. Appendix A: Creation of the Penetration Testing Lab Appendix B: Penetration Testing Methodology Appendix C: Reconnaissance and Information Gathering Appendix D: Active Scanning and Enumeration Appendix E: Exploitation Appendix F: Post-exploitation and Covering Tracks Appendix G: Technology Terms/Acronyms Powerpoint Templates Page 9
  • 10. WHAT THE PROJECT CONSISTED OF Appendix A: Creation of the Penetration Testing Lab Three virtual machines created within a Windows Vista OS using FREE VMWare Player community edition “Attack Machine” FREE Linux Ubuntu “Backtrack5R3” ”The pen testers premier OS and toolkit.” “Victim Machine” FREE Linux “Metasploitable”- OS-Created by Metasploit Project to allow hands-on practice “Victim Machine” FREE Trinux “Badstore.net”- vulnerable OS and Web App Did I say FREE? Powerpoint Templates Page 10
  • 11. WHAT THE PROJECT CONSISTED OF Appendix B: Penetration Testing Methodologies Penetration Testing Execution Standard, (2013) PTES. Retrieved 2013 from: http://www.pentest-standard.org/index.php/Main_Page Open System Security Testing Methodology Manual, (2013) ISECOM. Retrieved 2013 from: http://www.isecom.org/research/osstmm.html Certified Ethical Hacker (CEH), (2013) Ethical Hacking. Retrieved 2013 from: http://eccouncil.org NIST 800-53, Appendix E. Retrieved from: http://csrc.nist.gov/publications/PubsSPs.html#800-53 Powerpoint Templates Page 11
  • 12. WHAT THE PROJECT CONSISTED OF Appendix C: Reconnaissance and Information Gathering In summary of reconnaissance and foot printing, we have used the following for legal, passive, reconnaissance and information gathering on J.C.Penney and have provided screen print proof of concept (picture worth a thousand words). These tools are included in Backtrack5R3 or built into command line. Google-website URL, tons of other info; Netcraft-OS & Web server running and IP address; SmartWhoIs-Domain Registrar information theHarvester-Emails and Sub-domains; Maltego-Subdomains;  traceroute/tracert command line-traces routers from origin to destination;  nslookup command line-finds IP address from domain name>Linux “dig” and “host” are alternatives, but NA in Windows Powerpoint Templates Page 12
  • 13. WHAT THE PROJECT CONSISTED OF Appendix D: Active Scanning and Enumeration Using scanning tools in Backtrack5R3, we performed active scanning of Metasploitable and Badstore.net, our “victims.” We provided screen prints (picture worth a thousand words)for proof of concept. All these tools are included in BT5R3.  Nmap-port scan, OS version, services running;  Nessus-port scans and vulnerability scans;  Nikto (Wikto-Windows)-port scans and vulnerability scans;  Metasploit-port, OS version, services running, vulnerability Powerpoint Templates Page 13
  • 14. WHAT THE PROJECT CONSISTED OF Appendix E: Exploitation with Metasploit Metasploit-included free in Backtrack5R3-msfconsole. Proof of concept screen prints (picture worth a thousand words) included in project. Command line: root@bt:~# /pentest/exploits/framework2/msfconsole OR> root@bt:~# /opt/metasploit/msf3/msfconsole modules: auxiliary, exploits, payloads We also used Armitage-a GUI for Metasploit Command line: root@bt:~# /opt/metasploit/msf3/armitage modules: auxiliary, exploits, payloads Powerpoint Templates Page 14
  • 15. WHAT THE PROJECT CONSISTED OF Appendix F: Post-exploitation and Covering Tracks Not a lot of in-depth information available on this topic! Post-Exploitation: Got Root?, Elevation of privilege=Create user, Add user to Admin Group; Offline and online password attacks, John the Ripper, Pass the Hash, Cain and Abel. Covering Tracks: Use Metaspoit to delete Event Logs. Use Metasploit to remove file timestamps. Powerpoint Templates Page 15
  • 16. WHAT THE PROJECT CONSISTED OF Appendix G: Technology Terms/Acronyms Includes 33 definition of terms Powerpoint Templates Page 16
  • 17. SPECIAL STRATEGIES USED Member of 41 Linked-In IT Security Groups>To share information with IT security groups Subscriptions to 35 IT Security Tutorial Blogs>To learn IT security and ethical hacking 750 Linked-In Connections>To share information with IT security individuals Some basic knowledge of HTML, SQL, PYTHON Powerpoint Templates Page 17
  • 18. SUCCESSES IN ACHIEVING MILESTONES All files were downloaded and installed successfully with no problems All three virtual machines were successfully created, opened simultaneously, and run simultaneously on my Windows Vista box with no memory problems. My Windows box has 4 G RAM and I allocated 1G RAM for the “attack” machine and .5G RAM for each “victim machine” leaving approx. 2 G RAM for the Windows box. All penetration testing tools were run successfully and proof of concept screen prints were obtained for all tools. Powerpoint Templates Page 18
  • 19. OBSTACLES ENCOUNTERED Limitation: Lab only includes software. Practice in this lab will not encounter Hardware firewalls, routers, switches, hardware intrusion systems, and other hardware security devices that would be encountered in a real world penetration test. I somewhat lacked an intermediate programming knowledge. I recommend that the penetration testing student learn the following programming languages: HTML to understand http requests and responses for use of web proxies like Paros Proxy, Webscarab Proxy, Burp Proxy SQL to understand SQL injection for use of tools like SQLMap and manual injection of code PYTHON to understand most of the penetration testing tools in Backtrack5R3 for tools like theHarvester. The predominant language for most tools in BT5R3 is python. root@bt:~# ./theHarvester.py Powerpoint Templates Page 19
  • 20. WHAT I LEARNED A penetration test should not just be to gain access and get a shell and quit. It should be an audit of the IT security posture and the goal should be to identify as many vulnerabilities as possible that need fixing. Money is wasted on training-Companies with a lot of money and the US Government (DoD) will send their employees to SANS training for a 4 day crash course. Costs of travel, hotel, per diem, salary, SANS Course fee could be > $10K for one student. Student returns to work and still cannot do the job. (refer to recent news article in slide 6) There has to be a better way. WGU is part of the solution to a better way Cyberlaw, regulations, and compliance-Penetration testing without written permission is illegal. Some regulations and industry standards require periodic penetration testing, i.e. PCI-DSS, FISMA. Leadership and professionalism-penetration testing is not a true profession like CPA, law, medicine, etc. There is no barrier to entry. A barber needs a state license; a penetration tester does not. Anyone can hold themselves out to be a penetration tester. High ethical standards should be required for penetration testers. Background checks, criminal checks, financial and credit checks, REFERENCES, memberships in IT security organizations, and certifications. Powerpoint Templates Page 20
  • 21. WHAT I LEARNED Security Planning and Management- Organizations need to: Start with a framework and set of internal controls such as ISO 27000/27001/27002; Set a reasonable policy that can be followed and enforced; Employee training ; Create policy that requires vulnerability scans, periodic penetration testing, periodic IT security audits, and periodic IT policy compliance audits. Systems Security No such thing as 100% security; Penetration test is only one part of “defense in depth.” Perimeter defenses such as firewalls, routers, switches, IDS/IPS, web application and database monitoring systems must be properly configured;  Patches and AV must be kept up to date. Log files must be filtered (quantity reduced) and suspicious log entries must be examined. Powerpoint Templates Page 21
  • 22. HOW I WILL APPLY WHAT I LEARNED I will apply the knowledge to running the company http://www.butleritsec.com , an IT Security consultant Company I will apply the knowledge to provide best value to clients in a highly ethical way. I will continuously study and practice hands-on. I am just beginning to learn. Powerpoint Templates Page 22
  • 23. REFERENCES Penetration Test, (2013) Wikipedia. Retrieved 2013 from: http://en.wikipedia.org/wiki/Penetration_test NIST 800-53 and Federal Information Processing Standards (FIPS) 200 Retrieved from: http://csrc.nist.gov/publications/PubsSPs.html#800-53. Barclay Simpson, Corporate Governance Recruitment, (2011) Market Report on Information Security. Retrieved 2013 from: http://www.barclaysimpson.com/document_uploaded/BS_InfoSec_2011.pdf Magnuson, (2013) National Defense Industrial Association Magazine, Air Force Cyber-Operations Wing to Go on Hiring Binge. Retrieved 2013 from: http://www.nationaldefensemagazine.org/blog/Lists/Posts/Post.aspx?ID=1026&goback=.gde_1836487_member_20563 4892 Penetration Testing Execution Standard, (2013) PTES. Retrieved 2013 from: http://www.pentest- standard.org/index.php/Main_Page Open System Security Testing Methodology Manual, (2013) ISECOM. Retrieved 2013 from: http://www.isecom.org/research/osstmm.html Certified Ethical Hacker (CEH), (2013) Ethical Hacking. Retrieved 2013 from: http://eccouncil.org Experts say DoD cyber workers undertrained By Zachary Fryer-Biggs - Staff writer Posted : Saturday Feb 16, 2013 12:38:06 EST in the Federal Times a Gannett Pub. http://www.marinecorpstimes.com/news/2013/02/dn-cyber-certification- 021613/?goback=.gde_54384_member_216288717 Powerpoint Templates Page 23
  • 24. FINIS A THANK YOU TO ALL THE WGU IT FACULTY CINDY WENDY NORMA CHARLES AND MY MENTOR, BRETT I HAVE THOROUGHLY ENJOYED THE EXPERIENCE QUESTIONS FOR ME? Powerpoint Templates Page 24