SlideShare a Scribd company logo
1 of 80
Of security testing and assessment
Pain in the arse
Loudmouth
Hacker Punk
Tells lies (professionally)
Is called all sorts of bad words.. That I will likely say
throughout this talk
Cant code well
Talks $hit
Drinks a LOT
Is an overall J3rk
LARES
OSINT
SIGINT
TSCM/ Bug Sweeping
Exploit Development
Tool Creation
Attack Planning
Offensive Consultation
Adversarial Intelligence
Competitive Intelligence
Attack Modeling
Business Chain Vuln Assessments
Custom Physical Bypass Tool Design
Reverse Engineering
Other stuff I can’t write down…
Traditional InfoSec
• Typical services
• Proposed value (Sales BS)
• Set up for failure
• WYSIWYG
Enhancing Services Value
• Doing services right
• Mo’ value, less money
• Eliminating failure
• Custom Delivery
New Skool InfoSec
• Red Teaming (CAST:Converged Attack Surface Tesing)
• Insider Threat Assessment
• Adversarial Modeling
• IDCa (interactive defense capability assessment)
• BCVa(business chain vulnerability analysis)
Doing the same thing and expecting different results.
 A vulnerability assessment is the process of identifying, quantifying,
and prioritizing (or ranking) the vulnerabilities in a system.
 http://en.wikipedia.org/wiki/Vulnerability_assessment
Reasons to Conduct
 Identify potential vulnerabilities
 Provide scoring of risk & prioritization
of remediation
 Manage environment vulnerabilities
over time to show security program
improvement, defense capability
increase and compliance with ongoing
patch, system and vulnerability
lifecycle
How it’s usually done
 Run a bunch of scanners
 Generate a report
 **Sometimes** Generate a custom
report consisting of copy/paste data
from the Vulnerability scanners and
TRY to make sure you delete the word
Nessus, qualys… and/or the previous
clients name
 Do not run “Dangerous or Experimental Checks” *instant 30%+ reduction in results
and overall accuracy*
 Do not perform Denial of Service
 Do not run thorough checks
 Do not run Web checks
 Only run ONE brand of scanner
 Limit only to known network checks
 Only scan once
 A penetration test is a method of evaluating the security of a computer system or
network by simulating an attack from a malicious source... The process involves an
active analysis of the system for any potential vulnerabilities that may result from poor
or improper system configuration, known and/or unknown hardware or software flaws,
or operational weaknesses in process or technical countermeasures.
 http://en.wikipedia.org/wiki/Penetration_test
Reasons to Conduct
 Identify if attackers can readily
compromise the security of the
business
 Identify potential impact to the
business
 Confirm vulnerabilities identified
 Gain a “Real World” View of an
attackers ability to “hack” the
environment and resolve issues
identified
How it’s usually done
 Do all the steps in Vulnerability
Assessment listed previously
 Run metasploit/Core/Canvas against
hosts
 Try a few other automated tools
 Call it “SECURE” If those don’t work
 Do not allow the exploitation of systems
 Restrict testing to non production systems
 Restrict the hours of testing
 Restrict the length of testing
 Improperly scope / fail to include ALL addresses
 Only perform externally
 Patch/fix BEFORE the test
 Only allow directed attacks ( no SE/ Phishing)
 Lack of focus on BUSINESS risk and increased focus on technical issue
The IT risk management is the application of risk management to
Information technology context in order to manage IT risk.
Information security risk assessment is the process used to identify and
understand risks to the confidentiality, integrity, and availability of
information and information systems. In its simplest form, a risk
assessment consists of the identification and valuation of assets and an
analysis of those assets in relation to potential threats and vulnerabilities,
resulting in a ranking of risks to mitigate. The resulting information should
be used to develop strategies to mitigate those risks.
http://laresconsulting.com/risk.php
Reasons to Conduct
 Compliance with regulations
 Overall health check of the InfoSec
program
 Gain understanding of program
Effectiveness
 Baseline discovery
 To show 3rd parties and customers
they are “Secure”
How it’s usually done
 Whip out a checklist
 Check stuff off on checklist
 Have a TON of interviews
 Believe every word
 Do a tick mark legend and ask people
to provide “evidence” *which is usually
faked*
 Only assess controls that are in scope
of THAT specific assessment *often
information centric*
 Do not allow ACTUAL/TECHNICAL testing and validation
 Rely on all information provided as TRUE
 Minimize scope to only include assets and controls that are part of the selected
compliance regulation and NOT the ENTIRE BUSINESS
 Allow for “Compensating Controls” to be an answer to most issues
 Expect to become compliant through outsourcing
 Expect to become compliant through product purchase/implementation
 Be unprepared
 LIE
Stop cutting off your own fingers
TESTING
 Skip it!
 Do It yourself
 Use Scanners to identify Vulns
 Figure out a process to track them over
time
 Manage the reduction of Vulns over time
 Manage the MTTP ( Mean Time To
Patch)
 Do the rest and make your testers
WORK hard.
DON’T RUSH IT
PLAN FOR INTERACTION
ALWAYS “Ride Along”
Connect to the REAL impact (shells don’t matter)
GO FULL SCOPE
Don’t use firms that have “SECRET” processes or can not
explain every step of the test and HOW they do it
Attack like AN ATTACKER not like a script kiddie
Use a repeatable methodology
IF THE TESTING TIME LOOKS LIKE THIS, GET A NEW TESTER
Recon Scan Enumerate Exploit
Post-
Exploit
Write
Report
1 • Pre-Engagement
2 • Intelligence Gathering
3 • Threat Modelling
4 • Vulnerability Analysis
5 • Exploitation
6 • Post-Exploitation
7 • Reporting
WWW.PENTEST-
STANDARD.ORG
HTTP://WWW.PENTEST-
STANDARD.ORG/INDEX.P
HP/PTES_TECHNICAL_GUI
DELINES
Common misconceptions
We will get owned, what's
the point
It will offend our users
Doesn’t provide enough
value
How it’s usually done
Send a 419 scam style
email
Track clicks
Write a report to show who
clicked
How it SHOULD be
done to generate
MAX value
 MAKE IT BUSINESS FOCUSED NOT IT FOCUSED
 Use multiple standards
 Remove silo’s and scope restrictions
 TEST, TEST, TEST (PBC docs ARE NOT SUFFICENT)
 A sample set does not show the ability to secure. I crack in certain parts of the
defense chain allow for the compromise of the ENTIRE COMPANY
 ALWAYS interview each and every executive to understand THEIR concerns and build
the solutions to address THEM and not always “just for the audit”
 Discuss the VALUE of systems in relevance to the business and re-weight scores
 NEVER allow a compensating control on a BUSINESS critical system. EVER
THIS is what the BIG BOYS do, catch up.
The term originated within the military to describe a team whose purpose is to penetrate
security of "friendly" installations, and thus test their security measures. The members
are professionals who install evidence of their success, e.g. leave cardboard signs
saying "bomb" in critical defense installations, hand-lettered notes saying that “your
codebooks have been stolen" (they usually have not been) inside safes, etc.
Sometimes, after a successful penetration, a high-ranking security person will show up
later for a "security review," and "find" the evidence. Afterward, the term became
popular in the computer industry, where the security of computer systems is often tested
by tiger teams.
How do you know you can put up a fight if you have never
taken a punch?
Electronic
• Network Pentesting
• Surveillance/ plants
Social
• In Person Social
Engineering
• Phone Conversation
• Social Profiling
Physical
• Lockpicking
• Direct Attack
EP Convergance
• Attacks on physical systems
that are network enabled
ES Convergance
• Blackmail
• Phishing
• Profiling
• Creating moles
PS Convergance
• Tailgaiting
• Impersonation
RED
TEAM
Reasons to Conduct
 Real world test to see how you will hold up against a highly skilled, motivated and funded
attacker
 The only type of testing that will cover a fully converged attack surface
 Impact assessment is IMMEDIATE and built to show a maximum damage event
 This IS the FULL DR test of an InfoSec Program
Reasons to Conduct
 Exercises in evaluating WHO your top5 most likely attackers are
 Full OSINT profiling on the Attackers and their capabilities
 Scenarios which are highly focused at Detecting, Confirming, Mitigating and Resolving
attacks that are the MOST likely to happen
 Testers are forced to use the capabilities of the likely attackers and train the team how to
be cool under fire
 The most relevant attacks are dealt with FIRST, you are not defending against the
pentester… you are prepping to the battle that WILL happen
What is it?
 Evaluate threat and risk from
employee/staff/contractor/executive/etc..
 Use company provisioned asset/standard access model (limited
priv’s)
 Identify what data/assets can be accessed through authorized
channels
 Identify elevation of privilege scenarios (exploit AND non-exploit
methods)
Why do it?
 Provides visibility into “what could happen”
 A user WILL be compromised at some point
 Evaluate security posture of corporate asset
 External testing doesn’t always provide accurate measurement of
internal sourced threats
 Identify insecure internal communication channels
 Evaluate covert channel resistance/prevention
 External assessments usually only measure (1) of these (if you’re lucky)
 Measure defense capabilities internally (beyond perimeter)
 System to system communication
 Level of “noise” detection
 Data leakage/exfil abilities
 Log/data correlation
 Incident response/forensics team’s level of knowledge/expertise
Reasons to Conduct
 Targeted at working BOTH sides of the test
 Active analysis on defense capability and impreovements / feedback can be real time
 Direct understanding of where process,policy and procedure break down in a REAL LIFE
EVENT
 Identification of Defensive Technology effectiveness
Reasons to Conduct
 Targeted at working on identifying BUSINESS vulns
 How much can/do partners hurt you
 Where can you better defend against Partners and 3rd parties
 Who what where when and why…. Of how the business works and how it can be
materially effected by relationships
Cnickerson@laresconsulting.com
WWW.LARES.COM

More Related Content

What's hot

Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
beltface
 
Owasp2013 johannesullrich
Owasp2013 johannesullrichOwasp2013 johannesullrich
Owasp2013 johannesullrich
drewz lin
 
Declaration of Mal(WAR)e
Declaration of Mal(WAR)eDeclaration of Mal(WAR)e
Declaration of Mal(WAR)e
NetSPI
 
Red teaming the CCDC
Red teaming the CCDCRed teaming the CCDC
Red teaming the CCDC
scriptjunkie
 

What's hot (20)

How to Break Software: Embedded Edition
How to Break Software: Embedded EditionHow to Break Software: Embedded Edition
How to Break Software: Embedded Edition
 
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
 
Penetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability ScanningPenetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability Scanning
 
Securing the “Weakest Link”
Securing the “Weakest Link”Securing the “Weakest Link”
Securing the “Weakest Link”
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
 
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
 
How Ethical Hacking is Healthy for Business
How Ethical Hacking is Healthy for BusinessHow Ethical Hacking is Healthy for Business
How Ethical Hacking is Healthy for Business
 
Hiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known VulnerabilitiesHiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known Vulnerabilities
 
XBOSoft Mobile Security Webinar with Jon D. Hagar
XBOSoft Mobile Security Webinar with Jon D. HagarXBOSoft Mobile Security Webinar with Jon D. Hagar
XBOSoft Mobile Security Webinar with Jon D. Hagar
 
Stealing Domain Admin (or How I Learned to Stop Worrying and Love the CSSF)
Stealing Domain Admin (or How I Learned to Stop Worrying and Love the CSSF)Stealing Domain Admin (or How I Learned to Stop Worrying and Love the CSSF)
Stealing Domain Admin (or How I Learned to Stop Worrying and Love the CSSF)
 
Break IT Down by Josh Smith
Break IT Down by Josh SmithBreak IT Down by Josh Smith
Break IT Down by Josh Smith
 
2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two
 
Lets talk about bug hunting
Lets talk about bug huntingLets talk about bug hunting
Lets talk about bug hunting
 
Owasp2013 johannesullrich
Owasp2013 johannesullrichOwasp2013 johannesullrich
Owasp2013 johannesullrich
 
What is pentest
What is pentestWhat is pentest
What is pentest
 
Let’s play the game. Yet another way to perform penetration test. Russian “re...
Let’s play the game. Yet another way to perform penetration test. Russian “re...Let’s play the game. Yet another way to perform penetration test. Russian “re...
Let’s play the game. Yet another way to perform penetration test. Russian “re...
 
Declaration of Mal(WAR)e
Declaration of Mal(WAR)eDeclaration of Mal(WAR)e
Declaration of Mal(WAR)e
 
Secure Android Apps- nVisium Security
Secure Android Apps- nVisium SecuritySecure Android Apps- nVisium Security
Secure Android Apps- nVisium Security
 
Red teaming the CCDC
Red teaming the CCDCRed teaming the CCDC
Red teaming the CCDC
 
Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobileClick and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobile
 

Similar to Increasing Value Of Security Assessment Services

Appsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martinAppsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martin
drewz lin
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
Rand W. Hirt
 
Security testing
Security testingSecurity testing
Security testing
baskar p
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work together
Wendy Knox Everette
 

Similar to Increasing Value Of Security Assessment Services (20)

Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?
 
Penetration Testing Guide
Penetration Testing GuidePenetration Testing Guide
Penetration Testing Guide
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
 
The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0The QA Analyst's Hacker's Landmark Tour v3.0
The QA Analyst's Hacker's Landmark Tour v3.0
 
Appsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martinAppsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martin
 
pentration testing.pdf
pentration testing.pdfpentration testing.pdf
pentration testing.pdf
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Penetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity ProfessionalsPenetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity Professionals
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
(VAPT) Vulnerability Assessment And Penetration Testing
(VAPT) Vulnerability Assessment And Penetration Testing(VAPT) Vulnerability Assessment And Penetration Testing
(VAPT) Vulnerability Assessment And Penetration Testing
 
Backtrack manual Part1
Backtrack manual Part1Backtrack manual Part1
Backtrack manual Part1
 
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security EnhancementDemystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
 
Security testing
Security testingSecurity testing
Security testing
 
Module 6.pptx
Module 6.pptxModule 6.pptx
Module 6.pptx
 
How to not suck at an audit-2.pdf
How to not suck at an audit-2.pdfHow to not suck at an audit-2.pdf
How to not suck at an audit-2.pdf
 
Itis pentest slides hyd
Itis pentest slides  hydItis pentest slides  hyd
Itis pentest slides hyd
 
Purple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration TestingPurple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration Testing
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work together
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Increasing Value Of Security Assessment Services

  • 1. Of security testing and assessment
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Pain in the arse Loudmouth Hacker Punk Tells lies (professionally) Is called all sorts of bad words.. That I will likely say throughout this talk Cant code well Talks $hit Drinks a LOT Is an overall J3rk
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. LARES
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. OSINT SIGINT TSCM/ Bug Sweeping Exploit Development Tool Creation Attack Planning Offensive Consultation Adversarial Intelligence Competitive Intelligence Attack Modeling Business Chain Vuln Assessments Custom Physical Bypass Tool Design Reverse Engineering Other stuff I can’t write down…
  • 32.
  • 33. Traditional InfoSec • Typical services • Proposed value (Sales BS) • Set up for failure • WYSIWYG Enhancing Services Value • Doing services right • Mo’ value, less money • Eliminating failure • Custom Delivery New Skool InfoSec • Red Teaming (CAST:Converged Attack Surface Tesing) • Insider Threat Assessment • Adversarial Modeling • IDCa (interactive defense capability assessment) • BCVa(business chain vulnerability analysis)
  • 34. Doing the same thing and expecting different results.
  • 35.
  • 36.
  • 37.  A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.  http://en.wikipedia.org/wiki/Vulnerability_assessment
  • 38. Reasons to Conduct  Identify potential vulnerabilities  Provide scoring of risk & prioritization of remediation  Manage environment vulnerabilities over time to show security program improvement, defense capability increase and compliance with ongoing patch, system and vulnerability lifecycle How it’s usually done  Run a bunch of scanners  Generate a report  **Sometimes** Generate a custom report consisting of copy/paste data from the Vulnerability scanners and TRY to make sure you delete the word Nessus, qualys… and/or the previous clients name
  • 39.  Do not run “Dangerous or Experimental Checks” *instant 30%+ reduction in results and overall accuracy*  Do not perform Denial of Service  Do not run thorough checks  Do not run Web checks  Only run ONE brand of scanner  Limit only to known network checks  Only scan once
  • 40.
  • 41.  A penetration test is a method of evaluating the security of a computer system or network by simulating an attack from a malicious source... The process involves an active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures.  http://en.wikipedia.org/wiki/Penetration_test
  • 42.
  • 43. Reasons to Conduct  Identify if attackers can readily compromise the security of the business  Identify potential impact to the business  Confirm vulnerabilities identified  Gain a “Real World” View of an attackers ability to “hack” the environment and resolve issues identified How it’s usually done  Do all the steps in Vulnerability Assessment listed previously  Run metasploit/Core/Canvas against hosts  Try a few other automated tools  Call it “SECURE” If those don’t work
  • 44.  Do not allow the exploitation of systems  Restrict testing to non production systems  Restrict the hours of testing  Restrict the length of testing  Improperly scope / fail to include ALL addresses  Only perform externally  Patch/fix BEFORE the test  Only allow directed attacks ( no SE/ Phishing)  Lack of focus on BUSINESS risk and increased focus on technical issue
  • 45.
  • 46. The IT risk management is the application of risk management to Information technology context in order to manage IT risk. Information security risk assessment is the process used to identify and understand risks to the confidentiality, integrity, and availability of information and information systems. In its simplest form, a risk assessment consists of the identification and valuation of assets and an analysis of those assets in relation to potential threats and vulnerabilities, resulting in a ranking of risks to mitigate. The resulting information should be used to develop strategies to mitigate those risks. http://laresconsulting.com/risk.php
  • 47.
  • 48. Reasons to Conduct  Compliance with regulations  Overall health check of the InfoSec program  Gain understanding of program Effectiveness  Baseline discovery  To show 3rd parties and customers they are “Secure” How it’s usually done  Whip out a checklist  Check stuff off on checklist  Have a TON of interviews  Believe every word  Do a tick mark legend and ask people to provide “evidence” *which is usually faked*  Only assess controls that are in scope of THAT specific assessment *often information centric*
  • 49.  Do not allow ACTUAL/TECHNICAL testing and validation  Rely on all information provided as TRUE  Minimize scope to only include assets and controls that are part of the selected compliance regulation and NOT the ENTIRE BUSINESS  Allow for “Compensating Controls” to be an answer to most issues  Expect to become compliant through outsourcing  Expect to become compliant through product purchase/implementation  Be unprepared  LIE
  • 50. Stop cutting off your own fingers
  • 51.
  • 52.
  • 53.
  • 55.  Skip it!  Do It yourself  Use Scanners to identify Vulns  Figure out a process to track them over time  Manage the reduction of Vulns over time  Manage the MTTP ( Mean Time To Patch)  Do the rest and make your testers WORK hard.
  • 56. DON’T RUSH IT PLAN FOR INTERACTION ALWAYS “Ride Along” Connect to the REAL impact (shells don’t matter) GO FULL SCOPE Don’t use firms that have “SECRET” processes or can not explain every step of the test and HOW they do it Attack like AN ATTACKER not like a script kiddie Use a repeatable methodology
  • 57. IF THE TESTING TIME LOOKS LIKE THIS, GET A NEW TESTER Recon Scan Enumerate Exploit Post- Exploit Write Report
  • 58. 1 • Pre-Engagement 2 • Intelligence Gathering 3 • Threat Modelling 4 • Vulnerability Analysis 5 • Exploitation 6 • Post-Exploitation 7 • Reporting
  • 60. Common misconceptions We will get owned, what's the point It will offend our users Doesn’t provide enough value How it’s usually done Send a 419 scam style email Track clicks Write a report to show who clicked
  • 61. How it SHOULD be done to generate MAX value
  • 62.  MAKE IT BUSINESS FOCUSED NOT IT FOCUSED  Use multiple standards  Remove silo’s and scope restrictions  TEST, TEST, TEST (PBC docs ARE NOT SUFFICENT)  A sample set does not show the ability to secure. I crack in certain parts of the defense chain allow for the compromise of the ENTIRE COMPANY  ALWAYS interview each and every executive to understand THEIR concerns and build the solutions to address THEM and not always “just for the audit”  Discuss the VALUE of systems in relevance to the business and re-weight scores  NEVER allow a compensating control on a BUSINESS critical system. EVER
  • 63. THIS is what the BIG BOYS do, catch up.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68. The term originated within the military to describe a team whose purpose is to penetrate security of "friendly" installations, and thus test their security measures. The members are professionals who install evidence of their success, e.g. leave cardboard signs saying "bomb" in critical defense installations, hand-lettered notes saying that “your codebooks have been stolen" (they usually have not been) inside safes, etc. Sometimes, after a successful penetration, a high-ranking security person will show up later for a "security review," and "find" the evidence. Afterward, the term became popular in the computer industry, where the security of computer systems is often tested by tiger teams. How do you know you can put up a fight if you have never taken a punch?
  • 69. Electronic • Network Pentesting • Surveillance/ plants Social • In Person Social Engineering • Phone Conversation • Social Profiling Physical • Lockpicking • Direct Attack EP Convergance • Attacks on physical systems that are network enabled ES Convergance • Blackmail • Phishing • Profiling • Creating moles PS Convergance • Tailgaiting • Impersonation RED TEAM
  • 70. Reasons to Conduct  Real world test to see how you will hold up against a highly skilled, motivated and funded attacker  The only type of testing that will cover a fully converged attack surface  Impact assessment is IMMEDIATE and built to show a maximum damage event  This IS the FULL DR test of an InfoSec Program
  • 71.
  • 72. Reasons to Conduct  Exercises in evaluating WHO your top5 most likely attackers are  Full OSINT profiling on the Attackers and their capabilities  Scenarios which are highly focused at Detecting, Confirming, Mitigating and Resolving attacks that are the MOST likely to happen  Testers are forced to use the capabilities of the likely attackers and train the team how to be cool under fire  The most relevant attacks are dealt with FIRST, you are not defending against the pentester… you are prepping to the battle that WILL happen
  • 73.
  • 74. What is it?  Evaluate threat and risk from employee/staff/contractor/executive/etc..  Use company provisioned asset/standard access model (limited priv’s)  Identify what data/assets can be accessed through authorized channels  Identify elevation of privilege scenarios (exploit AND non-exploit methods)
  • 75. Why do it?  Provides visibility into “what could happen”  A user WILL be compromised at some point  Evaluate security posture of corporate asset  External testing doesn’t always provide accurate measurement of internal sourced threats  Identify insecure internal communication channels  Evaluate covert channel resistance/prevention  External assessments usually only measure (1) of these (if you’re lucky)  Measure defense capabilities internally (beyond perimeter)  System to system communication  Level of “noise” detection  Data leakage/exfil abilities  Log/data correlation  Incident response/forensics team’s level of knowledge/expertise
  • 76.
  • 77. Reasons to Conduct  Targeted at working BOTH sides of the test  Active analysis on defense capability and impreovements / feedback can be real time  Direct understanding of where process,policy and procedure break down in a REAL LIFE EVENT  Identification of Defensive Technology effectiveness
  • 78.
  • 79. Reasons to Conduct  Targeted at working on identifying BUSINESS vulns  How much can/do partners hurt you  Where can you better defend against Partners and 3rd parties  Who what where when and why…. Of how the business works and how it can be materially effected by relationships

Editor's Notes

  1. Sorry ya had to wake up early
  2. And sit there to pay atteention
  3. To my stupid ppt
  4. Got drunk last night
  5. Will try not to puke while I am on stage
  6. Ps.. I swear…deal with it
  7. Who we are
  8. Code review
  9. Incident response
  10. Risk Assessment
  11. Physical security
  12. PenTesting
  13. Red Teaming
  14. Mike Tyson : Prophet of Infosec “ Everyone has a plan until they get punched in the face”
  15. I think people may THINK they do ll this and not understand how in depth we go without showing them
  16. Converged attacking