Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm

Feb. 17, 2014
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm
1 of 47

More Related Content

What's hot

A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsBeau Bullock
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...Andrew Morris
Cryto Party at CCUCryto Party at CCU
Cryto Party at CCUJose L. Quiñones-Borrero
Incident response, Hacker Techniques and CountermeasuresIncident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and CountermeasuresJose L. Quiñones-Borrero
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg dayCSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg dayCanSecWest
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...Andrew Morris

What's hot(20)

Similar to Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm

Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical HackingS.E. CTS CERT-GOV-MD
CNIT 121: 2 IR Management HandbookCNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookSam Bowne
WTF is Penetration TestingWTF is Penetration Testing
WTF is Penetration TestingNetSPI
Cyber security series   vulnerability assessmentsCyber security series   vulnerability assessments
Cyber security series vulnerability assessmentsJim Kaplan CIA CFE
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...TruShield Security Solutions
Vapt life cycleVapt life cycle
Vapt life cyclepenetration Tester

Similar to Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm(20)

Recently uploaded

XELA PitchXELA Pitch
XELA PitchAlexanderSchmitz17
Commercial Growth Strategies for Startups (Sep 20th, 2023) by RevXCommercial Growth Strategies for Startups (Sep 20th, 2023) by RevX
Commercial Growth Strategies for Startups (Sep 20th, 2023) by RevXDino Jugo
Crypto Quantum Leap Crypto Quantum Leap
Crypto Quantum Leap Hifra
Lasonczyk_Kyle_SCBS_PB1_2023-September.pptxLasonczyk_Kyle_SCBS_PB1_2023-September.pptx
Lasonczyk_Kyle_SCBS_PB1_2023-September.pptxKyleLasonczyk
Mirakl Connect Seller MasterclassMirakl Connect Seller Masterclass
Mirakl Connect Seller MasterclassMirakl
NewBase  21 September 2023  Energy News issue - 1658 by Khaled Al Awadi_compr...NewBase  21 September 2023  Energy News issue - 1658 by Khaled Al Awadi_compr...
NewBase 21 September 2023 Energy News issue - 1658 by Khaled Al Awadi_compr...Khaled Al Awadi

Assessing a pen tester: Making the right choice when choosing a third party Pen Test Firm

Editor's Notes

  1. Penetration testing is something virtually everyone in the security industry deals with in some wayPen Testing is something that is often misunderstood by both customers and vendors goal is to provide you with clarity on the differences between companies that will help you differentiate solid pen testers from less effective companiesElaborate upon differences within the industry Answer the questions in regard and assist you when choosing the third party firm that will best align with your organizational goals
  2. According to National Institute of Standards and TechnologyEssentially, it is a proactive approach to evaluate technical controls in place
  3. We will delve into these in a bit, however from a high level main components of Penetration include:Established Methodology- this is the process of the pentest. There are several methods that can be used including NIST, PTES, OSSTMM, ISSAFAttack Vectors- what approach is going to be taken, what is going to be ‘attacked’Scope- what is in scope for the test? PCI data, PHI? Trophies established- what are the hackers trying to obtain; what has the biggest impact on businessManual methods are employed in addition to tools Penetration testing should be a team based effort, no one individual is smarter than the collective.
  4. Vulnerability Assessment identifies potential vulnerabilitiesPenetration Test identifies vulnerabilities andactively attempts to exploit vulnerabilitiesThese two are confused a lot. It’s not uncommon for a vendor to provide something they describe as a Penetration Test, which is in fact a Vulnerability AssessmentAmanual review of security controls is simply that, a review of what is in place.
  5. There are several reason for performing a pentestCompliance Advised that it would be a good ideaHeard that several other companies were doing this or read it in a magazineCuriosity- see PowerPointShock and Awe mentality- need budget
  6. There are definitely reasons not to perform a pentestIf your entire budget is consumed by performing a pentest, you have do resources left to fix the problemsYou do not have sufficient resources to fix the problems- since budget was already addressed this would focus on knowledge and time- although is lack of resources really a reason if you are breached? If you don’t have clear goals in mind- including trophies and scope
  7. Incident Response- couple the pentest with in IR test to see if the plan is effective and if employees know what to doSecurity Awareness- Are your employees aware? Are the apathetic? Skeptical?Alarms, guards, detection- Do you have the proper controls in place in the right areas? Does it work? This includes fencing, guards, cameras, access controls etc.
  8. Overall pentesting is an Industry Best Practice and generally a good idea but the idea and process can raise more questions than provide answerswhat does it all mean to you? How do you apply this to your organization? What does it all mean? Where do I start?
  9. Firstly, you need to understand how pentesting fits into your overall security. Do you even need a pentest? Do you have the resources to address potential issues? If you need a pentest, Why? What type of pentest do I need? If I were to engage a company to perform a pentest, what are my goals? Objectives- What type of data do I have? What would I want to ensure is protected?
  10. Why does your organization need a pentest? Do you have Sensitive Data?Compliance?Do you need to show operationally focused executives who do not understand security or see security as a hindrance that you have vulnerabilities and need money to address them?
  11. Within the realm of pentests you need to determine what type of Penetration Test is most suitable for your organization.
  12. External Network pentests simulate an attacker coming into your network from the outside. There are a variety of techniques used in this type of attack. This is the most common type and is typically performed remotelyThis is a combination of passive and active attacks used to exploit weaknesses that potentially exist in your network. Some of this information can also be used to perform a Social Engineering attack
  13. Social Engineering attacks focus on the natural human characteristic of helpfulnessTests employee awareness- can take many forms and customized to your environmentphishing- mass email to gain user credentialsSpearphishing- targeted email (usually at high level executives or key personnel) Personal componentShoulder surfing- looking over another's shoulder to gain information- think nosy neighborVERY high success rate!!!
  14. Internal Penetration test is meant to simulate an internal rogue threat. Disgruntled or malicious employee or contractorInstallation of a rogue access pointTypically done on site
  15. Do you have wireless networks?Are they segmented?Do you have sensitive information traversing your wireless network?Can someone connect to your network in a car down the street?
  16. Do you have a web application? These tests assess the security of those applications and test their securityThis is a huge attack vector with a large area for concern.
  17. You have taken the necessary steps to logically protect your data, but what about physical access? Have you taken measures to ensure that individuals cannot gain physical access?
  18. You now understand that you need to do a pentest, why you need to do a pentest, now you need to determine what the scope of the assessment will be. The next few slides will cover what things that should be considered before you jump out and hire a someone to perform a pentest. Are there other areas that you need to consider testing? Security Awareness or Incident Response?
  19. Do you need to meet regulatory requirements?You are spending good money on a pentest, don’t lose value by limiting scope to test systems or systems that you have recently scrambled to harden just to make sure that a pentester won’t break in. Doing so will diminish the value of the assessmentAlso not determining trophies or defining a goal will cause you to lose value.
  20. Do you have operational constraints?Let your pentesting Company know up front and why you need to do so.Are you a hospital where activity is high during the day where availability and integrity are paramount? Do it off hoursAre you also in need or wish to test your IR program? Doing this can meet several business and security objectives.Limit testing of systems to those that have a business need. An internal office memo telling everyone that you are doing a pentest isn’t the best idea if this is the case, but also for security reasons. In the real world an attacker won’t let you know that they are intending to attack.
  21. At this point, you have all your ducks in a row, it’s time to look for a someone to perform the pentest
  22. When looking for a third party there are several things to consider. We will cover these items over these items as well as warning signs, and other a few last things to consider.
  23. Typical pentest process follows the basic categories.
  24. There are several warning signs that should raise red flags and set off the sirens. They include: see slides.
  25. Are you sure that your entire environment has been included? What about your wireless network that moves PHI? Have you included test systems? Making changes while a test is being performed is not recommended. That “quick fix” over here could unintentionally impact a system that was already tested over there.There is a fine art to pentesting and it is understandable that everyone has to start somewhere, but they should have the necessary resources available to ensure that areas have not been overlooked. There are distinct differences between a pentest and a Vulnerability Scan. In the next few slides we will highlight some of those differences.
  26. PCI is focusing on Penetration testing and results to include methodology and approach as well as validation around segmentation and scope reduction controls. See slides.