Metasploit mailing list archives
The Perfect Pen Test? Your opinions?
From: metafan at intern0t.net (MaXe)
Date: Tue, 27 Jan 2009 09:44:43 +0100
I must agree with Tommy, however i have my own approach which i have
been able to improve more and more after gaining hands-on experience but
also after reading papers like OSSTM (or whatever the name is) and the
NIST paper etc. Basicly these kind of papers are called
Penetration/Pentesting Frameworks which are papers of how One could
perform a pentest.
Most of them covers most of the aspects, though there are some which
points more in the tools section like the NIST paper, while the OSSTM
points more in the direction of what you might want to use yourself. I
believe that every person has his/her own way of performing a
penetration test and isn't that why it is exciting to see someone else
than yourself to perform one? :-)
Anyways, here is how i could perform an external pentest: (from this
method, i only have a company name to start with)
* 1. Information Gathering Phase (find the company's website,
emails, employees (and their blogs etc) and anything else related)
* 2. Network Discovery Phase (find the internal and external
network(s) of the company if possible, with help from the
information above)
* 3. Service Discovery Phase (find all services belonging to the
company thus the versions, ftp, http and so on.)
* 4. Vulnerability Match Phase (see if it is possible to find any
holes directly in the applications.)
* 5. HTTP-Vulnerability Phase (check out all http-services belonging
to the company, check for everything ranging from SQL injection to
XSS)
* 6. Gaining Access (see if it is possible to gain full or partially
access to their systems. Social Engineering might work.)
* 7. Escalation of Privileges (if partial access was gained,
escalate privileges in order to gain root.)
* 8. System/Network Browsing (find other nodes on the network if
possible, if so begin from service discovery phase or information
gathering phase.)
* 9. Gaining Internal Access (if it was possible to gain internal
access, then the job is almost done. If not, we will need to do it
here. This could be achieved with XSS, Trojans, Eavesdropping,
Phishing or by Cracking the wireless network if they have such.
Even Social Engineering can work in this phase))
* 10. Backdooring Phase (put a rootkit or w/e i like, as long as it
isn't detectable. This isn't necessary for most companies.)
* 11. Removal of Traces (if needed, then remove all traces possible.)
Of course this only shows how i _could_ perform a pentest and i must say
that every pentest i've performed, are different. The reason why is
quite simple. Every network is different in some way, even if they have
the same equipment it might be setted up completely different, so that's
why i use different methods in each test.
The hardest thing for me to do when i perform internal vulnerability
assesments is to keep within the timelimit (around 2 hours), get as much
info as possible which isn't that hard, though after knowing what's
running on the network One can always go one layer deeper and see what
the services are doing and if there is anything notable about those.
Anyways, i hope this enlightened you or someone else. Please don't flame
me for giving my personal opinion ;-)
Best Regards,
MaXe
PS: Yes, there's plenty of spelling and grammatical issues i know.
Main/Mother language is not english as you might have guessed.
Mr Gabriel wrote:
Dear All,
Thanks for taking the time to read this message. First off - I'd like
to say to HD Moore and co; keep up the damn fine work, and also to
everyone on this list who helps others who have issues, (and I mean
MSF based issues, not like, "my wife left me, because she caught me in
my PA" type issues :) ).
I've been trying for a long time to get my head around pen testing,
and for me it's not too much of a problem to understand, I usually
explain in in these four steps,
* Take a look around the network, to find as many end points as
possible
* Take a look at each end point to see what services are running
on which ports,
* Match the service, service version, port, and OS, to a known
vulnerability
* Make use of the vulnerability, hence, proving a security
breach/hole/issue
* ( I know this is a fifth step, but you could also use fuzzing,
if no prior known vulnerability exists )
Now, I've had numerous discussions with people that think there is
much more to pentesting that what I just stated, and my argument is
that, unless I already have a target in mind, how can I be more
specific? It was at that point, I realise that people tend to have
personal approaches to a pen test rather than a general approach -
which leads me to my question - What would be your perfect pen test
approach? Personally, I think the steps I have outlined, is the best
principal you can follow, but I will be delighted if someone could not
only prove me wrong, but improve on it :)
The scenario is as follows;
You are presented with an unknown network, you have no prior
knowledge, other than the fact that it is an IP4 based network. You
must prove that it has the potential to be compromised - what are your
steps?
------------------------------------------------------------------------
_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework
Current thread:
- The Perfect Pen Test? Your opinions? Mr Gabriel (Jan 23)
- The Perfect Pen Test? Your opinions? Cash (Jan 23)
- The Perfect Pen Test? Your opinions? Robin Wood (Jan 23)
- The Perfect Pen Test? Your opinions? Donnie Werner (Jan 23)
- The Perfect Pen Test? Your opinions? Tommy Elliott (Jan 23)
- The Perfect Pen Test? Your opinions? MaXe (Jan 27)
