Penetration Test

Penetration Test

Penetration test A penetration test, or the short form pentest, is an at- from a combination of lower-risk vulnerabilities ex- tack on a computer system with the intention of finding ploited in a particular sequence security weaknesses, potentially gaining access to it, its functionality and data[1] [2] 3. Identifying vulnerabilities that may be difficult or impossible to detect with automated network or ap- The process involves identifying the target systems and plication vulnerability scanning software the goal, then reviewing the information available and undertaking available means to attain the goal. A pen- 4. Assessing the magnitude of potential business and etration test target may be a white box (where all back- operational impacts of successful attacks ground and system information is provided) or black box (where only basic or no information is provided except 5. Testing the ability of network defenders to success- the company name). A penetration test can help deter- fully detect and respond to the attacks mine whether a system is vulnerable to attack, if the de- fenses were sufficient and which defenses (if any) were 6. Providing evidence to support increased investments defeated in the penetration test.[3] in security personnel and technology A penetration can be likened to surveying a rabbit proof Penetration tests are a component of a full security audit. fence, which must be whole to keep the rabbits out. In For example, the Payment Card Industry Data Security surveying the fence the penetration tester may identify a Standard (PCI DSS), and security and auditing standard, single hole large enough for a rabbit (or themselves) to requires both quarterly and ongoing penetration testing move through, once the defense is passed, any further (after system changes).[4] review of that defense may not occur as the penetration tester moves on to the next security control. This means there may be several holes or vulnerabilities in the first line of defense and the penetration tester only identified 1 History the first one found as it was a successful exploit. This is where the difference lies between a vulnerability assess- By the mid 1960s, the growing popularity of online time- ment and penetration test - the vulnerability assessment is sharing computer systems, which had made their re- everything that you may be susceptible to, the penetration sources accessible to users over communications lines, test is based on if your defense can be defeated. had created new concerns about system security. As the Security issues uncovered through the penetration test are scholars Deborah Russell and G. T. Gangemi, Sr. ex- presented to the system’s owner. Effective penetration plain, “the 1960s marked the true beginning of the age [5] tests will couple this information with an accurate assess- of computer security.” In June 1965, for example, sev- ment of the potential impacts to the organization and out- eral of the country’s leading computer security experts line a range of technical and procedural countermeasures held one of the first major conferences on system se- to reduce risks. curity, one that was hosted by the government contrac- tor, the System Development Corporation (SDC). During Penetration tests are valuable for several reasons: the conference, it was noted that one SDC employee had been able to easily undermine the various system safe- 1. Determining the feasibility of a particular set of at- guards that had been added to SDC’s AN/FSQ-32 time- tack vectors sharing computer system. In the hopes that the further study of system security could be useful, the attendees re- 2. Identifying higher-risk vulnerabilities that result quested “studies to be conducted in such areas as breaking 1 2 1 HISTORY security protection in the time-shared system.” In other rity. Deborah Russell and G. T. Gangemi, Sr. stated that words, the conference participants initiated one of the during the 1970s extquotedbl'tiger teams’ first emerged first formal requests to use computer penetration as tool on the computer scene. Tiger teams were government for studying system security.[6] and industry sponsored teams of crackers who attempted to break down the defenses of computer systems in an ef- At the Spring 1967 Joint Computer Conference, many [9] of the country’s leading computer specialists met again fort to uncover, and eventually patch, security holes.” to discuss their concerns about system security. Dur- One of the leading scholars on the history of computer ing this conference, the computer security experts Willis security, Donald MacKenzie, similarly points out that Ware, Harold Petersen, and Rein Tern, all of the RAND “RAND had done some penetration studies (experiments in circumventing computer security controls) of early Corporation, and Bernard Peters of the National Secu- [10] rity Agency (NSA), all used the phrase “penetration” time-sharing systems on behalf of the government.” to describe an attack against a computer system. In a Jeffrey R. Yost of the Charles Babbage Institute, in his paper, Ware referred to the military’s remotely acces- own work on the history of computer security, also ac- sible time-sharing systems, warning that “deliberate at- knowledges that both the RAND Corporation and the tempts to penetrate such computer systems must be an- SDC had “engaged in some of the first so-called 'penetra- tion studies’ to try to infiltrate time-sharing systems in or- ticipated.” His colleagues Petersen and Turn shared the [11] same concerns, observing that on-line communication der to test their vulnerability.” In virtually all of these systems “are vulnerable to threats to privacy,” includ- early studies, the tiger teams would succeed in break- ing into their targeted computer systems, as the country’s ing “deliberate penetration”. Bernard Peters of the NSA made the same point, insisting that computer input and time-sharing systems had very poor defenses. output “could provide large amounts of information to a Of the earliest tiger team actions, the efforts at the RAND penetrating program.” During the conference, computer Corporation demonstrated the usefulness of penetration penetration would become formally identified as a major as a tool for assessing system security. At the time, one threat to online computer systems.[7] RAND analyst noted that the tests had “demonstrated the The threat posed by computer penetration was next out- practicality of system-penetration as a tool for evaluating lined in a major report organized by the United States the effectiveness and adequacy of implemented data se- Department of Defense (DoD) in late 1967. Essentially, curity safe-guards.” In addition, a number of the RAND DoD officials turned to Willis Ware to lead a task force analysts insisted that the penetration test exercises all of- of experts from NSA, CIA, DoD, academia, and indus- fered several benefits that justified its continued use. As try to formally assess the security of time-sharing com- they noted in one paper, “a penetrator seems to develop puter systems. By relying on many of the papers that had a diabolical frame of mind in his search for operating been presented during the Spring 1967 Joint Computer system weaknesses and incompleteness, which is difficult Conference, the task force largely confirmed the threat to emulate.” For these reasons and others, many analysts to system security posed by computer penetration. Al- at RAND recommended the continued study of penetra- tion techniques for their usefulness in assessing system though Ware’s report was initially classified, many of the [12] country’s leading computer experts quickly identified the security. study as the definitive document on computer security.[7] Perhaps the leading computer penetration expert during Jeffrey R. Yost of the Charles Babbage Institute has more these formative years was James P. Anderson, who had recently described the Ware report as “by far the most worked with the NSA, RAND, and other government important and thorough study on technical and opera- agencies to study system security. In early 1971, the U.S. tional issues regarding secure computing systems of its Air Force contracted with Anderson’s private company to time period.”[8] In effect, the Ware report reaffirmed the study the security of its time-sharing system at the Pen- major threat posed by computer penetration to the new tagon. In his study, Anderson outlined a number of the online time-sharing computer systems. major factors that were involved in computer penetration. To get a better understanding of system weaknesses, the The general attack sequence, as Anderson described it, federal government and its contractors soon began orga- involved a number of steps, including: “1. Find an ex- nizing teams of penetrators, known as tiger teams, to use ploitable vulnerability. 2. Design an attack around it. 3. computer penetration as a means for testing system secu- Test the attack. 4. Seize a line in use... 5. Enter the attack. 6. Exploit the entry for information recovery.’’ 3.2 Software frameworks 3 Over time, Anderson’s description of the general steps configured set of tools. This is useful because the pene- involved in computer penetration would help guide many tration tester does not have to hunt down a tool when it is other security experts, as they continued to rely on this required. This may in turn lead to further complications technique to assess the security of time-sharing computer such as compile errors, dependencies issues, configura- systems.[12] tion errors, or simply acquiring additional tools may not In the following years, the use of computer penetra- be practical in the tester’s context. tion as a tool for security assessment would only be- Popular examples are Kali Linux (replacing BackTrack come more refined and sophisticated. In the early 1980s, as of December 2012) based on Debian Linux, Pentoo the journalist William Broad briefly summarized the on- based on Gentoo Linux and WHAX based on Slackware going efforts of tiger teams to assess system security.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us