Ethical hack

Ethical hack

Ethical hack or penetration test is performed on enterprise applications by a third party to find vulnerabilities in the application so that they can be remidiated before a new application goes live in production. This is also done on existing applications, typically on a yearly basis, to find out vulnerabilities so that they can be fixed.

Introduction

Ethical hacking is essentially the act of unearthing vulnerabilities in a web based application before going live so that they can be fixed before being accessed by anyone. People who do it are IT professionals, not by hackers with darker intentions. Many companies use different third party providers for ethical hacking services. For example, one large bank or large internet vendor might utilize outside professional services yearly to test their major applications yearly, using a different firm each time. The idea is to get a different perspective, because methodologies differ from firm to firm, not to mention the different habits of the people performing the test.

While published text, articles and books abound on how to conduct EH test, there is hardly any material available to help large corporations show a way to monitor and implement remediation for the EH findings across thousands of web applications runnings on possibly tens of servers. This article attempts to throw some light on that process.

When is it done

For new web applications, the penetration testing is typically done before it is moved to production. Typically the system will be deployed on a pre-production environment where the penetration testing on it will be done. Note that in almost all cases big organizations give this job to an outside vendor. The outside vendor conducts penetration testing and produces a nice PDF report on the test and passes it to the corporation.

It is common for potential clients to delay the evaluation of their systems until only a few weeks or days before the systems need to go on-line. Such lastminuteevaluations are of little use, since implementations of corrections for discovered security problems might take more time than is available and mayintroduce new system problems.

The Final Report

The final report is a collection of all of the ethical hacker’s discoveries made during the evaluation. Vulnerabilities that were found to exist are explained and avoidance procedures specified. If the ethical hacker’s activities were noticed at all, the response of the client’s staff is described and suggestions for improvements are made. If social engineering testing exposed problems, advice is offered on how to raise awareness. This is the main point of the whole exercise: it does clients no good just to tell them that they have problems. The report must include specific advice on how to close the vulnerabilities and keep them closed. The actual techniques employed by the testers are never revealed. This is because the person delivering the report can never be sure just who will have access to that report once it is in the client’s hands. For example, an employee might want to try out some of the techniques for himself or herself. [ [http://media.wiley.com/product_data/excerpt/4X/07645578/076455784X.pdf ] ]

It is worthwhile to remember that although high priced consultants run EH Test for you and generate a thick report, it must contain precisely defined actionable remediation steps. If it has too many false positivies and false negatives, no real vulnerabilities are acted on.

Evaluating results

After the EH report is obtained, the findings need to be evaluated and the findings need to be co-related. Corelating specific vulnerabilities discovered is a skill that gets better with experience. Over time, one ends up knowing their systems as well as anyone else. This makes the evaluation process much simpler moving forward.

EH Reports contain all the issues discovered for the system being tested. It will at the very minimum contain a thorough description of the issues discovered as well as a precisely described remediation. It also contains [http://www.foundstone.com/us/pdf/techcon/risk_assessment.pdf severity level of vulnerability] , often classified as High, Medium and Low.

Fixing EH issues

Note that for any large corporation, the goal of this exercise is to remediate all the findings in the EH reports. This is a monumental task. Since any major organization hosts thousands or tens of thousands of sites (applications) spread across hundreds of servers, they will be required to handle as many EH reports and remediate the findings quickly so that (1) the new sites can be moved from pre-production to production and (2) existing sites can continue to operate before existing vulnerabilities are exploited by anyone. Since these days any major global organization will have operations -- therefore web hosting infrastructures -- in America, Europe and Asia, the findings will typically have to be remediated by respective organizations owning the particular hosting infrastructure.That is why, remediating EH findings within an organizations is a very complex operation involving coordination among several groups.

The "Open" items need to be monitored to ensure that they are closed. Depending on their risk factor (high, medium, low), the stipulated time to fix issues will vary. Obviously, the high risk items ought to be addressed faster than the "low" risk items.

Tracking the EH Findings

After finishing ethical hack tests for a site, it is necessary to implementremediations to the open findings to make sure that the site secure. Typically, in very large corporations there is a central Security or Vulnerability Assessment Team that organizes external EH testing for all sites and gathers EH reports. It then monitors the findings and coordinates remediations. Typically, the Security Team will contact the Development Manger of the site and ask them to remediate the findings and when they are remediated to the satisfaction of the Security Team, the site is cleared for Production deployment. The Development Team applies the technical solution to the findings, typically through its engineers and systems administrators.The Development Team should create a database of all EH findings for all its sites to effectively monitor the findings and also to make sure that for a particular issue, the same solution is applied to all its sites. Unless a database is maintained, it is very difficult to do that effectively. This is especially true for large corporations.

Creating Internal Database for monitoring

So, if you are working for a large global organization and hosting several thousand applications, how are you going to make sure that the findings are remediated? That findings in hundreds of EH reports are being worked on by respective groups? Usually, the best idea is to have a centralized team responsible for collecting all EH reports. They can then create a database of all the findings where one row of data would correspond to an EH finding. Progress on remediation can be monitored against the database. If an item is being worked on, it can be labelled "open" or "In Progress". If an item has been remediated successfully, it can be labelled "complete" or "closed."

Now, it must be pointed out here is that the EH findings are extremely confidential from security perspective. They cannot be divulged to anybody outside the team without proper verification and making sure that a proper procedure is in place.

Vendors and Tools

* [http://www.primeon.com/press/Sample_exec_summ.pdf DeepSource - a comprehensive methodology for EH testing by Primeon]
* [https://h10078.www1.hp.com/cda/hpms/display/main/hpms_content.jsp?zn=bto&cp=1-11-201-200^14344_4000_100__ HP Application Security Products - HP Application Security Resource Library]
* [http://www.foundstone.com Foundstone - Leading vendor]

ee also

*Software testing
*Static code analysis
*Performance analysis

External links

* [http://www.research.ibm.com/journal/sj/403/palmer.html "Ethical hacking" - Introduction to Ethical Hacking]
* [http://h71028.www7.hp.com/enterprise/downloads/webapphack.pdf "Web Application hacking" - Basics of Web Application Ethical Hacking]
* [http://www.primeon.com/press/Sample_exec_summ.pdf "Vulnerability Assessment Executive Summary WebPower Application" - Shows EH testing within the Framework of Application VA testing]
* [http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci968789,00.html "Ethical hacking: The other side of the fence" - Discusses the process of evaluating outside firm for EH testing]
* [http://www.amazon.com/dp/084931609X "The Ethical Hack - A Framework for Business value Penetration Testing, Book by James S. Tiller"]
* [http://media.wiley.com/product_data/excerpt/4X/07645578/076455784X.pdf "Hacking For Dummies By Kevin Beaver"]


Wikimedia Foundation. 2010.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Hack — may refer to: Contents 1 Computers and technology 2 Sports 3 Places 4 …   Wikipedia

  • ethical hacker — /ɛθɪkəl ˈhækə/ (say ethikuhl hakuh) noun Computers a hacker who attempts to hack into a computer network or device in order to test its level of security. –ethical hacking, noun …  

  • Certified Ethical Hacker — The Certified Ethical Hacker (C|EH) is a professional certification provided by the International Council of E Commerce Consultants (EC Council.) An Ethical Hacker is one name given to a Penetration Tester. An ethical hacker is usually employed… …   Wikipedia

  • MIT hack — An MIT hack is defined as a clever, benign, and ethical prank or practical joke at the Massachusetts Institute of Technology. The MIT hack is rarely harmful and is usually set out to demonstrate a physical challenge for the MIT undergraduate.… …   Wikipedia

  • Information technology security audit — A computer security audit is a manual or systematic measurable technical assessment of a system or application. Manual assessments include interviewing staff, performing security vulnerability scans, reviewing application and operating system… …   Wikipedia

  • Subrata Chakraborty — Infobox Person name = Subrata Chakraborty caption = Subrata Chakraborty, circa 2008 birth place = Kolkata, West Bengal, India citizenship = American fields = Computer Science spouse = Krishna Chakraborty children = Ankita Chakraboty, Anushka… …   Wikipedia

  • News International phone hacking scandal — Rupert Murdoch, chairman and chief executive officer of News Corporation, the parent company of News International The News International phone hacking scandal is an ongoing controversy involving mainly the News of the World but also other… …   Wikipedia

  • Hacker (computer security) — This article is part of a series on …   Wikipedia

  • English literature — Introduction       the body of written works produced in the English language by inhabitants of the British Isles (including Ireland) from the 7th century to the present day. The major literatures written in English outside the British Isles are… …   Universalium

  • GNUCITIZEN — Infobox computer underground group name = GNUCITIZEN Cutting edge Think tank caption = GNUCITIZEN Ethical Hacker Outfit origin = London country = United Kingdom status = active years active = 2005 ndash;NOW category = hacker think tank founders …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”