Understanding Penetration Testing Tactics and Techniques

Slide Note
Embed
Share

In the realm of secure software engineering, penetration testing plays a crucial role in proactively identifying vulnerabilities. This involves delving deep to exploit potential weaknesses and simulate real-world attack scenarios. Skilled testers, both in-house and external, use frameworks like MITRE's ATT&CK and CAPEC to map out attacks, understand pre-ATT&CK phases, and address tactics from initial access to impact.


Uploaded on Sep 06, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Engineering Secure Software PENETRATION TESTING PENETRATION TESTING

  2. Testing that Digs Deeper Penetration testing is about attempting to exploit as much as possible (ethically) Purposes Demonstrate the person-hours required to break in Create a real scenario Compared to typical SE testing Typical: found a stacktrace! Report bug Pentesting: how can we use this stacktrace? Map out a long set of chains of attacks

  3. Preconditions Requires a working system Not necessarily finished, but working As networked as possible for pivoting Highly skilled testers Outsider Not pre-knowing company secrets Most companies hire out pentesters, but in- house pentesters are highly marketable Can be a good side-hustle for you in existing dev organizations

  4. MITREs ATT&CK & CAPEC ATT&CK A taxonomy of tactics and techniques for general-purpose pentesting knowledge Tactics: broad categories Techniques: tool-agnostic approaches Somewhat technology-dependent CAPEC Common Attack Pattern Enumeration and Classification A dictionary of attack patterns Organized by mechanisms and domains Not covered in this lecture, but referenced in a few VotD

  5. Lets talk about ATT&CK ATT&CK (Enterprise version)

  6. ATT&CK Tactics Pre-ATT&CK. The adversary is building capabilities and doing initial research Initial Access. The adversary is trying to get into your network. Discovery. The adversary is trying to figure out your environment. Privilege Escalation. The adversary is trying to gain higher-level permissions. Defense Evasion. The adversary is trying to avoid being detected. Credential Access. The adversary is trying to steal account names and passwords. Collection. The adversary is trying to gather data of interest to their goal.

  7. ATT&CK Tactics cont. Execution. The adversary is trying to run malicious code. Persistence. The adversary is trying to maintain their foothold. Lateral Movement. The adversary is trying to move through your environment. Command and Control. The adversary is trying to communicate with compromised systems to control them. Exfiltration. The adversary is trying to steal data. Impact. The adversary is trying to manipulate, interrupt, or destroy your systems and data.

  8. ATT&CK Techniques There s a lot of techniques. For this class, including exams, we ll focus on just a few key ones..

  9. Key Techniques: Initial Access Drive-by compromise Users visit malicious sites e.g. executing Javascript with a browser exploit in it that takes control of a machine Hardware additions Introducing new hardware to the system e.g. hardware keystroke loggers, keystroke injection, network sniffers, portable cell-phone towers Spearphishing Confidence scamming exploiting the specific company We see these at RIT all the time

  10. Discovery Network and Service Scanning (we ll explore this later) Run tools to enumerate hosts and ports Figure out what services are running e.g. nmap, unicornscan Account Discovery Find a listing of the existing accounts e.g. /etc/passwd

  11. Credential Access Brute Force Credential Dumping e.g. dump a database table with credentials e.g. copy the /etc/shadow file Valid Accounts e.g. using default accounts e.g. using discovered credentials from other access

  12. Execution & Persistence Execution Command-line interface e.g. ssh terminal, powershell Service execution e.g. adding a new service to be executed Persistence Bootkit Place malware in the Master Boot Record of the HDD Executed even after reformatting OS partition Scheduled task (also an Execution technique) e.g. crontab or Windows Task Scheduler Create account Component firmware

  13. Privilege Escalation Process Injection Executing arbitrary code in an existing, legit process space e.g. Changing the path of a DLL at runtime, stack smashing, LD_LIBRARY_PATH setuid and setgid (we ll cover this later)

  14. Defense Evasion Techniques that adversaries use to avoid detection throughout their compromise Access Token Manipulation Binary Padding Clear Command History Connection Proxy many more

  15. Lateral Movement Pass the Hash Remote File Copy

  16. CPTC, Kali, and OSCP Collegiate PenTesting Competition RIT helps and competes in an annual national competition (Oct-Nov) Like a varsity sport Kali Linux A distro designed for penetration testing TONS of tools, steep learning curve on many of them Offensive Security Certified Professional One of the best certs out there for pentesting About the effort of a college course 24-hour final exam where you have to break into every machine

Related


More Related Content