Time
13 hours 9 minutes
Difficulty
Intermediate
CEU/CPE
13

Video Transcription

00:00
Hello and welcome to another penetration testing execution Standard discussion. Today we're going to be looking at research within the vulnerability analysis section of the Pee test standard.
00:12
Now is a quick disclaimer. Please remember that pee test videos do cover system hacking techniques and tools. And so any tools or techniques discussed or used
00:22
should be researched and understood by the user. Please researcher laws and regulations regarding the use of such tools in your given area to ensure that you do not violate the long
00:33
Now, let's jump into our objectives.
00:37
We're going to discuss public research.
00:41
We're going to look at exploit databases and framework modules is a form of research
00:46
hardening gods and their benefits. Private research, identifying potential avenues in vectors for attack and disassembly and code analysis. And again, we're looking at high level standard information from the Pee test US
01:03
execution standards of the PIN test execution standards. And so we're not going to get in detail on how to do private research and public research and per se give you a procedure step by step checklist to do each of these things.
01:15
This is kind of some thinking information that you can then take an apply where applicable, so
01:23
public research can include vulnerability databases. Vulnerability databases can be used to verify an issue reported by an automated tool. Or, if you're doing manual review, you can go and potentially find those informations as well. In the database. C V E identifiers are commonly used in given the vulnerabilities
01:41
and can be used to access summary information or other resource is in the database. You can also use him to search for and through databases in L S V D B Bug track exploit databases and frameworks, typically allowing you to use C V E's as well. So I know that the Medicis played framework as well as, um
02:01
export D B will let you search for a particular CV,
02:06
and then you can see an exploit code is associated with that
02:09
now. Vendor advisories air another component of this so vendor issued security advisories and change logs can provide pointers to vulnerability information that may not be reported by a tool.
02:21
When Microsoft releases patches and they talk about what bugs they fixed,
02:25
that could be an indicator of a vulnerability that was addressed that may still be present if the system's not updated.
02:31
Many software vendors also report details on internally discovered issues where an independent researcher coordinates the disclosure.
02:39
However, if a researcher chooses to remain silent on the details of a vulnerability than the vendor, advisory is frequently the only data that is available in these cases. Other researchers may discover more details and add them. Thio databases
02:54
searching for Stevie, used in a bender advisory, may turn up more details on potentially exploitable issue, so vendor advisories are a great way to do that. So if there's
03:04
a particular software or some version of the software or ah, device, it's being used,
03:10
you may be able to look at vendor advisories and find further details and information.
03:16
Now
03:17
exploit databases and framework modules are great as well. So many databases are actively maintained and publicly accessible on the Internet. Security researchers and exploit writers don't always submit their code to multiple sites,
03:31
and so you need to become familiar with and check several sites for exploit code for potential vulnerable applications.
03:39
While some vulnerability databases track exploit availability, their coverage is usually incomplete and should not be considered exhaustive. So just a few examples of how this looks so you can use sites like exploit D B. Okay, you've got von D B or vole, D B, C X Security and CV details.
04:00
You can search for CV information, exploit information, and these sites contain codes and proof of concept
04:06
techniques for exploiting systems, so these could be invaluable in your penetration testing efforts When you get into the exploitation phase.
04:16
Now, folks may not think
04:18
that hardening God's, um, are, you know, a good source for vulnerabilities,
04:25
but we're trying to act like an actual attacker. And so, while automated scanning can reduce the window for testing as far as the amount of time we take,
04:32
no scandal acts like a human right and so heartening Gods can be invaluable references for testers because not only do they highlight the weakest parts of the system, but you can get a sense of how the administrators doing
04:44
in their role for reducing risk for the organization. And so if there's some best practices in the hardening got none of those were applied in the environment.
04:54
The administrator may not be doing the best of war to reduce risk Now.
04:58
There may also be some information in the hardening God. That may not be common knowledge that the administrator may not have.
05:04
And from that standpoint, you could then use that to see if the system is exploitable from that point.
05:10
Now, private research areas are where we get into doing things like setting up a replica environments, and so we can use virtualization technology to essentially mimic and quickly deploy ah, system that we see in the target environment. And then we could use that Veum to explore configuration parameters, behaviors of applications
05:30
without directly connecting to the system. So this is good if we're trying to act like an attacker and that we want to avoid detection.
05:36
But it also helps us to reduce risk to the climb environment and ensure that our tests don't cause any damage or downtime to their infrastructure.
05:46
Now we can also test configurations based on different images, and so for us as testers, we want to start to build a repositories of different operating systems and things that nature so that we can load up a certain service packed level. This will help us to streamline the recreation process of the environment,
06:04
a complete
06:05
VM library, library and combination of beings within the environment that support cloning to allow you to, you know, bring stuff up quickly
06:15
is going to be beneficial and helping you tomb or efficiently reproduce bugs and information.
06:21
Now this is all dependent on the scope and scale again of the environment, what the clients hoping to achieve and what your capabilities are as far as an organization. Now, over time,
06:34
you should look to, you know, a mass images and things of that nature to help you in your testing efforts, so that again
06:43
you can give the client the best return on their investment, as well as potentially exploit a system
06:49
now identifying potential avenues in vectors. So log in or connect to, ah Target network application to identify commands and other areas of input. So if you can get into a system, you can start to look through the network. If the target is a desktop application that Reid's files and our Web pages
07:09
aniline is the accepted file formats for avenues and data input.
07:13
Some simple tests involve submitting invalid characters are verifying long strings of characters cause crashes and things of that nature, and you can also attach the bugger and analyze program states in the event of a successful crash. Now
07:27
this is getting into attack vectors like buffer overflow testing to see if those types of attacks against memory would be successful with applications
07:36
that may not be to scope. Or you may not have the skill set for that. Remember, you want to do testing, Um,
07:44
but you want to do it right, and you want to make sure that you don't do anything that's outside your wheelhouse.
07:49
Now we can also look at disassembly and code analysis, disassembly of code and code analysis So some programming languages do allow you to d compile the code and some specific applications air. Consider compound with symbols for debugging,
08:05
so a tester can take advantage of these features to analyze program flow and identifying potential vulnerabilities
08:13
so source code for open source applications could be analysed for flaws. Have applications written in PHP share many of the same vulnerabilities, and their source code could be examined as part of any test.
08:24
So again, depending on the scope and scale, they're different avenues we can take for researching vulnerabilities and figure it out if his client system could be vulnerable
08:33
to attack.
08:35
So let's do a quick check on learning.
08:37
Hardening gods are a way to determine potential vulnerabilities in the system and the diligence of a system administrator.
08:46
So if you need additional time, please take it.
08:50
So this statement hardening guides are a way to determine potential vulnerabilities we could look for common. Miss Configurations are things that are left undone, and they're also a way to test the diligence of the administrator. So this is a true statement.
09:05
So with that in mind, let's go ahead and step into our summary. So we looked at and discussed what public research wasn't some methods for doing that. We looked at exploit databases and framework modules and how those can help us to identify vulnerabilities on systems with potential exploits available.
09:20
We looked at hardening guides and common miss configurations that are essentially listed in those and
09:26
how we could see if the administrator is doing their due diligence.
09:30
We looked at private research primarily through the setup of virtual environments and the use of those environments to do additional testing. We discussed identifying potential avenues in vectors through code testing, as well as disassembly and code analysis or the disassembly of code and the analysis of code
09:46
again. Each of these areas is case by case basis, thes air, just Cem Cem primary areas within P tests that they point out with respect to doing research and how you could go about doing that if you already have a methodology or checklist in place for doing that and continue to follow it. But these are definitely some great starting points.
10:03
If you're trying to build your rep, retire for penetration, testing or find a way to develop your processes and procedures for your organization.
10:11
So with that in mind, I want to thank you for your time today, and I look forward to seeing you again soon.

Up Next

Penetration Testing Execution Standard (PTES)

In this course we will lay out the Penetration Testing Execution Standard (PTES) in all its phases and their application for business leaders and Security Professionals alike.

Instructed By

Instructor Profile Image
Robert Smith
Director of Security Services at Corsica
Instructor