22
Internal Penetration Testing

Internal Penetration Testing

Embed Size (px)

DESCRIPTION

Internal pentest

Citation preview

Page 1: Internal Penetration Testing

Internal Penetration Testing

Page 2: Internal Penetration Testing

Internal Penetration TestingDefining scope and goalsTools of the TestPresentation of findings

Page 3: Internal Penetration Testing

Defining Scope and GoalsDefine specific goals for

assessmentWhat defines success?Identify vs. exploit?Should systems be tagged?Are screenshots enough?

Create timelinesActive assessment

Page 4: Internal Penetration Testing

LimitsOut of scope? Not for hackers

Reading email in attempt to gain passwordsAttacking workstations to gain network

credentialsAttacking administrative workstations to gain

admin accessSearching .txt and .doc files on workstationsSearching .txt and .doc files on production

systemsSniffing trafficKeystroke loggersIntentional denial of service

Page 5: Internal Penetration Testing

Internal vs. External

What is the difference?less or no access controlstest systemstrust relationships

Page 6: Internal Penetration Testing

Tools of the Test

1. Footprint2. Host Identification3. Service Identification4. Service Enumeration5. Host Enumeration6. Network Map7. HSV Scans8. Vulnerability

Mapping/Exploitation

Page 7: Internal Penetration Testing

1. Footprint

Goal: identify ranges and domains

net view /domain to identify domains

Page 8: Internal Penetration Testing

FootprintIdentify IP ranges

SNMPDNSICMP

Page 9: Internal Penetration Testing

2. Host Identification

Identify Hosts

TCP ICMP

Identify domain members using the NET commandnet view /domain:<domain>

Page 10: Internal Penetration Testing

Host IdentificationFoundstone net view

Page 11: Internal Penetration Testing

3. Service Identification

Identify Ports

TCP UDP

Tool: Fscan –i <ip>

Page 12: Internal Penetration Testing

4. Service Enumeration

Identify what is running on listening ports

Tool:Nmap & Nessus

Page 13: Internal Penetration Testing

5. Host Enumeration

use all the previous information to make accurate guess at OS and version from Nessus reports

Page 14: Internal Penetration Testing

6. Network Map

Should be created to identify hosts, services and access paths.

Page 15: Internal Penetration Testing

7. HSV Scans

High Severity Vulnerability (HSV) Scans should be performed to identify systems with high severity vulnerability

NetBIOS weak passwordsSQL weak passwordsWeb Vulnerabilities

Page 16: Internal Penetration Testing

Cont.NetBIOS weak passwords

manual guessing techniquesnbtenum ntsleuth.0catch.comnat Network Auditing Tool

Page 17: Internal Penetration Testing

SQL weak passwords

Tools

SQLMAPSQLlhfSQLdictSqlping2osql

RemarksSQL can run on alternate ports

Page 18: Internal Penetration Testing

Web vulnerabilities

stealthwhisker typhon

Page 19: Internal Penetration Testing

8. Vulnerability Mapping/Exploitation

Source port attacks

If you use IPSec don’t forget to use the NoDefaultExempt key

HKLM\SYSTEM\CCS\Services\IPSEC\NoDefaultExec | DWORD = 1

Web Attacks

NetBIOS

SQL Attacks

Page 20: Internal Penetration Testing

9. Presentation of findings

Report should be clear and concise

Include screenshots

Use action items for remediation

Categorize findings TACTICAL STRATEGIC

Page 21: Internal Penetration Testing

Presentation of findings

Strengthening Microsoft Networks

strong domain architecturesrigid user management hardened applications principle of least privilegesecurity baselines for systems defence in depth network segmentation 3rd party audit

Page 22: Internal Penetration Testing

THANK YOU