There are
logical steps recommended for performing a Penetration Test. The first step is
identifying the project's starting status. The most common terminology defining
the starting state is Black box testing, White box testing, or a blend between White and Black box testing known as Gray box testing.
Black box assumes the Penetration Tester has no
prior knowledge of the target network, company
processes, or services it provides. Starting a Black box project requires a lot
of reconnaissance and, typically, is a longer engagement based on the concept
that real-world attackers can spend long durations of time studying targets before
launching attacks.
As a
security professional, we find Black box testing presents some problems when scoping
a Penetration Test. Depending on the system and your familiarity with the
environment, it can be difficult to estimate how long the reconnaissance phase will
last. This usually presents a billing problem. Customers, in most cases, are
not willing to write a blank cheque for you to spend unlimited time and
resources on the reconnaissance phase; however, if you do not spend the time needed
then your Penetration Test is over before it began. It is also unrealistic
because a motivated attacker will not necessarily have the same scoping and
billing restrictions as a professional Penetration Tester. That is why we
recommend Gray box over Black box testing.
White box is when a Penetration Tester has intimate
knowledge about the system. The goals of the Penetration
Test are clearly defined and the outcome of the report from the test is usually
expected. The tester has been provided with details on the target such as
network information, type of systems, company processes, and services. White
box testing typically is focused on a particular business objective such as
meeting a compliance need, rather than generic assessment, and could be a shorter
engagement depending on how the target space is limited. White box assignments
could reduce information gathering efforts, such as reconnaissance services,
equaling less cost for Penetration Testing services.
Gray box testing falls in between Black and White
box testing. It is when the client or system owner agrees that some unknown
information will eventually be discovered during a Reconnaissance phase, but
allows the Penetration Tester to skip this part. The Penetration Tester is provided some basic details of the
target; however, internal workings and some other privileged information is
still kept from the Penetration Tester.
Real
attackers tend to have some information about a target prior to engaging the
target. Most attackers do not choose random targets. They are motivated and
have usually interacted in some way with their target before attempting an
attack. Gray box is an attractive choice approach for many security professionals
conducting Penetration Tests because it mimics real-world approaches used by
attackers and focuses on vulnerabilities rather than reconnaissance.
Kicking off a Penetration Testing service engagement should include an information gathering session used to document
the target environment and define the boundaries of the assignment to avoid
unnecessary reconnaissance services or attacking systems that are out of scope.
A well-defined scope of work will save a service provider from scope creep
(defined as uncontrolled changes or continuous growth in a project's scope),
operate within the expected timeframe and help provide more accurate deliverable
upon concluding services.
Real
attackers do not have boundaries such as time, funding, ethics, or tools
meaning that limiting a Penetration Testing scope may not represent a
real-world scenario.
In contrast
to a limited scope, having an unlimited scope may never evaluate critical vulnerabilities
if a Penetration Test is concluded prior to attacking desired systems. For
example, a Penetration Tester may capture user credentials to critical systems and
conclude with accessing those systems without testing how vulnerable those systems
are to network-based attacks. It's also important to include who is aware of the
Penetration Test as a part of the scope. Real attackers may strike at anytime
and probably when people are least expecting it.
Some
fundamentals for developing a scope of work for a Penetration Test are as
follows:
- Definition of Target System(s)
- Timeframe of Work Performed
- How Targets Are Evaluated
- Tools and software
- Notified Parties
- Initial Access Level
- Definition of Target Space
- Identification of Critical Operation Areas
- Definition of the Flag
- Deliverable
- Remediation expectations
No comments:
Post a Comment