SlideShare a Scribd company logo
80 Broad Street, 5th Floor
New York, NY 10004
www.2secure.biz
info@2secure.biz
Tel: 646-666-9601
Fax: 718-942-5355
Date: 10/19/2012
Case Study: PENETRATION TESTING AUDIT
Preface: Penetration testing AKA pen-testing is a process where a tester looks for exploitable vulnera-
bilities from within an IT infrastructure that may allow the tester to subvert, modify and extract infor-
mation.
The Case: A Hedge Fund client with more than $21 billion assets under management, was looking to
perform a pen test for their public facing Web Application. In almost every Web Application you will find
“password reset” function allowing users to reset their account password using secret questions. Our
tester could successfully bypass this mechanism by using SQL-Injection that allowed him to finish this
process successfully. To solve this, we suggested the following:
1. Used parameterized queries (also known as prepared statements) for all database access(es).
2. Doubled up any single quotation marks appearing within user input before incorporating that input
into a SQL query.
3. Used stored procedures for database access.
The client got a full detailed report of how to mitigate our findings with screenshots and client/server Re-
ponses.
In Conclusion: With our expertise, the client saved time & money and now has greater security, vis-
ibility and control over its Web Application.
About 2Secure Corp
2Secure is a Cyber Security firm that takes a PROACTIVE approach to solving network problems. We provide the
right tools to fix problems the first time around – in fact, we guarantee it!

More Related Content

Similar to Penetration-Testing

76 s201923
76 s20192376 s201923
76 s201923
IJRAT
 
How We Did It: The Case of the Credit Card Breach
How We Did It: The Case of the Credit Card BreachHow We Did It: The Case of the Credit Card Breach
How We Did It: The Case of the Credit Card Breach
Teradata
 
8. cyber51-case-studies
8. cyber51-case-studies8. cyber51-case-studies
8. cyber51-case-studies
Doree Garcia, CCNA, OSWP
 
Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...
LeMeniz Infotech
 
05 application security fundamentals - part 2 - security mechanisms - autho...
05   application security fundamentals - part 2 - security mechanisms - autho...05   application security fundamentals - part 2 - security mechanisms - autho...
05 application security fundamentals - part 2 - security mechanisms - autho...
appsec
 
Jan 2008 Allup
Jan 2008 AllupJan 2008 Allup
Jan 2008 Allup
llangit
 
Enabling cloud storage auditing with key exposure resistance 2
Enabling cloud storage auditing with key exposure resistance 2Enabling cloud storage auditing with key exposure resistance 2
Enabling cloud storage auditing with key exposure resistance 2
Ranjeet Bhalshankar
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversys
Krishnendu Paul
 
01_Enterprise_Applications_RIO.ppt
01_Enterprise_Applications_RIO.ppt01_Enterprise_Applications_RIO.ppt
01_Enterprise_Applications_RIO.ppt
Ponnieaswari M.S
 
SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7
Ben Abdallah Helmi
 
SCWCD : Secure web
SCWCD : Secure webSCWCD : Secure web
SCWCD : Secure web
Ben Abdallah Helmi
 
Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)
mikemcbryde
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
ecmee
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentials
Craig Mullins
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions www.ijeijournal.com
 
Butler
ButlerButler
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docx
lmelaine
 
ETL_DWH_ Resume
ETL_DWH_ ResumeETL_DWH_ Resume
ETL_DWH_ Resume
vidya ponukumatla
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd Iaetsd
 

Similar to Penetration-Testing (20)

76 s201923
76 s20192376 s201923
76 s201923
 
How We Did It: The Case of the Credit Card Breach
How We Did It: The Case of the Credit Card BreachHow We Did It: The Case of the Credit Card Breach
How We Did It: The Case of the Credit Card Breach
 
8. cyber51-case-studies
8. cyber51-case-studies8. cyber51-case-studies
8. cyber51-case-studies
 
Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...Trusted db a trusted hardware based database with privacy and data confidenti...
Trusted db a trusted hardware based database with privacy and data confidenti...
 
05 application security fundamentals - part 2 - security mechanisms - autho...
05   application security fundamentals - part 2 - security mechanisms - autho...05   application security fundamentals - part 2 - security mechanisms - autho...
05 application security fundamentals - part 2 - security mechanisms - autho...
 
Jan 2008 Allup
Jan 2008 AllupJan 2008 Allup
Jan 2008 Allup
 
Enabling cloud storage auditing with key exposure resistance 2
Enabling cloud storage auditing with key exposure resistance 2Enabling cloud storage auditing with key exposure resistance 2
Enabling cloud storage auditing with key exposure resistance 2
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversys
 
01_Enterprise_Applications_RIO.ppt
01_Enterprise_Applications_RIO.ppt01_Enterprise_Applications_RIO.ppt
01_Enterprise_Applications_RIO.ppt
 
SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7SCWCD : Secure web : CHAP : 7
SCWCD : Secure web : CHAP : 7
 
SCWCD : Secure web
SCWCD : Secure webSCWCD : Secure web
SCWCD : Secure web
 
Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentials
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Butler
ButlerButler
Butler
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Final Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docxFinal Project – Incident Response Exercise SAMPLE.docx
Final Project – Incident Response Exercise SAMPLE.docx
 
ETL_DWH_ Resume
ETL_DWH_ ResumeETL_DWH_ Resume
ETL_DWH_ Resume
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processing
 

More from Yigal Behar

Hedge Fund Alert - Vendors List
Hedge Fund Alert - Vendors ListHedge Fund Alert - Vendors List
Hedge Fund Alert - Vendors List
Yigal Behar
 
January 2017 Printed Newsletter
January 2017 Printed NewsletterJanuary 2017 Printed Newsletter
January 2017 Printed Newsletter
Yigal Behar
 
December 2016 Printed Newletter
December 2016 Printed NewletterDecember 2016 Printed Newletter
December 2016 Printed Newletter
Yigal Behar
 
cybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-mattcybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-matt
Yigal Behar
 
HFA103013
HFA103013HFA103013
HFA103013
Yigal Behar
 
fund-managers-on-the-hunt-1
fund-managers-on-the-hunt-1fund-managers-on-the-hunt-1
fund-managers-on-the-hunt-1
Yigal Behar
 
Network-Security-Audit
Network-Security-AuditNetwork-Security-Audit
Network-Security-Audit
Yigal Behar
 
Incident-Response-Policy
Incident-Response-PolicyIncident-Response-Policy
Incident-Response-Policy
Yigal Behar
 

More from Yigal Behar (8)

Hedge Fund Alert - Vendors List
Hedge Fund Alert - Vendors ListHedge Fund Alert - Vendors List
Hedge Fund Alert - Vendors List
 
January 2017 Printed Newsletter
January 2017 Printed NewsletterJanuary 2017 Printed Newsletter
January 2017 Printed Newsletter
 
December 2016 Printed Newletter
December 2016 Printed NewletterDecember 2016 Printed Newletter
December 2016 Printed Newletter
 
cybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-mattcybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-matt
 
HFA103013
HFA103013HFA103013
HFA103013
 
fund-managers-on-the-hunt-1
fund-managers-on-the-hunt-1fund-managers-on-the-hunt-1
fund-managers-on-the-hunt-1
 
Network-Security-Audit
Network-Security-AuditNetwork-Security-Audit
Network-Security-Audit
 
Incident-Response-Policy
Incident-Response-PolicyIncident-Response-Policy
Incident-Response-Policy
 

Penetration-Testing

  • 1. 80 Broad Street, 5th Floor New York, NY 10004 www.2secure.biz info@2secure.biz Tel: 646-666-9601 Fax: 718-942-5355 Date: 10/19/2012 Case Study: PENETRATION TESTING AUDIT Preface: Penetration testing AKA pen-testing is a process where a tester looks for exploitable vulnera- bilities from within an IT infrastructure that may allow the tester to subvert, modify and extract infor- mation. The Case: A Hedge Fund client with more than $21 billion assets under management, was looking to perform a pen test for their public facing Web Application. In almost every Web Application you will find “password reset” function allowing users to reset their account password using secret questions. Our tester could successfully bypass this mechanism by using SQL-Injection that allowed him to finish this process successfully. To solve this, we suggested the following: 1. Used parameterized queries (also known as prepared statements) for all database access(es). 2. Doubled up any single quotation marks appearing within user input before incorporating that input into a SQL query. 3. Used stored procedures for database access. The client got a full detailed report of how to mitigate our findings with screenshots and client/server Re- ponses. In Conclusion: With our expertise, the client saved time & money and now has greater security, vis- ibility and control over its Web Application. About 2Secure Corp 2Secure is a Cyber Security firm that takes a PROACTIVE approach to solving network problems. We provide the right tools to fix problems the first time around – in fact, we guarantee it!