Title: Module 2
1Module 2 PenTest Overview
- Penetration Testing Methodologies
- Penetration Test Management (ISSAF)?
- PenTest Project Management
- Engineer Assessment Effort
2Penetration Testing Methodologies
- ISSAF
- http//www.oissg.org/issaf
- OSSTMM
- http//www.isecom.org/osstmm/
- NIST SP 800-42
- http//csrc.nist.gov/publications/PubsSPs.html
3Penetration Testing Methodologies
- ISSAF
- Peer-Reviewed
- Contains two separate documents
- Management (ISSAF0.2.1A)?
- Penetration Testing (ISSAF0.2.1B)?
- Checklists for Auditing / Hardening Systems
- Tool-Centric
4Penetration Testing Methodologies
- ISSAF
- Advantages
- Does not assume previous knowledge
- Provides examples of pentest tool use
- In the weeds
- Disadvantages
- Out of date quickly
- Pentest tool examples are not extensive
- Last update May 2006
5Penetration Testing Methodologies
- OSSTMM
- Peer-Reviewed
- Most popular methodology
- Assessments are discussed at a high-level
- Includes unique technology (RFID, Infrared)?
- Extensive templates
6Penetration Testing Methodologies
- OSSTMM
- Advantages
- More flexibility for Pentesters
- Frequent updates
- Disadvantages
- Steeper learning curve
- Tool and OS knowledge necessary beforehand
- Latest version requires paid subscription
7Penetration Testing Methodologies
- NIST SP 800-42
- Federal Publication
- Least comprehensive methodology
- Tools-oriented
- NIST publications rarely get updated
- If you can't use anything else, at least use
something
8Penetration Test Management
- ISSAF
- Phase I Planning
- Phase II Assessment
- Phase III Treatment
- Phase IV Accreditation
- Phase V Maintenance
- ?Use a Project Manager
9PenTest Project Management
- Phase I Planning
- Information Gathering
- Project Chartering
- Resource Identification
- Budgeting
- Bidding Estimating (Called Cash Flow)?
- Work Breakdown Structure (WBS)?
- Project Kick-Off
10PenTest Project Management
- Phase II Assessment
- Inherent Risk Assessment
- Controls Assessment
- Legal Regulatory Compliance
- Information Security Policy
- Information Security Organization and Mgmt.
- Enterprise Information Systems Security and
Controls ? (Penetration Testing)? - Security Operations Management
- Business Continuity Management
11PenTest Project Management
- Phase III Treatment
- See Risk Treatment Plan
- Phase IV Accreditation
- Context Establishment
- Evaluation
- Reporting
- Certification
- Phase V Maintenance
12PenTest Project Management
- Phase II Assessment
- Inherent Risk Assessment
- Controls Assessment
- Legal Regulatory Compliance
- Information Security Policy
- ...etc.
- Each assessment is broken down further...
13PenTest Project Management
- Phase II Assessment
- Project Management Documents
- Engagement Scope
- Communications Plan
- Issue Escalation Plan
- Scheduling
- Responsibility Matrix
- Deliverables
14Engineer Assessment Effort
- Phase II Assessment
- Scheduling (Engineering Effort)?
- Information Gathering
- Network Mapping
- Vulnerability Identification
- Penetration
- Gaining Access Privilege Escalation
- Enumerating Further
- Compromise Remote Users/Sites
- Maintaining Access
- Cover the Tracks
15Module 2 Conclusion
- Penetration Testing Methodologies
- Penetration Test Management (ISSAF)?
- PenTest Project Management
- Engineer Assessment Effort