Tuesday, December 7, 2010

Vulnerability Assessment & Penetration Testing Philippines (Black Box / White Box)

The conduct of an external/internal vulnerability assessment and penetration testing of applications and network can be initiated wherein there is a limit in the knowledge assessment and testing performed at the front-end level (website).

The testing does not require knowledge of underlying code base or application architecture. Only authentication information for the internal testing would be required. This is called “Black Box” which is similar to the hacker’s point of view because usually they don’t have all the information about your network.

When the client provides complete information about the applications and networks this is called “White Box”, in between that is called “Grey Box”.

The amount of information needed will be based on our clients’ needs and wishes as discussed in Bitshield’s initial information gathering and scoping of the project.

www.bitshieldsecurity.com 

Vulnerabilities Assessment Philippines

The complexity of modern enterprises, their reliance on technology, and the heightened inter connectivity among organizations are rapidly evolving developments that create widespread opportunities for theft, fraud, and other forms of exploitation by offenders both outside and inside an organization. Internal and external perpetrators can exploit traditional and new vulnerabilities in seconds.

When we talk about vulnerability assessment there are two areas and different layers that need to be understood so that the scope of the “VA” can be defined. There are vulnerabilities in the software of the applications being used that can be exploited by someone who knows about them.

The first layer would be the web applications. The most common threats to these are:

• Cross-Site Scripting (XSS) - A web application accepts user input (such as client-side scripts and hyperlinks to an attacker’s site) and displays it within its generated web pages without proper validation.

• SQL Injection - Unvalidated input is used in an argument to a function that calls an SQL query.

* Many web applications on the internet still use "SQL Injection" for their normal functionality. It should be noted that this is only a difference in intent. The web applications that legitimately use SQL Injection are guaranteed to be vulnerable to the tools and techniques used by attackers to perform malicious SQL Injections. The servers that house these applications may have a higher compromise rate not only because they are known to be vulnerable, but also because they fail to distinguish between legitimate and malicious injects to identify attacks.

• File Inclusion - Unvalidated input is used in an argument to file or stream functions. Then there is the OS (operating system) itself which has vulnerabilities that are always being discovered. The vendors post these on their websites and provide patches and updates i.e. Microsoft.

Also there are the client side applications such as Adobe PDF Reader, QuickTime, Adobe Flash and Microsoft Office. Waves of targeted email attacks, often called spear phishing, are exploiting client-side vulnerabilities in commonly used programs. This is currently the primary initial infection vector used to compromise computers that have internet access.

These mentioned above would be the first group of vulnerabilities that are related to the source code of applications and can be discovered by automated tools and manual techniques. These can be fixed by patches and software updates.

The second group of vulnerabilities is related to security policies and procedures. Bitshield Security Consulting can review these and help you develop your Security Policies and Procedures. This would be an added dimension to the scope of a VA/PT.

Internal vs. External Vulnerability Assessment & Penetration Testing Philippines

The external testing is done thru the internet. While internal testing is done inside the network. The external is done from a hacker’s point of view usually with a limited knowledge of the target (black box).

The external test will be focused on the web applications and servers while the internal will be focused on the network devices such as firewall, router, modems, etc.

Internal testing tests will identify vulnerabilities with physical access or exposures to social engineering. Internal penetration tests are intended to determine what vulnerabilities exist for systems that are accessible to authorized network connections (or login IDs) that reside within the network domain of the organization.

An internal test might better replicate the efforts a recently terminated employee might take when attempting to access valuable information. Conversely, external penetration tests are intended to identify vulnerabilities that are present for connections that have been established through the organization connection to the internet.

www.bitshieldsecurity.com

Penetration Testing vs. Vulnerability Assessment Philippines

There is a certain amount of confusion about the difference between Penetration Testing and Vulnerability Assessment. There is a very basic difference that can be explained by the definitions of these.

Vulnerability is a property of system security requirements, design, implementation, or operation that could be accidentally triggered or intentionally exploited and result in a security failure. The source of any failure is a latent vulnerability. If there is a failure, there must have been vulnerability. Vulnerability is the result of one or more weaknesses in requirements, design, implementation, or operation.

A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.

A penetration test is a method of evaluating the security of a computer system or network by simulating an attack from a malicious source by using hacking tools and exploit on those found or known vulnerabilities.

An exploit is a technique that takes advantage of a vulnerability to cause a failure. An attack is a specific application of an exploit. In other words, an attack is an action (or sequence of actions) that takes advantage of vulnerability. These exploits are both contained in the commercial tools or custom designed by our penetration testers.

The vulnerability assessment is the first step to a penetration test. The information obtained from the assessment will be used in the testing. Whereas, the assessment is checking for holes and potential vulnerabilities, the penetration testing actually attempts to exploit the findings.Performing a vulnerability assessment shows an overview, which can turn up false positives and false negatives.

Vulnerability assessments focus on finding as many potential security weaknesses as possible for a typically broadly defined target environment. Bitshield and our customers agree to a target list, set a timeframe, and work out escalation procedures in case of an issue.

Our vulnerability assessments use scans to look for flaws in network services as well as network-attached hardware, software, and operating system. Our vulnerability assessments target web applications, databases, wireless networks, or other specialized areas. A routine vulnerability assessment should be a standard element of every organization's security policy.

This vulnerability assessment’s purpose is to help answer the question: "How secure is your organization's information?"

The reason you need to finish the process and have a penetration test is that the VA will produce what are called “false positives” that is, things that look like a concern but might not really be vulnerabilities. A PT will exploit the suspected vulnerability and determine if it is a real threat. For example, a vulnerability scanner may identify Linux vulnerabilities on a Windows system.

This could be identified as a false positive. False negatives are also a risk; those are vulnerabilities that don't show up because the test case or signature doesn't make a match. With additional information about our customer's systems and a little help from the customer, we can sort out many of the false positives and
negatives. Vulnerability scans are essentially "look but don't touch," though, so assessors can't weed out 100% of the false signals. The PT will eliminate all false positives. So basically the difference between a Vulnerability Assessment and a Penetration Test is the fact that a Penetration Test will verify that the vulnerabilities are in fact exploitable by actually exploiting those vulnerabilities.

Warning!
Many companies/service providers will perform a VA and never run any exploits and try to pass it as a PT. If you have someone doing that, then they are trying to overcharge you.

The price between a VA and a PT can be significant. Why is that? It’s the level of responsibility that the penetration testers must take.

It's very important that your service provider know the difference and is able to explain the difference. If they can't do that then you should not use their services. If they have a high priced VA then you need them to justify the "value adds".

It is also very important that your service provider is using “Certified Ethical Hackers” or C|EH certified by an international organization like the EC Council. A C|EH is highly trained and follows a code of ethics. All Bitshield’s penetration testers are certified ethical hackers. We do not hire black hats.

A Vulnerability Assessment can vary in scale and complexity according to our clients needs but will generally include the following:
1. External scan with various open source and commercial tools to obtain general security posture of systems.
2. Internal scan with open source and commercial tools to assess the configuration of the systems and their patch levels, etc. There is some overlap between these first two steps.
3. Review system architecture and associated documentation.
4. Interview System Administrators and Engineers on system operation.
5. Review existing policy, procedures, SOPs, etc.
6. Perform and document the risk analysis.

A Penetration Test on the other hand can include any number of the VA items but includes a much wider array of testing tools. 

A Penetration Test is usually a few hours to a few days as opposed to a VA which can take longer to perform.

A Penetration Test usually has a pre-set goal. The scope of the testing and its goal is determined by the results of the VA and can be limited or unlimited.

A Penetration Test really illustrates the relationship of vulnerabilities and how they can string together to open a hole in what appeared to be a solid wall.

The VA will tell you that there are vulnerabilities but the PT will show you how a hacker can use those vulnerabilities to compromise your network which often can be done by exploiting one vulnerability to get to another.

Thursday, December 2, 2010

Vulnerability Assessment & Penetration Testing Philippines

Bitshield Background Information

Bitshield Security Consulting Inc. is an information security firm which is founded to provide information security to your information assets. We perform information systems assessment and audit to vulnerability assessment (VA) and penetration testing (PT) in a technical manner and most importantly we recommend remediation based on the result of technical assessment. We analyze the security aspect of your IT infrastructure and recommend the best solutions and countermeasures for your business. We also provide Information Security Training and Education.


Services
·         Vulnerability Assessment & Penetration Testing
Ø  Network & Devices
Ø  Web Application
Ø  Database
Ø  Email
Ø  VoIP
Ø  Virtual Infrastructure
Ø  Cloud Computing

·         Data Center & Network
Ø  Data Center Security Design & Consultancy
Ø  Network Security Architecture Design & Review
Ø  Network Health Assessment

·         Audit & Compliance   
Ø  Risk Assessment
Ø  Information Security Policies Development
Ø  Payment Card Industry (PCI) Data Security Standard Assessment
Ø  BSP Circular 0542 Assessment
Ø  ISMS Implementation
Ø  Data Loss Prevention Assessment
Ø  Source Code Review

·         Computer Forensics
Ø  Document Search & Recovery
Ø  Data Duplication& Prevention
Ø  Non-Invasive Data Acquisition
Ø  Network Forensic Investigation
Ø  Database Forensic Investigation
Ø  Mobile Forensic Investigation
Ø  Incident Response

We have comprehensive security awareness programs and trainings about useful tools in checking the integrity of the network.


Training & Education

·         Certification Program
Ø  Certified Ethical Hacking & Countermeasures (C|EH)
Ø  EC-Council Certified Security Analyst/Licensed Penetration Tester (ECSA/LPT)
Ø  Computer Hacking Forensic Investigator (CHFI)
Ø  Security+
Ø  Security 5

·         Non-Certification Program
Ø  Network & Communications Security
Ø  Top 20 Information Security System Controls
Ø  Basic Information Systems Audit
Ø  Basic Ethical Hacking
Ø  Network Security
Ø  Web Applications Security
Ø  Database Security
Ø  Computer Forensics
Ø  Incident Response
Ø  Information Security Awareness Program
Ø  Basic Information Security Conference for Students & Faculties


* We can create custom courses with selected modules according to our clients needs*

www.bitshieldsecurity.com