Time
5 hours 54 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Description

This lesson focuses on vulnerability scans and penetration testing which is also referred to as pen tests. This unit focuses on: • White Box Testing (aka structural analysis) • Black Box Testing White box testing allows full access to source code, design documents, use and misuse cases as well as configuration files. Whereas in black box testing, there is no knowledge of code and relies on methods such as fuzzing, scanning and penetration testing.

Video Transcription

00:04
So as we move into security testing, first of all, we look att, two main types of testing white bucks testing and black box testing. Sometimes white box testing is referred to his clear box testing or structural analysis. The reason it's called Clear Box or White box
00:22
is the idea that the source code is fully visible.
00:26
As a matter of fact, the tester is another programmer that has access to whatever they want. Any sort of supporting the documents for design. They'll have access to source Coast code, any sort of use and misuse documentation, configuration files, whatever they want, they'll have access to.
00:44
What they're really doing is they're checking
00:46
under the hood once again. Is this well written code? Is it structurally sound? Is it logically sound?
00:53
Is it written the proper way and again, considering that from a security standpoint
00:59
now, the opposite of white box testing is called black box testing
01:03
and the idea here is that there is zero knowledge and sometimes it is referred to as a zero knowledge test. There is zero knowledge of the code to the attacker, so the attacker has no additional information and they're gonna have to go through just like a normal attacker that has no inside knowledge.
01:22
And they're gonna have to go through a series of tests
01:25
often related around you know, the world of brute force tests to see if they can create a compromise. Some of the black box testing techniques might be fuzzing scanning or penetration. Test
01:38
Fuzzing will just mention first because we talked a lot about code injection and we've talked about within our applications that elicit input from users through the use of forms. We have to make sure that those forms are safe,
01:53
that they're secure and that they don't allow input that could be damaging on the back end.
02:00
That's what fuzz it is all about,
02:01
sometimes called fault injection, because that's what we're doing is we're injecting faults over and over and over slightly different variations to see if any of them will be successful. So ultimately, we're injecting faults into the software, and we're looking to see how the software response and this is called fuzzing and what it's
02:22
ultimately about. What I think they'll focus on for the exam
02:24
is it verifies our input validation. Is it good enough?
02:30
Do we have software which code to be injected or commands can be injected or some sort of malicious code? Or do we have an application that can withstand that type of attack? And we refer to that as fuzzing.
02:43
It's all about verifying software, so we would also look for defects in coding. We would also look for any sort of other known security plugs. Ideally, we could detect buffer overflow errors, and the buffer overflow error is any kind. More information is written to memory
03:02
than is allowed to be.
03:04
Thus overfilling the memory buffer, spilling its contents into something else. Maybe the buffer for another application. Remote code execution. You know, there's always risks. Associated are always risks associated with remote access, so executing code from a remote location
03:23
through the use of input into an application could be very dangerous. We're also looking for faulty logic pore structure, those things that we would be concerned with that we're gonna use fuzzing to detect
03:37
now scanning. We hear about scanning a lot when we talk about vulnerability assessments and penetrations at testing. So with scanning, what we're gonna look to do is we're gonna look to gather information. Scanning is a passive means of gathering information. So what I'm gonna do is I'm gonna scan the network.
03:54
I want to figure out what your environment is.
03:58
I'd like to know what your I P address and schemes are. I'd like to know you're naming conventions. I'd like to know where your critical servers are. I'd like to know what ports are open. I'd like to know what software is running. I'm looking. He just gained all the information I possibly can,
04:14
but I'm not making any modifications. I'm not injecting anything into the data stream, so we still consider standing to be passive in nature.
04:25
So different types of scans we might do just a general vulnerability scan. So we're looking for some of the known flaws and seeing things like our common ports open his port 80 open on your system. Are you listening on the port for web traffic?
04:43
Have you patched? The system doesn't have the latest update. Those sorts of things we can also scan for contents. Ah, so that we can actually get through,
04:56
um,
04:57
to that actual content of web pages. We can scan looking for the contents of not just a word file, but the macron's within that file. You know, viruses very frequently traditionally have been spread through Mac rose and files, and that hasn't always been
05:14
an element that's easy to scan. Now we do content scanning
05:16
so that we can determine if there is an embedded a virus or some sort of malware there.
05:23
Ah, privacy standing. We got a look and see. Are we exploiting the privacy of our employees of our customers of our patients, whatever that may be? So when we're scanning for privacy, making sure that those violations don't exist
05:39
now penetration testing is gonna take all of this one step further. And sometimes we refer to penetration testing as pin tests.
05:47
Pen tests are active, where his vulnerability scanning is passive. So with the pen test, we found her with the vulnerability scan. We know what vulnerabilities there are. The pen test wants to take it a step further and say, Can I exploit these weaknesses
06:05
Now? Penetration test normally follows four steps. The first step is the reconnaissance step.
06:13
What information can I gather often from publicly available sites? You know, can I go to a website and learn information about your organization? Can I Goto who is and find out you're addressing Seymour your domain. What information is out there that's publicly available?
06:30
Ah, and often there's quite a bit through the use of publicly available sources
06:35
from there. I want to look and see. Can I exploit those vulnerabilities? Can I access an open port or take advantage of a system that hasn't been patched? How can I access the network? So in the resiliency piece, this is where the actual attack happens. Now, once I've been successful with my attack,
06:56
I want to remove any sort of indication that I was there. So
07:00
I'm gonna clean up any sort of evidence. I'm gonna race entries and audit logs I'm gonna remove. Or if I leave software behind, maybe backdoor software. I'm often gonna rename my software to that of a legitimate service. I'm gonna spoof the name so that
07:16
if you do go through and you're looking at your processes,
07:19
you're gonna see something that you would expect to see anyway.
07:24
All right, And then at the end of the pen testing, we're gonna do our reporting and our recommendations. So what we found as faras where the vulnerabilities are, but we're also going to report on any sort of non compliance with organizational policy, whether policies, air working or not, whether they're being followed.
07:44
So those elements are gonna come to us from, ah, scan of the network. That scan is gonna give us vulnerabilities, will take that scan a step further through pen testing.

Up Next

ISC2 Certified Secure Software Life-cycle Professional (CSSLP)

This course helps professionals in the industry build their credentials to advance within their organization, allowing them to learn valuable managerial skills as well as how to apply the best practices to keep organizations systems running well.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor