Security testing. VRN. 20.02.2013

26
Penetration Testing Roman Denisenko, 20 February 2013

Transcript of Security testing. VRN. 20.02.2013

Page 1: Security testing. VRN. 20.02.2013

Penetration Testing

Roman Denisenko, 20 February 2013

Page 2: Security testing. VRN. 20.02.2013

Agenda

• Theoretical part:– What is Security Testing? Classification.– When? Who? For what purposes?– Workflow of penetration testing of web application.– Common vulnerabilities.

• Toolkit of penetration testers:– Review and classification of necessary tools.

• Practical part.

Page 3: Security testing. VRN. 20.02.2013

Security testing(by final goal):• Vulnerability Assessment.• Penetration testing.• Code Review.• Vulnerability Scan.• Security review.

Page 4: Security testing. VRN. 20.02.2013

Security testing(by impact level):• Application level.• Network level.• Physical level.

Page 5: Security testing. VRN. 20.02.2013
Page 6: Security testing. VRN. 20.02.2013

When should we perform ST?

1. Within development cycle.

2. As additional service after deployment.

Page 7: Security testing. VRN. 20.02.2013

Who should perform?

1. Ordinary testers.

3. Developers.

2. Specialist of Security expertise.

Page 8: Security testing. VRN. 20.02.2013

Client level

HTTP level

Web service level

Database level

Page 9: Security testing. VRN. 20.02.2013

Algorithm of penetration testing:

• Information gathering.• Mapping.• Vulnerability Assessment.

• Automation testing.• Manual testing.

• Creation of report.

Page 10: Security testing. VRN. 20.02.2013

Information gathering.

www.target.es

Page 11: Security testing. VRN. 20.02.2013

Mapping.

/manage

/admin/calculate

/upload

/registration

Page 12: Security testing. VRN. 20.02.2013

Run automation vulnerability scanners.

Page 13: Security testing. VRN. 20.02.2013

Manual testing.

Page 14: Security testing. VRN. 20.02.2013

Creation of report.

Page 15: Security testing. VRN. 20.02.2013

Common vulnerabilities.

Page 16: Security testing. VRN. 20.02.2013

SQL injection

Page 17: Security testing. VRN. 20.02.2013

SQL injection

Page 18: Security testing. VRN. 20.02.2013

Stored XSS

Page 19: Security testing. VRN. 20.02.2013

Stored XSS

Page 20: Security testing. VRN. 20.02.2013

Privilege escalation.

Page 21: Security testing. VRN. 20.02.2013

Insecure Direct Object References.

Page 22: Security testing. VRN. 20.02.2013

CSRF.

Page 23: Security testing. VRN. 20.02.2013

CSRF.

Page 24: Security testing. VRN. 20.02.2013

Necessary toolkit.• Gathering tools.

– nmap.– nikto

• Automation vulnerabilities scanners.– Acunetix– Nexuss– WebInspect– w3af

• Manual testing tools.– BurpSuite– Sqlmap

• Sniffing tools.– Wireshark– Fiddler.

Page 25: Security testing. VRN. 20.02.2013

Penetration testing of the test site...

Page 26: Security testing. VRN. 20.02.2013

Contacts:

: [email protected]

: roman__denisenko