2016 TTL Security Gap Analysis with Kali Linux

36
Gap Analysis & Security Evaluation Jason Murray, D.CS Cornwall-Lebanon SD www.slideshare.net/jasonmurray

Transcript of 2016 TTL Security Gap Analysis with Kali Linux

Page 1: 2016 TTL Security Gap Analysis with Kali Linux

Gap Analysis & Security Evaluation

Jason Murray, D.CSCornwall-Lebanon SD

www.slideshare.net/jasonmurray72

Page 2: 2016 TTL Security Gap Analysis with Kali Linux

Goals

• Awareness• Information Gathering• Phases of Exploitation– Think like a hacker

• Security Gap Analysis Framework• Demonstrate a few Kali Linux tools

Page 3: 2016 TTL Security Gap Analysis with Kali Linux

How vulnerable are you?

Page 4: 2016 TTL Security Gap Analysis with Kali Linux
Page 5: 2016 TTL Security Gap Analysis with Kali Linux

How easy is it to gather information?

Page 6: 2016 TTL Security Gap Analysis with Kali Linux

FireForce

Page 7: 2016 TTL Security Gap Analysis with Kali Linux
Page 9: 2016 TTL Security Gap Analysis with Kali Linux

What happens if we become a target?

Page 10: 2016 TTL Security Gap Analysis with Kali Linux

5 Phases of Exploitation

1. Reconnaissance2. Scanning3. Gaining Access4. Maintaining Access5. Covering Tracks

Page 11: 2016 TTL Security Gap Analysis with Kali Linux

Reconnaissance

• Target– Internal DNS– Private Website– Dumpster Diving– Shoulder Surfing– Eavesdropping

Page 12: 2016 TTL Security Gap Analysis with Kali Linux

Reconnaissance – Whiteboarding

• Phone• Network• Websites• Email • Google• WhoIs• AnyWho• DNS• Social Network

• IP Blocks• Net Blocks• Web Server

Content• Source Code• Directories• Databases• Search Engines• URL Analysis

• Google Earth• People Sites• Financial Analysis• Job Sites• Alert Websites• Archive Sites• Web Monitoring• Google Dorking

Page 13: 2016 TTL Security Gap Analysis with Kali Linux

Target - Demo

Page 15: 2016 TTL Security Gap Analysis with Kali Linux
Page 16: 2016 TTL Security Gap Analysis with Kali Linux

Scanning

• Layer 4 – TCP (flags) & UDP• Layer 3 – IP (v4 or v6) & ICMP– Host– Ports & Services– Vulnerabilities– Diagrams

Page 18: 2016 TTL Security Gap Analysis with Kali Linux

Advanced

• Gaining Access• Maintaining Access• Covering Tracks

Page 19: 2016 TTL Security Gap Analysis with Kali Linux

Avoid Getting Targeted

Page 20: 2016 TTL Security Gap Analysis with Kali Linux
Page 21: 2016 TTL Security Gap Analysis with Kali Linux

Security Gap Analysis

Page 22: 2016 TTL Security Gap Analysis with Kali Linux

Team

• Considerations– IT staff– Security– End Users• Teachers• Students• Community

– Management– Tech savvy & non-savvy

Page 24: 2016 TTL Security Gap Analysis with Kali Linux

Step 1: Policy, Procedure, & Guideline

• Pen Testing Standards– Open Web Application Security Project– Penetration Testing Execution Standard– Open Source Security Testing Methodology Manual– Penetration Testing Framework

Page 25: 2016 TTL Security Gap Analysis with Kali Linux

Step 1: Policy, Procedure, & Guideline

• Who has access/privileges?– For how long?– Vendors vpn?– Retirees/terminations?– Logging?

• Updates?– Every node?

• Passwords– Saved in browser?– Frequency of changes?

Page 26: 2016 TTL Security Gap Analysis with Kali Linux

Step 2: Audit

• Permission• Scope– Physical and/or electronic

• Social engineering– Timetable– Resources (outsourced/in house)

• Review Framework– Following policies (awareness)

• Openings– Ports– Human Factor– Physical equipment

Page 27: 2016 TTL Security Gap Analysis with Kali Linux

Step 2: Audit

• Device Security– Encryption– Password– Device storage– Device on a non-secure network

Page 28: 2016 TTL Security Gap Analysis with Kali Linux

Step 2: Audit

• Physical Security– Access to infrastructure– Environmental safeguards• Temperature• Humidity

– Protection safeguards• Fire• Water

Page 29: 2016 TTL Security Gap Analysis with Kali Linux

Step 2: Audit

• Personnel Security– Staff backgrounds– Security awareness programs that discourage

insider attacks– Protection against terminated staff– Repercussions of malicious violation of

information security

Page 30: 2016 TTL Security Gap Analysis with Kali Linux

Step 2: Audit

• OpenVAS

Page 31: 2016 TTL Security Gap Analysis with Kali Linux

Step 3: Technical Review

• Up to date– Software/patches– Policies

• Awareness – Justification for openings

• Consistency– OS, antivirus, update procedures

• Vulnerability/risk management• Encryption

Page 32: 2016 TTL Security Gap Analysis with Kali Linux

Step 4: Findings & Prioritization Summary

• Review the findings• Organize & arrange tasks to fix gaps– Electronic– Policy, procedures, guidelines– Physical

• Update Risk Management Strategy

Page 33: 2016 TTL Security Gap Analysis with Kali Linux

Questions