E-Book, Englisch, 389 Seiten
Tiller CISO's Guide to Penetration Testing
Erscheinungsjahr 2013
ISBN: 978-1-4398-8028-9
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
A Framework to Plan, Manage, and Maximize Benefits
E-Book, Englisch, 389 Seiten
ISBN: 978-1-4398-8028-9
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used.
From the first meeting to accepting the deliverables and knowing what to do with the results, James Tiller explains what to expect from all phases of the testing life cycle. He describes how to set test expectations and how to identify a good test from a bad one. He introduces the business characteristics of testing, the imposed and inherent limitations, and describes how to deal with those limitations.
The book outlines a framework for protecting confidential information and security professionals during testing. It covers social engineering and explains how to tune the plethora of options to best use this investigative tool within your own environment.
Ideal for senior security management and anyone else responsible for ensuring a sound security posture, this reference depicts a wide range of possible attack scenarios. It illustrates the complete cycle of attack from the hacker’s perspective and presents a comprehensive framework to help you meet the objectives of penetration testing—including deliverables and the final report.
Zielgruppe
Information security management, staff, and consultants.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Getting Started
Audience
How to Use This Book
Setting the Stage
Perspectives of Value
Where Does Penetration Testing Fit?
What Constitutes a Success?
A Quick Look Back
Hacking Impacts
Resources
Information
Time
Brand and Reputation
The Hacker
Types of Hackers
Script Kiddies
Independent Hackers
Organized Hackers
Sociology
Motives
The Framework
Planning the Test
Sound Operations
Reconnaissance
Enumeration
Vulnerability Analysis
Exploitation
Final Analysis
Deliverable
Integration
The Business Perspective
Business Objectives
Previous Test Results
Building a Roadmap
Business Challenges
Security Drivers
Increasing Network Complexity
Ensuring Corporate Value
Lower Management Investment
Business Consolidation
Mobile Workforce
Government Regulations and Standards
Why Have the Test?
Proof of Issue
Limited Staffing and Capability
Third-Party Perspective
It Is All about Perspective
Overall Expectations
How Deep Is Deep Enough?
One-Hole Wonder
Today’s Hole
Planning for a Controlled Attack
Inherent Limitations
Time
Money
Determination
Legal Restrictions
Ethics
Imposed Limitations
Timing Is Everything
Attack Type
Source Point
Required Knowledge
Timing of Information
Internet
Web Authenticated
Application Service
Direct Access
Multiphased Attacks
Parallel Shared
Parallel Isolated
Series Shared
Series Isolated
Value of Multiphase Testing
Employing Multiphased Tests
Teaming and Attack Structure
Red Team
Vulnerability Explanation
Testing Focus
Mitigation
White Team
Piggyback Attacks
Reverse Impact
Detection
Blue Team
Incident Response
Vulnerability Impact
Counterattack
Team Communications
Engagement Planner
The Right Security Consultant
Technologists
Architects
Ethics
The Tester
Logistics
Agreements
Downtime Issues
System and Data Integrity
Get Out of Jail Free Card
Intermediates
Partners
Customers
Service Providers
Law Enforcement
Preparing for a Hack
Technical Preparation
Attacking System
Operating System
Tools
Data Management and Protection
Attacking Network
Attacking Network Architecture
Managing the Engagement
Project Initiation
Identify Sponsors
Building the Teams
Schedule and Milestones
Tracking
Escalation
Customer Approval
During the Project
Status Reports
Scope Management
Deliverable Review
Concluding the Engagement
Reconnaissance
Social Engineering
E-Mail
Value
Controlling Depth
Help Desk Fraud
Value
Controlling Depth
Prowling and Surfing
Internal Relations and Collaboration
Corporate Identity Assumption
Physical Security
Observation
Dumpster Diving
Theft
Internet Reconnaissance
General Information
Web Sites
Social Networking
Enumeration
Enumeration Techniques
Connection Scanning
SYN Scanning
FIN Scanning
Fragment Scanning
TCP Reverse IDENT Scanning
FTP Bounce Scanning
UDP Scanning
ACK Scanning
Soft Objective
Looking Around or Attack?
Elements of Enumeration
Account Data
Architecture
Operating Systems
Wireless Networks
Applications
Custom Applications
Preparing for the Next Phase
Vulnerability Analysis
Weighing the Vulnerability
Source Points
Obtained Data
The Internet
Vendors
Alerts
Service Packs
Reporting Dilemma
Exploitation
Intuitive Testing
Evasion
Threads and Groups
Threads
Groups
Operating Systems
Windows
UNIX
Password Crackers
Rootkits
Applications
Web Applications
Distributed Applications
Customer Applications
Wardialing
Network
Perimeter
Network Nodes
Services and Areas of Concern
Services
Services Started by Default
Windows Ports
Null Connection
Remote Procedure Call (RPC)
Simple Network Management Protocol (SNMP)
Berkeley Internet Name Domain (BIND)
Common Gateway Interface (CGI)
Cleartext Services
Network File System (NFS)
Domain Name Service (DNS)
File and Directory Permissions
FTP and Telnet
Internet Control Message Protocol (ICMP)
IMAP and POP
Network Architecture
The Deliverable
Final Analysis
Potential Analysis
The Document
Executive Summary
Present Findings
Planning and Operations
Vulnerability Ranking
Process Mapping
Recommendations
Exceptions and Limitations
Final Analysis
Conclusion
Overall Structure
Aligning Findings
Technical Measurement
Severity
Exposure
Business Measurement
Cost
Risk
Presentation
Remedial
Tactical
Strategic
Integrating the Results
Integration Summary
Mitigation
Test
Pilot
Implement
Validate
Defense Planning
Architecture Review
Architecture Review Structure
Awareness Training
Awareness Program
Incident Management
Building a Team
People
Mission
Constituency
Organizational Structure
Defining Services and Quality
CERT Forms
Security Policy
Data Classification
Organizational Security
Conclusion
Index