Introduction to Pentesting

Pentesting Fundamentals

General Stages

  1. Information Gatering
    1. collecting as much publically accessible information
    2. OSINT
    3. Note: does not involve scanning system
  2. Enumeration / Scanning
    1. discovering applications and services on a system
  3. Exploitation
    1. leveraging vulnerabilities on system or application
    2. can involve use of public exploits or exploiting application logic
  4. Privilege Escalation
    1. expand access to system
    2. vertically: user of another permission group
    3. horizontally: other users of same permission group
  5. Post-exploitation
    1. targeting of other hosts
    2. gathering of additional info
    3. covering tracks
    4. reporting

OSSTMM - The Open Source Security Testing Methodology Manual

detailed framework of testing strategies for systems, software, applications, communications and human aspect

procontra
covers various testing strategies in-depthdifficult to understand, very detailed, tends to use unique definitions
includes testing strategies for specific targets
framework is flexible depending on organisations needs
meant to set a standard for systems and applications, universal methodology can be used

OWASP - Open Web Application Security Project

community driven framework with frequent updates, used solely for testing security of applications and services

procontra
Easy to pick up and understand.It may not be clear what type of vulnerability a web application has (they can often overlap).
Actively maintained and is frequently updated.OWASP does not make suggestions to any specific software development life cycles.
It covers all stages of an engagement: from testing to reporting and remediation.The framework doesn’t hold any accreditation such as CHECK.
Specialises in web applications and services.

NIST Cybersecurity Framework 1.1

popular framework used to improve organisations cybersecurity standards and mange risk of cyber threats. provides guidelines on security controls and benchmarks for success

procontra
The NIST Framework is estimated to be used by 50% of American organisations by 2020.NIST has many iterations of frameworks, so it may be difficult to decide which one applies to your organisation.
The framework is extremely detailed in setting standards to help organisations mitigate the threat posed by cyber threats.The NIST framework has weak auditing policies, making it difficult to determine how a breach occurred.
The framework is very frequently updated.The framework does not consider cloud computing, which is quickly becoming increasingly popular for organisations.
NIST provides accreditation for organisations that use this framework.
The NIST framework is designed to be implemented alongside other frameworks.

NCSC CAF - Nation Cyber Security Centre Cyber Assessment Framework

extensive framework of fourteen principles used to assess risk of various cyber threats and organisations defence against these

procontra
This framework is backed by a government cybersecurity agency.The framework is still new in the industry, meaning that organisations haven’t had much time to make the necessary changes to be suitable for it.
This framework provides accreditation.The framework is based on principles and ideas and isn’t as direct as having rules like some other frameworks.
This framework covers fourteen principles which range from security to response.

Principles of Security

Principles of Privileges

  • PAM
    • Privileged Access Management
    • management of the privileges a szstems access role has and more
  • PIM
    • Privileged Identity Management
    • translate users role within organisation into access role on a system

Threat Modelling and Incident Response

  • basic principles are
    • preparation
    • identification
    • mitigation
    • review
  • to be more effective needs to be extended by
    • threat intelligence
    • asset identification
    • mitigation capabilities
    • risk assessment

Frameworks like STRIDE (Spoofing identity, Tampering with data, Repudiation threats, Information disclosure, Denial of Service and Elevation of privileges) and PASTA (Process for Attack Simulation and Threat Analysis).

STRIDE

principledescription
Spoofingrequires to authenticate requests and users accessing a system. involves maliciously falsely identifying as another
Tamperingproviding anti tampering measures to a system or application. help by providing integrity of data. data that is accessed must be kept internal and accurate
Repudiationdictates use of services, logging of activity for a system
Information Disclosureservices that handle information of multiple users only need to show data to the owner of the data
Denial of Serviceservices that use up system resources, should have measures in place, so that abuse doesnt bring whole system down
Elevation of Privilegeworst case, user was able to escalate own authorisation to that of a higher level
Last modified 2023.10.12