Time
13 hours 9 minutes
Difficulty
Intermediate
CEU/CPE
13

Video Transcription

00:00
Hello and welcome to another penetration. Testing execution Standard discussion. Today we're looking at capabilities and technology in place within the pre engagement interaction section. This will be being last discussion we have on this particular section.
00:18
So with that in mind, let's touch on our disclaimer. Real quick.
00:21
Be reminded that pee test videos do cover tools that could be used for system hacking.
00:26
Any tools that are discussed or used during any demonstrations should, of course, be researched by the user as well as understood by the user. Please research your laws and regulations regarding the use of such tools in your given area. So with that in mind, let's go ahead and jump over to our objectives.
00:45
Now. Today we're going to look at what a benchmark is a sw far just by definition, at a high level, we're going to look at an organization's ability to detect and respond, respond to foot printing with respect to how we would report on or what things we may look for when an organization may look for
01:03
we're going to touch on responding to in detecting scanning and vulnerability analysis,
01:10
response to infiltration and response to data exfiltration so each of these areas is really just a standard definition, a cz wella. Some key examples that we may
01:21
have an organization look for that they should be looking for to discover these types of attacks. Now, what is benchmarking
01:30
well, by its definition, it is to evaluate or check something by comparison with a standard. And so the client may or may not have established benchmarks. And so really, that's going to determine whether or not testing these different areas
01:48
would even be valuable or beneficial to the client. And so it comes back to the discussion we've had on
01:55
maturity level and the overall maturity of the security programme in which you're testing against. And so
02:02
if a client's never done a penetration test,
02:06
if they don't have any benchmarks that they have in place for their security team, if they use the third party, all of those things may need to be considered with respect, whether or not this type of reporting and review would even be necessary. But if they use 1/3 party for Security Service's or for response service is
02:25
and there should be tools and systems in place to detect
02:29
these types of attacks
02:30
as long as it would not violate any terms and conditions of the service. As long as you're not directly testing um provider equipment without permission, etcetera, then you know it's up to the client and their ideas of what would be valuable again out of that service.
02:50
And so some incident response benchmarks would be things like cost per incident. So how much on organization spends per incident and whether or not there at the appropriate threshold. Automatic detection versus manual detection is another. So how many of the incidents are detected using
03:08
automatic methods versus manual methods and vice versa?
03:13
Ah, percentage of investigations or percentage of incidents investigated versus volume. So you know, if it needs to be 90%
03:27
and your team is only evaluating your team being the business team, not so much. The tester team is evaluating 50%.
03:37
Then that means that you're not meeting that bench more record that you're not at work should be or if you're always at 50% and your bench more is essentially 50% of the volume. So if you want to get to 90% you either have to hire new employees or you know make adjustments to the system so that it's more efficient, effective
03:55
ratio of investigations to response that's also tying into investigated versus volume. So if you've got a high volume
04:02
and that could drive up
04:04
again how big your back long is, as well as
04:10
whether or not you're addressing these things in a timely manner. So if you investigate, um, 80%
04:16
of all incidents on dhe, you know you're only responding to that 80% in a timely manner. So being that if I evaluate 100 things, I only respond to 80% of them. What is that other 20%? What's going on there? So
04:32
that investigation to response ratio is beneficial and then rate of response being time to a decision is going to be key there as well. So if you take longer than I think, the industry average last I looked was 21 minutes is how long it takes the average for an actor to get into an exfiltrate data from a system.
04:51
And so if it takes you
04:54
35 minutes to respond and make a decision and get something addressed,
04:59
then there could be the potential for almost 10 minutes of ex filtration activity. It's all things to take into consideration. So when you're benchmarking,
05:08
um, a client looking at these areas, what their current averages, what they're currently doing
05:14
again would dictate whether or not this type of testing would be beneficial. But if they count a robust response effort on a robust security team,
05:24
then it may be beneficial for them.
05:26
So one of the areas we could look at would be the detective response activity with respect to foot printing. And so this is just a small example of the types of activities. But it could be
05:41
zone transfer attempts in maps gaining brute forcing of DNA's Web application discovery activities.
05:47
Really anything will were actively engaged in a system with the intention of getting additional data on that system
05:56
and so few in map,
05:58
you know, doing in maps can of a system,
06:00
then time to detect that same thing for well, application, amount of time. It takes maybe to respond to either ability to positively identify what the attacker is doing, And so if you can see I do, something's being scanned.
06:14
But we're not 100% sure what's going on or what activities taking place? Well, how can you
06:19
start to determine whether or not that activities valid?
06:23
Maybe Web applications scan attempts are being made, but you don't have any Web applications in the environment that wouldn't be anything to be concerned with, Right? But,
06:32
um,
06:33
those types of things would be pertinent. So if you do an end, maps can
06:38
and it takes. You know the organization an hour to pick it up, then that could be something worth noting. But
06:47
it could be that the organization does not respond to
06:53
in maps scans,
06:55
so it may not be a valid concern, but they may respond to Web applications. Cans or direct scans on particular systems are in the direct methods, so it would be good to understand how they should respond to those activities and whether or not their benchmarks meet those expectations again,
07:12
whether or not it provides value to the organization is directly dependent upon whether or not they're actively engaged in monitoring and addressing those times of activities.
07:20
Now, where I would expect organizations who have security programs to pay attention and start to respond is when we're looking at vulnerability, scanning and analysis.
07:32
Okay, so Unlike information gathering activities where we may be, some put printing vulnerabilities. Gaming is typically depending on the type of skin, I guess, in the information gathering phase a little more intense and direct with the intention of potentially exploiting the system.
07:48
And so, um, it would be beneficial to one
07:55
understand when someone is doing a vulnerability scan versus and in maps can. And so they're typically indicators whether that be an automated scanner manual in nature. If an individual were to, let's say, take certain parameters and put it into ah front end Web page with the intention of testing for SQL
08:13
vulnerabilities, it would be important
08:16
to identify those types of entries. All in all, you would hope that those types of entries would be excluded from input. But that's not always the case. And so you know, if that was something that was overlooked or if it is just something that is not being addressed
08:33
and the security team should be responding to those types of activities and of course, response time and detection time is going to be huge when it comes to kind of addressing the benchmark of the organization against the actual response time and detection town.
08:52
Now, detection and response to infiltration is
08:54
just as big a CZ. Probably the next section will talk about which is data exfiltration.
09:01
And so infiltration is essentially when the attacker finally has access to the client system or network on and in doing so without authorization. And so some attacks that may lead to this would be like buffer overflow, successful fishing, successful password cracking injection attacks, longs being cleared from a system
09:20
being able to detect those types of attacks is going to be
09:24
pretty big, I mean, because if a phishing attack is successful, if injection attacks are successful
09:31
again, that could lead to data. Exfiltration, which we'll talk about next, is well as the ability for an attacker to get into a system and then move laterally to other systems. So
09:41
if, um,
09:43
you know there is a security team involved and they can't pick up password cracking activity or they don't detect injection attacks, they don't see when in system logs have been cleared.
09:54
Those things could be troublesome. Now, on entity could attempt injection attacks against a external website. That may happen all the time. There may be controls in place to block that.
10:05
Therefore, it may not be directly reported on, but
10:09
if an entity gets into a network by one of those means and then attempts to attack other systems by moving laterally, using these methods definitely would want to delineate between internal and external activity in these types of things. Because then we're not just talking about malicious
10:24
external entities. We could be testing for malicious insider
10:31
activities are a threat actor, That's that's, you know, a disgruntled employee or a technical resource. It's attempting to get unauthorized access to a system. So it's not always the things that are external to a network that you have to worry about. There could be some internal threat actors as well that are unknown to the organization that
10:48
knowing you know when these things were happening would be beneficial in kind of combating that that threat.
10:56
Now data exfiltration is definitely something we want to be able to detect. But
11:01
where I've seen this done with security teams before is really figuring out what,
11:07
um, data sets are sensitive or critical to the organization. Because if I've got the A ninja vigil that say that
11:18
uploading
11:20
five gigs worth of photos to the cloud. And then we go in and investigate and we find that that five gigs worth of data was, in fact, just soccer pictures from their Suns game. And they've been, you know, storing them on their desktop.
11:33
OK, better safe than sorry, but do we really need to monitor the photos, folders and things of that nature of the system in question? So if we've got activity that's happening on, like HR folders or accounting folders, we'd want to have some mechanism to alert us when on unauthorized person has access those
11:52
you know, folders.
11:54
And then maybe even when unauthorized person is moving rapidly through those folder structures and potentially,
12:03
that could be done through automation or some sort of compromise to being able to detect anomalous activity and behavior. There would be beneficial Thio client and then detection and response to large file transfers again, talking about like five gigs worth of photos being moved down a networker,
12:20
you know. Ah, gig worth of word documents being moved out of network
12:24
seeing when attempts were made to access file sharing Web sites and maybe commanding control or known bad I P's to transfer data things of that nature. So
12:35
understanding how long it takes a team to detect and respond to those types of activities is going to be critical to kind of again benchmarking the organization and making recommendations for reducing risk and things that you may be asking yourself like How is this
12:50
beneficial for me? Is the penetration tester Why would I want to do these things? And I mean, to be honest with you, your main goal again is risk reduction effort.
12:58
And so this is applicable to the overall effort that you provide a za consultant or as a tester. And so knowing how to document these things again, taking into account time that the test is run versus time it takes to respond. That difference is the overall
13:15
detection window. So if they take 30 minutes to actually detect it and then another 10 to respond,
13:22
okay, take him 10 minutes to respond after 30 minutes total, 40 minutes. What could happen in the meantime? How can we tighten up on that? What can we do to improve the capabilities of the organization and reduce risk overall primary components of being a penetration tester and identifying risk Now
13:41
let's do a quick check on learning true or false
13:46
testing. Client response. *** marks is not a part of penetration testing.
13:50
Well, given that I just indicated that it is a primary part of pen testing and that you should be aware of how to measure a client response to those things and understand those things,
14:03
that is a false statement. Testing client response benchmarks is a part of penetration testing with respect to their security team and their security solutions or technical controls.
14:20
So
14:22
in summary,
14:22
we discussed what a benchmark is and why it is important to a new organization, and it is definitely a part of our responsibility. If it's in scope to evaluate is a penetration tester we discussed ability to do take to respond to foot printing some examples of that and why it's important
14:41
the same for scanning and vulnerability analysis with respect to vulnerability, scanning and vulnerability analysis,
14:46
um, the ability to detect and respond to infiltration and data exfiltration. So again, if the client does not have a security program in place and has no such tools,
14:58
this is probably not relevant to their particular organization. But if a client does have an established security program and benchmarks and response times and solutions in place. Then it is likely relevant for a T least initial discussion and potential scoping into their penetration test.
15:20
So with that in mind, I want to thank you for your time today, and I look forward to seeing you again soon.

Up Next

Penetration Testing Execution Standard (PTES)

In this course we will lay out the Penetration Testing Execution Standard (PTES) in all its phases and their application for business leaders and Security Professionals alike.

Instructed By

Instructor Profile Image
Robert Smith
Director of Security Services at Corsica
Instructor