The document outlines security assessment techniques, emphasizing the importance of identifying vulnerabilities and threats to maintain organizational security, and introduces Security Information and Event Management (SIEM) as a solution for real-time data analysis. It also describes penetration testing, its phases (planning, discovery, attack, and reporting), and various techniques (black box, white box, gray box) to evaluate system security. The document highlights the value of penetration testing in understanding system weaknesses and improving security measures.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
3 views10 pages
penetration testing
The document outlines security assessment techniques, emphasizing the importance of identifying vulnerabilities and threats to maintain organizational security, and introduces Security Information and Event Management (SIEM) as a solution for real-time data analysis. It also describes penetration testing, its phases (planning, discovery, attack, and reporting), and various techniques (black box, white box, gray box) to evaluate system security. The document highlights the value of penetration testing in understanding system weaknesses and improving security measures.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10
Security Assessment Techniques
• Identifying vulnerabilities and threats is key to maintaining organizational
security. • In addition to identifying vulnerabilities, organizations need an approach to assess threats against their systems. • In the past, organizations could use Security Information Management (SIM) system, which efficiently stores and analyses log data across all networks, devices, and applications. • Then, in addition, the data needed to be analysed in real time to provide correlation across events and enable alerts and reporting. • Security event management (SEM) was the solution in this case. • SIM and SEM were eventually combined into what’s known today as security information and event management (SIEM). Penetration Testing Techniques • Penetration testing, also known as pen testing is an authorized cyberattack performed to evaluate computer system security. • It is used as part of an organization’s information security program to better understand the systems. • Pen tests often incorporate real-world attacks to identify methods and weaknesses in the systems. • Penetration test results can be valuable. For example, they; ▪ Help organizations better understand how their systems tolerate real-world attacks. ▪ Help an organization allocate resources properly. ▪ Help quickly identify areas of weakness that need to be strengthened. ▪ Help an organization to measure its responses. • Penetration testing should always be performed within a defined program of governance that involves senior management. • Penetration testing can be conducted using various techniques, classified as follows: ▪ Black box (unknown environment): In a black box test, the assessor has no knowledge of the inner workings of the system or the source code. The assessor simply tests the application for functionality as if he or she were a regular user of the system. ▪ White box (known environment): White box testing, also called clear box or glass box testing, provides more transparency than black box testing. In white box testing, the assessor has knowledge of the inner workings of either the system or the source code. ▪ Gray box (partially known environment): Gray box testing combines white and black box techniques. Think of this approach as translucent: The tester has some understanding or a limited knowledge of the inner workings. • Black box testing consumes less time and is less exhaustive than white box testing, and gray box testing falls in between. Comparison between unknown, known and partially known penetration testing environments. • Penetration testing includes the following components: ▪ Verifying that a threat exists: A penetration test seeks to exploit vulnerabilities. Before you can exploit a vulnerability, you must first understand the threat and its extent. ▪ Bypassing security controls: Penetration tests should seek to bypass security controls, just as a real attacker would. For example, bypassing firewalls through the use of a rogue wireless access point or modem. Another common method of bypassing security controls is to render them ineffective. ▪ Actively testing security controls: Active techniques include direct interaction with a specific target. Passive techniques seek to identify gaps that could lead to missing or misconfigured security controls. Active techniques, on the other hand, seek to identify whether controls are implemented properly. ▪ Exploiting vulnerabilities: Unlike vulnerability scanning, penetration testing does not just check for the existence of a potential vulnerability but attempts to exploit it. A resulting exploit verifies the vulnerability and should lead to mitigation techniques and controls to deal with the security exposure. Most exploited vulnerabilities are likely to result from misconfigurations, kernel flaws, buffer overflows, input validation errors, and incorrect permissions. Phases of a penetration test • Careful planning is required before conducting penetration testing. • A penetration test involves four primary phases: planning, discovery, attack, and reporting. Planning • The planning phase does not involve actual testing. • Its purpose is to set expectations and provide clarity regarding the plan and goals. • This phase is an important part of the overall process because of the risks of penetration tests. • The planning phase is the time to clearly define the rules of engagement. • An important output of this phase is a documented plan that includes the rules and expectations. Discovery • Discovery consists of two fundamental areas: information gathering and scanning and vulnerability analysis. • Information gathering and scanning involve conducting reconnaissance on the target through observation and other outside discovery tools. • reconnaissance is considered either passive or active. • Passive techniques are less risky than active ones because they do not require actively engaging with the targeted systems. Attack • During the attack phase, the tester tries to gain access or penetrate the system. • The idea is to at least perform an initial exploitation, even if it does not reveal the ultimate goal or data of value. • During this initial exploitation, the tester commonly has only regular user access and does not have access to high value areas. • However, this initial exploit provides the opportunity for the penetration tester to execute privilege escalation. • From there, the tester can likely begin to gain further access deeper into the network, in a process known as lateral movement. • Moving laterally requires pivoting. • Throughout these pivots, the tester might try to install additional tools. This process is called persistence. • Finally, the last step is cleanup. Reporting • Reporting is an important component of a penetration test. • After any penetration test, a comprehensive report should be delivered that includes, at a minimum, ▪ vulnerabilities identified, ▪ actions taken, and the results, ▪ mitigation techniques, and ▪ some sort of quantification of the risk.