Pentest Guide Werty Asdf
Pentest Guide Werty Asdf
Pentest Guide Werty Asdf
A penetration test, colloquially known as a pen test, is an authorized simulated cyber attack
on a computer system, performed to evaluate the security of the system.[1][2] The test is
performed to identify both weaknesses (also referred to as vulnerabilities), including the
potential for unauthorized parties to gain access to the system's features and data, [3][4] as well
as strengths,[5] enabling a full risk assessment to be completed.
The process typically identifies the target systems and a particular goal, then reviews available
information and undertakes various means to attain that goal. A penetration test target may be
a white box (which provides background and system information) or black box (which provides
only basic or no information except the company name). A gray box penetration test is a
combination of the two (where limited knowledge of the target is shared with the auditor). [6] A
penetration test can help determine whether a system is vulnerable to attack if the defenses
were sufficient, and which defenses (if any) the test defeated.[7][5]
Security issues that the penetration test uncovers should be reported to the system
owner.[8] Penetration test reports may also assess potential impacts to the organization and
suggest countermeasures to reduce risk.[8]
The National Cyber Security Center, describes penetration testing as the following: "A method
for gaining assurance in the security of an IT system by attempting to breach some or all of that
system's security, using the same tools and techniques as an adversary might." [9]
The goals of a penetration test vary depending on the type of approved activity for any given
engagement with the primary goal focused on finding vulnerabilities that could be exploited by
a nefarious actor and informing the client of those vulnerabilities along with recommended
mitigation strategies.[10]
Penetration tests are a component of a full security audit. For example, the Payment Card
Industry Data Security Standard requires penetration testing on a regular schedule, and after
system changes.[11]
Flaw hypothesis methodology is a systems analysis and penetration prediction technique
where a list of hypothesized flaws in a software system are compiled through analysis of
the specifications and documentation for the system. The list of hypothesized flaws is then
prioritized on the basis of the estimated probability that a flaw actually exists, and on the ease
of exploiting it to the extent of control or compromise. The prioritized list is used to direct the
actual testing of the system.
Contents
1History
2Tools
o 2.1Specialized OS distributions
o 2.2Software frameworks
3Penetration testing phases
o 3.1Vulnerabilities
o 3.2Payload
4Standardized government penetration test services
5See also
6General References
7References
History[edit]
By the mid 1960s, growing popularity of time-sharing computer systems that made resources
accessible over communications lines created new security concerns. As the scholars Deborah
Russell and G. T. Gangemi, Sr. explain, "The 1960s marked the true beginning of the age of
computer security."[12]:27
In June 1965, for example, several of the country's leading computer security experts held one
of the first major conferences on system security—hosted by the government contractor,
the System Development Corporation (SDC). During the conference, someone noted that one
SDC employee had been able to easily undermine various system safeguards added to
SDC's AN/FSQ-32 time-sharing computer system. In hopes that further system security study
would be useful, attendees requested "...studies to be conducted in such areas as breaking
security protection in the time-shared system." In other words, the conference participants
initiated one of the first formal requests to use computer penetration as a tool for studying
system security.[13]:7–8
At the Spring 1967 Joint Computer Conference, many leading computer specialists again met
to discuss system security concerns. During this conference, the computer security
experts Willis Ware, Harold Petersen, and Rein Tern, all of the RAND Corporation, and
Bernard Peters of the National Security Agency (NSA), all used the phrase "penetration" to
describe an attack against a computer system. In a paper, Ware referred to the military's
remotely accessible time-sharing systems, warning that "Deliberate attempts to penetrate such
computer systems must be anticipated." His colleagues Petersen and Turn shared the same
concerns, observing that online communication systems "...are vulnerable to threats to
privacy," including "deliberate penetration." Bernard Peters of the NSA made the same point,
insisting that computer input and output "...could provide large amounts of information to a
penetrating program." During the conference, computer penetration would become formally
identified as a major threat to online computer systems.[13]:8
The threat that computer penetration posed was next outlined in a major report organized by
the United States Department of Defense (DoD) in late 1967. Essentially, DoD officials turned
to Willis Ware to lead a task force of experts from NSA, CIA, DoD, academia, and industry to
formally assess the security of time-sharing computer systems. By relying on many papers
presented during the Spring 1967 Joint Computer Conference, the task force largely confirmed
the threat to system security that computer penetration posed. Ware's report was initially
classified, but many of the country's leading computer experts quickly identified the study as
the definitive document on computer security.[13] Jeffrey R. Yost of the Charles Babbage
Institute has more recently described the Ware report as "...by far the most important and
thorough study on technical and operational issues regarding secure computing systems of its
time period."[14] In effect, the Ware report reaffirmed the major threat posed by computer
penetration to the new online time-sharing computer systems.
To better understand system weaknesses, the federal government and its contractors soon
began organizing teams of penetrators, known as tiger teams, to use computer penetration to
test system security. Deborah Russell and G. T. Gangemi, Sr. stated that during the 1970s
"...'tiger teams' first emerged on the computer scene. Tiger teams were government and
industry-sponsored teams of crackers who attempted to break down the defenses of computer
systems in an effort to uncover, and eventually patch, security holes." [12]:29
A leading scholar on the history of computer security, Donald MacKenzie, similarly points out
that, "RAND had done some penetration studies (experiments in circumventing computer
security controls) of early time-sharing systems on behalf of the government." [15] [16] Jeffrey R.
Yost of the Charles Babbage Institute, in his own work on the history of computer security, also
acknowledges that both the RAND Corporation and the SDC had "engaged in some of the first
so-called 'penetration studies' to try to infiltrate time-sharing systems in order to test their
vulnerability."[14] In virtually all these early studies, tiger teams successfully broke into all
targeted computer systems, as the country's time-sharing systems had poor defenses.
Of early tiger team actions, efforts at the RAND Corporation demonstrated the usefulness of
penetration as a tool for assessing system security. At the time, one RAND analyst noted that
the tests had "...demonstrated the practicality of system-penetration as a tool for evaluating the
effectiveness and adequacy of implemented data security safeguards." In addition, a number
of the RAND analysts insisted that the penetration test exercises all offered several benefits
that justified its continued use. As they noted in one paper, "A penetrator seems to develop a
diabolical frame of mind in his search for operating system weaknesses and incompleteness,
which is difficult to emulate." For these reasons and others, many analysts at RAND
recommended the continued study of penetration techniques for their usefulness in assessing
system security.[13]:9
Perhaps the leading computer penetration expert during these formative years was James P.
Anderson, who had worked with the NSA, RAND, and other government agencies to study
system security. In early 1971, the U.S. Air Force contracted Anderson's private company to
study the security of its time-sharing system at the Pentagon. In his study, Anderson outlined a
number of major factors involved in computer penetration. Anderson described a general
attack sequence in steps:
Tools[edit]
A wide variety of security assessment tools are available to assist with penetration testing,
including free-of-charge, free software, and commercial software.
Specialized OS distributions[edit]
Several operating system distributions are geared towards penetration testing. [18] Such
distributions typically contain a pre-packaged and pre-configured set of tools. The penetration
tester does not have to hunt down each individual tool, which might increase the risk
complications—such as compile errors, dependencies issues, configuration errors. Also,
acquiring additional tools may not be practical in the tester's context.
Notable penetration testing OS examples include:
Burp Suite
Metasploit Project
Nessus
Nmap
OWASP ZAP
w3af
Metasploit
Nessus
Nmap
OpenVAS
W3af
See also[edit]
IT risk
ITHC
Tiger team
General References[edit]
Long, Johnny (2007). Google Hacking for Penetration Testers, Elsevier
The Most Indepth Hacker's Guide (Dawood Khan)[23]
The Definitive Guide to Penetration Testing[24]
References[edit]
1. ^ "What Is Penetration Testing?". Retrieved 2018-12-18.
2. ^ "Penetration Testing overview". Retrieved 2019-01-25.
3. ^ The CISSP® and CAPCM Prep Guide: Platinum Edition. John Wiley & Sons. ISBN 978-0-
470-00792-1. A penetration test can determine how a system reacts to an attack, whether or not
a system's defenses can be breached, and what information can be acquired from the system
4. ^ Kevin M. Henry. Penetration Testing: Protecting Networks and Systems. IT Governance
Ltd. ISBN 978-1-849-28371-7. Penetration testing is the simulation of an attack on a system,
network, piece of equipment or other facility, with the objective of proving how vulnerable that
system or "target" would be to a real attack.
5. ^ Jump up to:a b Cris Thomas (Space Rogue), Dan Patterson (2017). Password Cracking is
easy with IBM's Space Rogue (Video). CBS Interactive. Event occurs at 4:30-5:30. Retrieved 1
December 2017.
6. ^ "Pen Testing Types explained". 2017-06-09. Retrieved 2018-10-23.
7. ^ "Penetration Testing: Assessing Your Overall Security Before Attackers Do". SANS Institute.
Retrieved 16 January 2014.
8. ^ Jump up to:a b "Writing a Penetration Testing Report". SANS Institute. Retrieved 12
January 2015.
9. ^ "Penetration Testing". NCSC. Aug 2017. Retrieved 30 October 2018.
10. ^ Patrick Engebretson, The basics of hacking and penetration testing, Elsevier, 2013
11. ^ Alan Calder and Geraint Williams. PCI DSS: A Pocket Guide, 3rd Edition. ISBN 978-1-84928-
554-4. network vulnerability scans at least quarterly and after any significant change in the
network
12. ^ Jump up to:a b Russell, Deborah; Gangemi, G.T. (1991). Computer Security Basics. O'Reilly
Media Inc. ASIN B01K3K3KJ4.
13. ^ Jump up to:a b c d e f Hunt, Edward (2012). "US Government Computer Penetration Programs
and the Implications for Cyberwar". IEEE Annals of the History of Computing. 34 (3): 4–
21. doi:10.1109/MAHC.2011.82.
14. ^ Jump up to:a b Yost, Jeffrey R. (2007). de Leeuw, Karl; Bergstra, Jan, eds. A History of
Computer Security Standards, in The History of Information Security: A Comprehensive
Handbook. Elsevier. pp. 601–602.
15. ^ Mackenzie, Donald; Pottinger, Garrel (1997). "Mathematics, Technology, and Trust: Formal
Verification, Computer Security, and the U.S. Military". IEEE Annals of the History of
Computing. 19 (3): 41–59. doi:10.1109/85.601735.
16. ^ Mackenzie, Donald A. Mechanizing Proof: Computing, Risk, and Trust. Massachusetts
Institute of Technology. p. 156. ISBN 0-262-13393-8.
17. ^ Broad, William J. (September 25, 1983). "Computer Security Worries Military Experts", The
New York Times
18. ^ Faircloth, Jeremy (2011). "Chapter 1:Tools of the Trade". Penetration Tester's Open Source
Toolkit (PDF) (Third ed.). Elsevier. ISBN 1597496278. Retrieved 4 January2018.[need quotation to verify]
19. ^ "Summarizing The Five Phases of Penetration Testing - Cybrary". Cybrary. 2015-05-06.
Retrieved 2018-06-25.
20. ^ "GSA HACS SIN 132-45 Services". 1 March 2018.
21. ^ "Pen Testing Services". 1 March 2018.
22. ^ "Penetration Testing Service Description for HACS". 1 March 2018.
23. ^ Dawood Khan (2 December 2015). The Most Indepth Hacker's Guide. Lulu.com. pp. 135–
. ISBN 978-1-329-72751-9.
24. ^ "Definitive Guide to Penetration Testing | Core Sentinel". Core Sentinel. Retrieved 2018-10-
23.