SlideShare a Scribd company logo
1 of 24
Download to read offline
1
Penetration Testing in the
Cloud
Dan Lambright
LISA14
2
Agenda
●
Explore penetration testing on..
●
Public cloud
●
Private cloud (owner)
●
Private cloud (tenant)
3
Penetration Testing
● “Wargames”
● Mimic real attacks
● Test IDS/firewall detection
● Test security
● How
● Typically simulate attacks in a “safe” environment
● Or, attack actual machines
● Use special software, e.g. Nessus, metasploit, nmap..
4
Representative attacks
spoofing Man in the middle
Denial of service Port scans
5
Challenges on Cloud
● CSP have good security
● But, guests are your responsibility to protect
● Virtual
● No HW security appliances
● No low level access (grub)
● IP addresses may be ephermal
● Some pen tests could be expensive
● Penetration tests cannot affect others
6
Private Cloud Security
● Can't attack from cloud with spoofed source address
● Infrastructure resilient to DDOS (LOTS of bandwidth)
● Cannot sniff other tenant's traffic
● You could be attacked by any of..
● Spoofing, portscan, MITM, DOS
7
Screenshot of break-in attempts AWS
●
8
Policies For Penetration Tests
● Most CSP will grant permission for a window of time
● No DOS tests
● No tests on instances that share physical network
● on AWS cannot use m1.small or t1.micro
● Some CSP have slow responses to requests
9
Commercial Tools
● CloudInspect
● On-demand pen tests
● DDOS sinks – Prolexic
● AlertLogic
● 24/7 response
PRIVATE CLOUD
ADMINISTRATOR
11
Per instance vulnerability tests
● Do not wish to affect other instances
● Want to observe an instance's traffic
● Run an IDS against a particular instance
12
Openstack plumbing
13
Bridges
Bonding? No, do not want to
Modify
Can tap the interface with snort
(run multiple snorts on host?)
Could rate limit interfaces on bridges
Openstack allows rate limits or absolute
limits on accounts
Tc – traffic shaper
TENANT
15
Private Cloud Tenant
● Suppose wish to avoid network traffic
● How about attack from a container?
● IP address, MTU
● NAT for external connections
● “Ceiling” on container resources
● No “floor” / minimal guaranteed resources
● Skips external firewall !
16
Set up
● Kali – popular penetration
● testing distro
● Debian on red hat –
● 10.x.x.x subnet
● Import files (eg pcap)
docker bridge
V
kali
container
instance
V
V
qbr..
sudo docker
run --privileged pandrew/kali /bin/bash
17
Port Scans
● nmap
● Network discovery tool
● Create “map” of network
Examples
nmap –sX (Xmas scan)
nmap –sN (Null scan)
nmap –sA (ACK scan)
18
Spoofing
● hping3
●
Examples
nmap –sX (Xmas scan)
nmap –sN (Null scan)
nmap –sA (ACK scan)
19
Man in the Middle
● Ettercap
● Two machines, each with IP address
● Poison ARP table
● Simulate victim and middleman
Examples
apt-get install ettercap-text-only
ettercap -T -M ARP -j /tmp/hosts.txt -F html.ef /172.17.0.26/ //
20
Denial of Service
● Hping3 from docker container
● Cannot stress system
SYN attack to port 22
hping3 -c 10000 -d 120 -S -w 64 -p 22 --flood --rand-source -i eth0 172.17.42.1
lage UDP packets
●hping3 --rand-source --udp --flood -d 8192 172.17.42.1
Smurf
sudo sysctl -w net.ipv4.icmp_echo_ignore_broadcasts=0
●hping3 -1 --flood -a 172.17.0.23 172.17.255.255
●Max bandwidth test...
●DDOS
21
Other
● Metasploit
● Curl command (ex. shellshocked)
● Lynx (html), but not limited to CLI..
22
Summary
● Cloud penetration testing is possible
● Coordinate with CSP
●
RED HAT CONFIDENTIAL – DO NOT DISTRIBUTE
Thank You!
● dlambright@redhat.com
● henry_lambright@uml.edu
24
Still Need Penetration Tests
● Port scans are not (necessarily) blocked

More Related Content

What's hot

CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu securityCSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CanSecWest
 

What's hot (19)

Pentesting custom TLS stacks
Pentesting custom TLS stacksPentesting custom TLS stacks
Pentesting custom TLS stacks
 
Mitigating DNS Amplification Attacks At The DNS Server Using BGP AS Paths and...
Mitigating DNS Amplification Attacks At The DNS Server Using BGP AS Paths and...Mitigating DNS Amplification Attacks At The DNS Server Using BGP AS Paths and...
Mitigating DNS Amplification Attacks At The DNS Server Using BGP AS Paths and...
 
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit FrameworkUnmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
 
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
 
Enumeration
EnumerationEnumeration
Enumeration
 
Nmap
NmapNmap
Nmap
 
Security Onion Advance
Security Onion AdvanceSecurity Onion Advance
Security Onion Advance
 
Solidity intro
Solidity introSolidity intro
Solidity intro
 
Velocity 2011 - Our first DDoS attack
Velocity 2011 - Our first DDoS attackVelocity 2011 - Our first DDoS attack
Velocity 2011 - Our first DDoS attack
 
Penetration Testing Resource Guide
Penetration Testing Resource Guide Penetration Testing Resource Guide
Penetration Testing Resource Guide
 
Beginner's Guide to the nmap Scripting Engine - Redspin Engineer, David Shaw
Beginner's Guide to the nmap Scripting Engine - Redspin Engineer, David ShawBeginner's Guide to the nmap Scripting Engine - Redspin Engineer, David Shaw
Beginner's Guide to the nmap Scripting Engine - Redspin Engineer, David Shaw
 
Non-DIY* Logging
Non-DIY* LoggingNon-DIY* Logging
Non-DIY* Logging
 
Node in Real Time - The Beginning
Node in Real Time - The BeginningNode in Real Time - The Beginning
Node in Real Time - The Beginning
 
Port scanning
Port scanningPort scanning
Port scanning
 
Nous Sommes Cyber - HTB Blue
Nous Sommes Cyber - HTB BlueNous Sommes Cyber - HTB Blue
Nous Sommes Cyber - HTB Blue
 
We shall play a game....
We shall play a game....We shall play a game....
We shall play a game....
 
Nmap scripting engine
Nmap scripting engineNmap scripting engine
Nmap scripting engine
 
BSides Ottawa 2019 - HTB Blue
BSides Ottawa 2019 - HTB BlueBSides Ottawa 2019 - HTB Blue
BSides Ottawa 2019 - HTB Blue
 
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu securityCSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
 

Viewers also liked

Cloud_Security_Final
Cloud_Security_FinalCloud_Security_Final
Cloud_Security_Final
Bhavin Shah
 
[Mobile Day HCM] Lessons Learn from Top Mobile App in Vietnam
[Mobile Day HCM] Lessons Learn from Top Mobile App in Vietnam[Mobile Day HCM] Lessons Learn from Top Mobile App in Vietnam
[Mobile Day HCM] Lessons Learn from Top Mobile App in Vietnam
Appota Group
 

Viewers also liked (18)

Cloud_Security_Final
Cloud_Security_FinalCloud_Security_Final
Cloud_Security_Final
 
Open Source Private Cloud Management with OpenStack and Security Evaluation w...
Open Source Private Cloud Management with OpenStack and Security Evaluation w...Open Source Private Cloud Management with OpenStack and Security Evaluation w...
Open Source Private Cloud Management with OpenStack and Security Evaluation w...
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
8023 r
8023 r8023 r
8023 r
 
Александр Гладыш — Lua
Александр Гладыш — LuaАлександр Гладыш — Lua
Александр Гладыш — Lua
 
Netcat - 101 Swiss Army Knife
Netcat - 101 Swiss Army KnifeNetcat - 101 Swiss Army Knife
Netcat - 101 Swiss Army Knife
 
CV
CVCV
CV
 
Regulamento açoriano
Regulamento açorianoRegulamento açoriano
Regulamento açoriano
 
VDC - Best Practices der Kooperation im Netzwerk
VDC - Best Practices der Kooperation im NetzwerkVDC - Best Practices der Kooperation im Netzwerk
VDC - Best Practices der Kooperation im Netzwerk
 
Aboyagirl
AboyagirlAboyagirl
Aboyagirl
 
Free Alphabet Poster - 8 pages
Free Alphabet Poster - 8 pagesFree Alphabet Poster - 8 pages
Free Alphabet Poster - 8 pages
 
Introductie Web 2.0 (FARO)
Introductie Web 2.0 (FARO)Introductie Web 2.0 (FARO)
Introductie Web 2.0 (FARO)
 
[Mobile Day HCM] Lessons Learn from Top Mobile App in Vietnam
[Mobile Day HCM] Lessons Learn from Top Mobile App in Vietnam[Mobile Day HCM] Lessons Learn from Top Mobile App in Vietnam
[Mobile Day HCM] Lessons Learn from Top Mobile App in Vietnam
 
A Mayoral Manifesto for the Digital Economy
A Mayoral Manifesto for the Digital EconomyA Mayoral Manifesto for the Digital Economy
A Mayoral Manifesto for the Digital Economy
 
Using Change Management to Transform Your Library Workshop
Using Change Management to Transform Your Library WorkshopUsing Change Management to Transform Your Library Workshop
Using Change Management to Transform Your Library Workshop
 
EASA Eerste Uitbreiding 2012
EASA Eerste Uitbreiding 2012EASA Eerste Uitbreiding 2012
EASA Eerste Uitbreiding 2012
 
Zolotoy aktiv1
Zolotoy aktiv1Zolotoy aktiv1
Zolotoy aktiv1
 
Automating things using selenium
Automating things using seleniumAutomating things using selenium
Automating things using selenium
 

Similar to Lisa14

Black hat dc-2010-egypt-uav-slides
Black hat dc-2010-egypt-uav-slidesBlack hat dc-2010-egypt-uav-slides
Black hat dc-2010-egypt-uav-slides
Bakry3
 
Lightweight Virtualization with Linux Containers and Docker I YaC 2013
Lightweight Virtualization with Linux Containers and Docker I YaC 2013Lightweight Virtualization with Linux Containers and Docker I YaC 2013
Lightweight Virtualization with Linux Containers and Docker I YaC 2013
Docker, Inc.
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
tehkotak4
 
Security & ethical hacking
Security & ethical hackingSecurity & ethical hacking
Security & ethical hacking
Amanpreet Singh
 

Similar to Lisa14 (20)

Comprehensive guide for compromising network devices.
Comprehensive guide for compromising network devices.Comprehensive guide for compromising network devices.
Comprehensive guide for compromising network devices.
 
Ple18 web-security-david-busby
Ple18 web-security-david-busbyPle18 web-security-david-busby
Ple18 web-security-david-busby
 
Black hat dc-2010-egypt-uav-slides
Black hat dc-2010-egypt-uav-slidesBlack hat dc-2010-egypt-uav-slides
Black hat dc-2010-egypt-uav-slides
 
Lightweight Virtualization with Linux Containers and Docker | YaC 2013
Lightweight Virtualization with Linux Containers and Docker | YaC 2013Lightweight Virtualization with Linux Containers and Docker | YaC 2013
Lightweight Virtualization with Linux Containers and Docker | YaC 2013
 
Lightweight Virtualization with Linux Containers and Docker I YaC 2013
Lightweight Virtualization with Linux Containers and Docker I YaC 2013Lightweight Virtualization with Linux Containers and Docker I YaC 2013
Lightweight Virtualization with Linux Containers and Docker I YaC 2013
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
 
CurveZMQ, ZMTP and other Dubious Characters
CurveZMQ, ZMTP and other Dubious CharactersCurveZMQ, ZMTP and other Dubious Characters
CurveZMQ, ZMTP and other Dubious Characters
 
"Lightweight Virtualization with Linux Containers and Docker". Jerome Petazzo...
"Lightweight Virtualization with Linux Containers and Docker". Jerome Petazzo..."Lightweight Virtualization with Linux Containers and Docker". Jerome Petazzo...
"Lightweight Virtualization with Linux Containers and Docker". Jerome Petazzo...
 
RAT - Repurposing Adversarial Tradecraft
RAT - Repurposing Adversarial TradecraftRAT - Repurposing Adversarial Tradecraft
RAT - Repurposing Adversarial Tradecraft
 
25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud
 
DOST: Ceph in a security critical OpenStack cloud
DOST: Ceph in a security critical OpenStack cloudDOST: Ceph in a security critical OpenStack cloud
DOST: Ceph in a security critical OpenStack cloud
 
Hacktivity2014: Virtual Machine Introspection to Detect and Protect
Hacktivity2014: Virtual Machine Introspection to Detect and ProtectHacktivity2014: Virtual Machine Introspection to Detect and Protect
Hacktivity2014: Virtual Machine Introspection to Detect and Protect
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
 
Proof of x
Proof of xProof of x
Proof of x
 
IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?IPv6 Security - Where is the Challenge?
IPv6 Security - Where is the Challenge?
 
0507 057 01 98 * Adana Klima Servisleri
0507 057 01 98 * Adana Klima Servisleri0507 057 01 98 * Adana Klima Servisleri
0507 057 01 98 * Adana Klima Servisleri
 
Shall we play a game
Shall we play a gameShall we play a game
Shall we play a game
 
Shall we play a game?
Shall we play a game?Shall we play a game?
Shall we play a game?
 
Security & ethical hacking
Security & ethical hackingSecurity & ethical hacking
Security & ethical hacking
 

Recently uploaded

%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 

Recently uploaded (20)

%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
WSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - Kanchana
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 

Lisa14

  • 1. 1 Penetration Testing in the Cloud Dan Lambright LISA14
  • 2. 2 Agenda ● Explore penetration testing on.. ● Public cloud ● Private cloud (owner) ● Private cloud (tenant)
  • 3. 3 Penetration Testing ● “Wargames” ● Mimic real attacks ● Test IDS/firewall detection ● Test security ● How ● Typically simulate attacks in a “safe” environment ● Or, attack actual machines ● Use special software, e.g. Nessus, metasploit, nmap..
  • 4. 4 Representative attacks spoofing Man in the middle Denial of service Port scans
  • 5. 5 Challenges on Cloud ● CSP have good security ● But, guests are your responsibility to protect ● Virtual ● No HW security appliances ● No low level access (grub) ● IP addresses may be ephermal ● Some pen tests could be expensive ● Penetration tests cannot affect others
  • 6. 6 Private Cloud Security ● Can't attack from cloud with spoofed source address ● Infrastructure resilient to DDOS (LOTS of bandwidth) ● Cannot sniff other tenant's traffic ● You could be attacked by any of.. ● Spoofing, portscan, MITM, DOS
  • 7. 7 Screenshot of break-in attempts AWS ●
  • 8. 8 Policies For Penetration Tests ● Most CSP will grant permission for a window of time ● No DOS tests ● No tests on instances that share physical network ● on AWS cannot use m1.small or t1.micro ● Some CSP have slow responses to requests
  • 9. 9 Commercial Tools ● CloudInspect ● On-demand pen tests ● DDOS sinks – Prolexic ● AlertLogic ● 24/7 response
  • 11. 11 Per instance vulnerability tests ● Do not wish to affect other instances ● Want to observe an instance's traffic ● Run an IDS against a particular instance
  • 13. 13 Bridges Bonding? No, do not want to Modify Can tap the interface with snort (run multiple snorts on host?) Could rate limit interfaces on bridges Openstack allows rate limits or absolute limits on accounts Tc – traffic shaper
  • 15. 15 Private Cloud Tenant ● Suppose wish to avoid network traffic ● How about attack from a container? ● IP address, MTU ● NAT for external connections ● “Ceiling” on container resources ● No “floor” / minimal guaranteed resources ● Skips external firewall !
  • 16. 16 Set up ● Kali – popular penetration ● testing distro ● Debian on red hat – ● 10.x.x.x subnet ● Import files (eg pcap) docker bridge V kali container instance V V qbr.. sudo docker run --privileged pandrew/kali /bin/bash
  • 17. 17 Port Scans ● nmap ● Network discovery tool ● Create “map” of network Examples nmap –sX (Xmas scan) nmap –sN (Null scan) nmap –sA (ACK scan)
  • 18. 18 Spoofing ● hping3 ● Examples nmap –sX (Xmas scan) nmap –sN (Null scan) nmap –sA (ACK scan)
  • 19. 19 Man in the Middle ● Ettercap ● Two machines, each with IP address ● Poison ARP table ● Simulate victim and middleman Examples apt-get install ettercap-text-only ettercap -T -M ARP -j /tmp/hosts.txt -F html.ef /172.17.0.26/ //
  • 20. 20 Denial of Service ● Hping3 from docker container ● Cannot stress system SYN attack to port 22 hping3 -c 10000 -d 120 -S -w 64 -p 22 --flood --rand-source -i eth0 172.17.42.1 lage UDP packets ●hping3 --rand-source --udp --flood -d 8192 172.17.42.1 Smurf sudo sysctl -w net.ipv4.icmp_echo_ignore_broadcasts=0 ●hping3 -1 --flood -a 172.17.0.23 172.17.255.255 ●Max bandwidth test... ●DDOS
  • 21. 21 Other ● Metasploit ● Curl command (ex. shellshocked) ● Lynx (html), but not limited to CLI..
  • 22. 22 Summary ● Cloud penetration testing is possible ● Coordinate with CSP ●
  • 23. RED HAT CONFIDENTIAL – DO NOT DISTRIBUTE Thank You! ● dlambright@redhat.com ● henry_lambright@uml.edu
  • 24. 24 Still Need Penetration Tests ● Port scans are not (necessarily) blocked