mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-27 23:04:05 -06:00
125 lines
4.0 KiB
Markdown
125 lines
4.0 KiB
Markdown
---
|
|
title: "12-pen-testing"
|
|
aliases:
|
|
tags:
|
|
- comp210
|
|
- lecture
|
|
sr-due: 2022-12-11
|
|
sr-interval: 26
|
|
sr-ease: 250
|
|
---
|
|
|
|
# News
|
|
- DOC mt cook ransomware
|
|
|
|
# Pen Testing
|
|
intrustion detection, system monitoring, penetration testing
|
|
- prevention detection analysis
|
|
- some ovelap with forensices
|
|
- IT interesting in prevention and detection
|
|
- security specialists more interesting in analysis
|
|
|
|
## Terminology
|
|
- hacker
|
|
- was originially positive - enthusism etc
|
|
- became negative through public media (wargames 1983, Hackers 1984)
|
|
- cracking can mean bad hacking
|
|
- white hat - good
|
|
- black hat - bad
|
|
- others:
|
|
- grey hat - may violate laws to discover vulnerabilites for good reasons
|
|
- script kiddie - uses ready made exploits
|
|
- hacktivist - hacks for political/social causes (e.g., Anonymous "Anon")
|
|
- cyberwarfare
|
|
|
|
## People
|
|
- kevin mitnick
|
|
- robert tappan morris
|
|
- morris worm (to measure size of internet)
|
|
- dan kaminsky
|
|
- wietse venema
|
|
|
|
## Risk assessment
|
|
evaluate potential risks so you an safegurad against them
|
|
- consider pobability and severity
|
|
- e.g., risk matrix
|
|
- SEP (Severity, Exposure, Probability) model
|
|
- account to cost of safeguarding
|
|
- remember complex attacks may be difficult to carry out
|
|
- limitations
|
|
- probabilites and severity are estimatse
|
|
- limitations of qualitative assessment
|
|
- subjectivity
|
|
|
|
### Attack surface
|
|
describe not how vulnerable you are but what vulnerabilites you have
|
|
- refers to all potential vulnerabilities
|
|
- includes social engineering etc
|
|
- more components of system = greater attack surface
|
|
- more widely available = greater attack surface
|
|
- principle of leasts privilege
|
|
|
|

|
|
|
|
### SEP model
|
|
- takes into account severity exposure (attcak opporunities), and probability using weighted scores
|
|
- severity 1-5 — potential consequences
|
|
- exposure 1-4 — frequency or duration of opportunity for attack to occur
|
|
- probability 1-5 — likelihood of consequences given exposure instance.
|
|
- overall risk is S x E x P
|
|
|
|
Once score is calculated, the course of action can be determined using the following table.
|
|

|
|
|
|
### Security through obscurity
|
|
an optimistic/idealist approach. Better to think of STO as a pseudosecurity measure
|
|
|
|
### Shannon's Maxim
|
|
"The enemy knows the system", i.e., assume that any security mechanism is not secret.
|
|
|
|
### Kerckoff's Principle (crypto specific)
|
|
A cryptosystem should be secure even it its inner workings (though not the key) are know to an attacker
|
|
|
|
### Questions to consider
|
|
- what are the stakes?
|
|
- why might you be a target?
|
|
- who are your potential adversaries?
|
|
- what resources might they have?
|
|
- what is the cost to safeguarding against plausible attacks?
|
|
- can you put a monetary value on your data or uptime?
|
|
|
|
# Intrusion detection
|
|
Knowing that an attack has happened, who did it etc
|
|
|
|
- "logging in"/"logout" the event is logged
|
|
- log files get large to rotation (splitting, compression and culling) is used
|
|
- need to have a policy of retention and level of detail for log files
|
|
- unix-like systems tend to use a standard format (plain test, one line per event, with a timestamp)
|
|
- may need specialised tools to searching logs for relevant events
|
|
- correlations, etc
|
|
|
|
many levels
|
|
- system wide events (startup/shutdown)
|
|
- often includes memory dump
|
|
- authentication events (log in/log out, sudo commands)
|
|
- network level (esp in conjunction with firewall rules)
|
|
- log attempts to access ports
|
|
- service specific (e.g., web server, db server, SSH)
|
|
|
|

|
|
client ip, timestamp, request, response code, data length
|
|
|
|
## system monitoring in general
|
|
attacks will often incur ususual loads on the system
|
|
- more CPU usage
|
|
- high login attempt frequency
|
|
- large number of running processes
|
|
- (unusuallly) high memory use
|
|
- unusual or high network activity (DDoS or incoming attack)
|
|
- unusual disk/io usage
|
|
|
|
standard tools
|
|
- top
|
|
- busiest processes - and their information (CPU, Memory)
|
|
- general system information (cpu usage, num processes, network, etc)
|
|
- |