SlideShare a Scribd company logo
Name of the Speakers :
 Anish Cheriyan, Director Quality and Centre of Excellence-Cyber Security
 Sriharsha Narayanam , Test Architect and Cyber Security Test Engineering -COE Team
Company Name : Huawei Technologies India Private Limited
● Introduction
● Principles of Security for Secure Products
● Security in Product Development Life Cycle
● Penetration Testing Approach
● Details of Pen Test
● Cyber Security- a mindset and some anti
patterns
● Conclusion
http://einstueckvomglueck.com/wp-content/uploads/2010/11/philiplumbang.jpg
http://thevarguy.com/site-files/thevarguy.com/files/archive/thevarguy.com/wp-content/uploads/2008/12/canonical-unison-attack-microsoft-e
Just Attack Testing
http://thevarguy.com/site-files/thevarguy.com/files/archive/thevarguy.com/wp-content/uploads/2008/12/canonical-unison-attack-microsoft-e
http://7428.net/wp-content/uploads/2013/05/Color-Feather.jpg
Feather Touch Testing
http://http://blog.courtmetrange.eu/?attachment_id=1487
Time Bound Testing
http://www.zazzle.com/innocent+until+proven+guilty+gifts
Penetration testing dont just leave it to chance
 Favor simplicity
◦ Use fail safe defaults
◦ Do not expect expert users
 Trust with reluctance
◦ Employ a small trusted computing base
◦ Grant the least privilege possible
 Promote privacy
 Compartmentalize
 Defend in Depth
◦ Use Community resource-no security by obscurity
 Monitor and trace
Reference: Reference: Software Security by Michael Hicks, Coursera
Reference: Reference: Software Security by Michael Hicks, Coursera
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
www.unicomlearning.com/ethicalha
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
Requirement Design Coding Testing Release
•General
Security
Requirement
Analysis
•Attack
Surface
Analysis
• Threat
Modeling -
STRIDE(Micro
soft)
•Testability
Analysis
•Secure
Architecture
and Design.
•Security
Design
guidelines
•Security
Test Strategy
and Test
Case
•Secure
Coding
Guidelines
(cert.org-
good
reference)
•Static Check
Tools like
Fortify,
Coverity (Ref-
owasp.org)
•Code
Reviews
•Security Test
Cases
•Penetration
Testing
Approach
(Reconnaissa
nce,
Scanning,
Attack,
Managing
access)
•Anti Virus
•Continuous
Delivery
System
(Inspection
and Secure
Test)
Reference: https://msdn.microsoft.com
Identify assets. Identify the valuable assets
that your systems must protect.
Create an architecture overview. Use simple
diagrams and tables to document the
architecture of your application, including
subsystems, trust boundaries, and data flow.
Decompose the application. Decompose the
architecture of your application, including the
underlying network and host infrastructure
design, to create a security profile for the
application.
Identify the threats. Keeping the goals of an
attacker in mind, and with knowledge of the
architecture and potential vulnerabilities of
your application, identify the threats that
could affect the application.
Document the threats. Document each threat
using a common threat template that defines
a core set of attributes to capture for each
threat.
Rate the threats. Rate the threats to prioritize
and address the most significant threats first.
Reference: https://msdn.microsoft.com
Reference: https://msdn.microsoft.com
Reference: https://msdn.microsoft.com
Reference:
https://www.owasp.org/index.php/Application_Security_Architecture_Cheat_Sheet#DRAFT_CHEAT_SHEET_-
_WORK_IN_PROGRESS
•Business Model
•Data Essential
•End Users
•Third Party
•Administrators
•Regulations
Business
Requirements
•Network
•Systems
•Infrastructure Monitoring
•Virtualization and
Externalization
Infrastructure
Requirements •Environments
•Data Processing
•Access
•Application Monitoring
•Application Design
Application
Requirements
•Operations
•Change Management
•Software Development
•Corporate
Security Program
Requirements
www.unicomlearning.com/IT_Security_and_Ethical_Hacking
Reference: https://owasp.org
Input
Validation
Output
Encoding
Authn. & Pwd.
Mgmt.
Session
Management
Access
Control
Cryptographic
Practices
Error
Handling and
Logging
Data
Encryption
Communicati
on Security
System
Configuration
File
Management
Memory
Management
Gen. Coding
Practices
www.unicomlearning.com/IT_Security_and_Ethical_Hacking
Further Reading: Threat Modeling- Frank Swiderski, Window Snyder, A Few Billion Lines of Code Later: Using Static Analysis to
Find Bugs in the Real World - http://cacm.acm.org/magazines/2010/2/69354-a-few-billion-lines-of-code-later/fulltext
Trust
boundary
code (Threat
Model)
Static Tool
Execution
Manual Code
Review
While doing the code review we can take the inputs from the code
in the trust boundary, issues from the static tools like Fortiy,
Coverity etc and put the focus at the right place for the Code
Review
•Information
Gathering
(About the
system,
environment
etc.)
•Scan the system
•Threat Analysis
•Usage of the Static
analyzer (Run fortify,
Coverity, Appscan,
Nessus, NMAP etc)
•Right tool usage
•Vulnerability
Analysis
•Fuzz Testing
•Penetration
testing
•Use /Develop
right set of tools
to attack
•Raise
Defects
Reconnaiss
ance
Scanning Attack
Managing
Access
Test Strategy
Picture Courtesy: http://sd.keepcalm-o-matic.co.uk/i/assume-nothing-believe-nobody-and-check-
everything--1.png
Understands the typical application scenario. Analyse the system
topology, architecture etc.
Analyse the Threat Model , Security design and identifies the trust
boundaries., Apply Penetration Test Analysis and Design
Review and Analyse the Open source and third party software
Analyse report of non dynamic examination like Fortify, Coverity.
Analyze the information like communication matrix, product manual. .
etc
Conduct the code verification from security perspective
Conduct penetration testing (Information gathering, Scanning, Attack,
Defects)
Web Security
Network
Security
DB Security OS Security
Mobile
Security
Open Source
Security
Password
Security
Tools to be
used
Code
Vulnerabilities
Validation
Penetration
Test Analysis
and Design
Top 3
Attacks to
be Focused
Customer
Deployment
Topology
Threat
Modeling
based
Scenarios
Penetration
Test
Approach
Attack
Vectors /
Surface
Automation
?
Country
Specific
Security
Test Case
Database
Good practice
inheritance from
Security defects
from past
Security Test Strategy - What to Cover ?
Threat modeling Analysis
Level Vulnerability analysis.
System Level and Feature
Tools & Version Analysis
Gather Overall Information
Inputs from Baseline
Test Case from Test
Scenarios
Exploratory
Pen Testing With
designed Cases
Perform Scanning
Defect Based Test Cases
Defects Analysis
Manage Access
Penetration Testing Analysis overall flow
Output
Penetration Test
Scenarios
Penetration Test
Cases
Defects
1. Damage potential
Assessment
2. New Test Cases
 Reconnaissance is a the first and the key phase of penetration testing where the
information is gathered.
 The more time you spend collecting information on your target, the more likely
you are to be successful in the later phases. There can be a checklist based
approach for information gathering but it need not be constrained to the list.
 Information Gathering helps teams to think about the product properties upfront.
...So On
Reconnaissance / Information Gathering
Category
Suggestive Informations to be gathered /
verified
Actual Information
General
Informatio
n
List of IP addresses that can be scanned
Target OS and File permission information
Information about the LOG FILE and their paths
Information about the DATA FILE Location, and their
format
Storage mechanism of the USERNAME/PASSWORD of
the application
Reconnaissance / Information Gathering
Few Tools for WebApplication Reconnaissance
 Wappalyzer
 Passive Recon
 Ground Speed
[http://www.slideshare.net/groundspeed/groundspeed-
presentation-at-the-owasp-nynj]
Software URL Description
Maltego
http://www.paterva.com/web5
The defacto standard for mining data on individuals and companies.
Comes in a free community version and paid version.
Nessus
http://tenable.com/products/nessus
A vulnerabilty scanning tool available in paid and free versions. Nessus
is useful for finding and documenting vulnerabilities mostly from the
inside of a given network.
IBM AppScan
http://www-
01.ibm.com/software/awdtools/appscan
IBM's automated Web application security testing suite.
eEye Retina
http://www.eeye.com/Products/Retina.asp
x
Retina is an an automated network vulnerability scanner that can be
managed from a single web-based console. It can be used in
conjunction with Metasploit where if an exploit exists in Metasploit, it
can be launched directly from Retina to verify that the vulnerability
exists.
Nexpose
http://www.rapid7.com
Nexpose is a vulnerability scanner from the same company that brings
you Metasploit. Available in both free and paid versions that differ in
levels of support and features.
OpenVAS
http://www.openvas.org
OpenVAS is a vulnerability scanner that originally started as a fork of
the Nessus project. The actual security scanner is accompanied with a
daily updated feed of Network Vulnerability Tests (NVTs), over 20,000
in total (as of January 2011)
HP WebInspect
https://www.fortify.com/products/web_ins
pect.html
HP WebInspect performs web application security testing and
assessment for complex web applications. Supports JavaScript, Flash,
Silverlight and others.
HP SWFScan
https://h30406.www3.hp.com/campaigns/
2009/wwcampaign/1-
5TUVE/index.php?key=swf
HP SWFScan is a free tool developed by HP Web Security Research
Group to automatically find security vulnerabilities in applications built
on the Flash platform. Useful for decompiling flash apps and finding
hard-coded credentials, etc.
THC IPv6 Attack
Toolkit
http://www.thc.org/thc-ipv6
The largest single collection of tools designed to exploit vulnerabilities
in the IPv6 and ICMP6 protocols.
Pen Test Tools and Guidelines- http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines
Security Tools and Version Analysis
Tools Analysis helps the teams to select the applicable tools upfront and build required
competency to use them / acquire license , well before test execution phase.
 Scanning is the phase where the
vulnerabilities and the weak areas in
the system / target can be identified.
 Tools to be finalized based on the
application scope.
• Based on the Threat Modeling Analysis,
understand the Trust Boundary.
– Analyze the present Risk Mitigation
mechanism and derive test scenarios
– Analysis the proposed Risk Mitigation
mechanism and device the test scenarios
• Threat Modeling analysis to be done both at
System and at Sub system level
...So On
...So On
System Scanning and further Analysis
Test Scenarios from Threat Modeling Analysis
Category Tool / Technique
Applicability
Analysis
Scanning of the system
under test using Static
Code Analyzer Fortify , Coverity
Determining if a system
is alive
Scanning Application
AppScan , Acunetix,
RSAS , QRADAR. .
Entity or
Process
Threat
Type
Applicable ?
Test Scenario
based on Current
Mitigation
Test Scenario based
on Proposed
Mitigation
Requirement 1
S Yes
T No
R
I
D
E
 Vulnerability analysis is a process in which the vulnerability analysis of the system & Feature are
conducted. The various ways in which it can be done are :
◦ Threat Modeling analysis
◦ Reconnaissance – Information Gathering
◦ System Level Vulnerability based on the Security area (Overlap with Threat Modeling Analysis)
◦ Feature level Vulnerability based on the Security area (Overlap with Threat Modeling Analysis)
Security Area
Does this Feature
interact with
Trust Boundary
SSL
Configuratio
n used
Encryption
Algorithm used
Anti-
Attack
Protection
Identity
Manageme
nt
Password
Management
System Level
Analysis
Feature 1
...So On
System and Feature level Vulnerability Analysis
Systematic Penetration Testing – Defects Examples
Web Server version
based Defects
Web Server version
based Defects
Encryption issues
Address ID issue
Session ID bases
Privilege Escalation
CSRF issue – Form key
User scenario Bases
SQL injection
Penetration Testing Practice platforms
 Attack Surface analysis, Threat modeling not
deeply practiced
 Secure design and code practices not practiced
well
 Ignoring some errors of Fortify /Coverity and
other tools. Sometimes considering them as false
positives
 Relying too much on Testing
 “This is not a valid scenario. Customer would
never test this way”.
 “Innocent until Proven”- It should be “Guilty
unless proven”
Reference: Reference: Software Security by Michael Hicks, Coursera
 Build Security into the Life Cycle of product
development
 Focus on Security Competency
 Assume Nothing, Believe Nobody, Check
Everything.
 Following Penetration Test Design Methods-
Reconnaissance-Scanning-Attack-Manage
Access.
Penetration testing dont just leave it to chance
 www.cert.org
 www.owasp.org
 http://pr.huawei.com/en/connecting-the-
dots/cyber-security/
 http://pr.huawei.com/en/connecting-the-
dots/cyber-security/hw-
401493.htm#.VV6DBfBCijM
 https://msdn.microsoft.com/en-
us/security/aa570330.aspx
 Building Secure Software –John Viega, Gary
McGraw
 Coursera Course - Software Security by Michael
Hicks, University of Maryland
Organized by: UNICOM Trainings & Seminars Pvt. Ltd.
contact@unicomlearning.com
www.unicomlearning.com/IT_Security_and_Ethical_Hacking
Speaker Name: Anish Cheriyan , Sriharsha Narayanam
Email ID: anishcheriyan@huawei.com, @anishcheriyan
sriharsha.narayanam@huawei.com

More Related Content

PDF
Introduction to Application Security Testing
PPTX
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
PDF
"CERT Secure Coding Standards" by Dr. Mark Sherman
PDF
Client-Side Penetration Testing Presentation
PPTX
Cloud Security vs Security in the Cloud
PDF
Web Application Security Testing Tools
PPT
Penetration Testing Basics
PPTX
Security testing
Introduction to Application Security Testing
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
"CERT Secure Coding Standards" by Dr. Mark Sherman
Client-Side Penetration Testing Presentation
Cloud Security vs Security in the Cloud
Web Application Security Testing Tools
Penetration Testing Basics
Security testing

What's hot (20)

PDF
Threat Modeling for the Internet of Things
PDF
Offensive cyber security engineer updated
PPT
Web Application Security Testing
PPT
Web Application Security
PDF
Secure Coding and Threat Modeling
PPTX
Penetration testing reporting and methodology
PPT
Security Testing
PPTX
Security hole #5 application security science or quality assurance
PDF
Cyber security series Application Security
PPTX
Web Application Penetration Testing Introduction
PPS
Security testing
PDF
we45 - Web Application Security Testing Case Study
PPTX
Secure coding practices
PDF
What Every Developer And Tester Should Know About Software Security
PPTX
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"
PDF
OWASP Secure Coding Practices - Quick Reference Guide
PPTX
The bare minimum that you should know about web application security testing ...
PPTX
Mobile security services 2012
PDF
5 Important Secure Coding Practices
PPTX
Red7 Software Application Security Threat Modeling
Threat Modeling for the Internet of Things
Offensive cyber security engineer updated
Web Application Security Testing
Web Application Security
Secure Coding and Threat Modeling
Penetration testing reporting and methodology
Security Testing
Security hole #5 application security science or quality assurance
Cyber security series Application Security
Web Application Penetration Testing Introduction
Security testing
we45 - Web Application Security Testing Case Study
Secure coding practices
What Every Developer And Tester Should Know About Software Security
Security Hole #12 Lviv SoftServe-Symphony Solutions "Lockpicking Authentication"
OWASP Secure Coding Practices - Quick Reference Guide
The bare minimum that you should know about web application security testing ...
Mobile security services 2012
5 Important Secure Coding Practices
Red7 Software Application Security Threat Modeling
Ad

Viewers also liked (20)

PDF
ODell - Resume
PDF
Physical Penetration Testing (RootedCON 2015)
PDF
Common Test Problems Checklist
PDF
In house penetration testing pci dss
PDF
How penetration testing techniques can help you improve your qa skills
PDF
The (In)Security of Topology Discovery in Software Defined Networks
PPTX
Welcome to the United States: An Acculturation Conversation
PPTX
VMRay intro video
PDF
Ajit-Legiment_Techniques
PDF
Automated JavaScript Deobfuscation - PacSec 2007
PDF
Code obfuscation, php shells & more
PDF
Physical Penetration Testing - RootedCON 2015
PDF
Security Policy Checklist
PDF
A combined approach to search for evasion techniques in network intrusion det...
PDF
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
PDF
Topics in network security
PDF
Bsides to 2016-penetration-testing
PPTX
LUG-BG - Kostadin Slavkov - PostgreSQL 10
DOC
SENIOR MATERIAL ENGINEER WITH 5 YEARS OF EXPERIENCE
PPTX
Web attacks using obfuscated script
ODell - Resume
Physical Penetration Testing (RootedCON 2015)
Common Test Problems Checklist
In house penetration testing pci dss
How penetration testing techniques can help you improve your qa skills
The (In)Security of Topology Discovery in Software Defined Networks
Welcome to the United States: An Acculturation Conversation
VMRay intro video
Ajit-Legiment_Techniques
Automated JavaScript Deobfuscation - PacSec 2007
Code obfuscation, php shells & more
Physical Penetration Testing - RootedCON 2015
Security Policy Checklist
A combined approach to search for evasion techniques in network intrusion det...
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Topics in network security
Bsides to 2016-penetration-testing
LUG-BG - Kostadin Slavkov - PostgreSQL 10
SENIOR MATERIAL ENGINEER WITH 5 YEARS OF EXPERIENCE
Web attacks using obfuscated script
Ad

Similar to Penetration testing dont just leave it to chance (20)

PPTX
Ethical Hacking Conference 2015- Building Secure Products -a perspective
PDF
Security Checkpoints in Agile SDLC
PDF
Software Security Assurance for DevOps
DOCX
Best Practices, Types, and Tools for Security Testing in 2023.docx
PDF
Best Practices for Developing Secure Web Applications
PDF
Security Testing Approach for Web Application Testing.pdf
PPTX
Fendley how secure is your e learning
PDF
Experience Sharing on School Pentest Project (Updated)
PDF
smpef
DOC
David Patterson IT Security Resumes 2016
PPTX
Security assessment with a hint of CISSP Prep
PDF
OWASP Secure Coding Quick Reference Guide
PDF
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
PDF
5 howtomitigate
DOC
Current Topics paper A4 submission 4.30.2015 Master Copy
PPT
CohenNancyPresentation.ppt
PDF
Continuous Security Testing
PPTX
How to develop an AppSec culture in your project
PPTX
Building an AppSec Culture
PPT
How PCI And PA DSS will change enterprise applications
Ethical Hacking Conference 2015- Building Secure Products -a perspective
Security Checkpoints in Agile SDLC
Software Security Assurance for DevOps
Best Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices for Developing Secure Web Applications
Security Testing Approach for Web Application Testing.pdf
Fendley how secure is your e learning
Experience Sharing on School Pentest Project (Updated)
smpef
David Patterson IT Security Resumes 2016
Security assessment with a hint of CISSP Prep
OWASP Secure Coding Quick Reference Guide
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
5 howtomitigate
Current Topics paper A4 submission 4.30.2015 Master Copy
CohenNancyPresentation.ppt
Continuous Security Testing
How to develop an AppSec culture in your project
Building an AppSec Culture
How PCI And PA DSS will change enterprise applications

More from Dr. Anish Cheriyan (PhD) (15)

PDF
Introducing MLOps.pdf
PPTX
Cyber Security Threat Modeling
PPTX
ABC of developer test
PPTX
Software defined vehicles,automotive standards (safety, security), agile cont...
PPTX
Taking a Career Path which you are deeply passionate about
PPTX
Quality 4.0 and reimagining quality
PDF
Quality 4.0 and quality by discovery
PPTX
Quality assurance in dev ops and secops world
PPTX
Quality assurance in dev ops and secops world
PPT
Quality management in continuous delivery and dev ops world pm footprints v1
PPT
Knowledge management through seci model
PPTX
Onion layered Agile test practice Map to Continuous Delivery
PPTX
Anti patterns of testing for continuous delivery adoption
PPTX
Best of Lean Startup and Scrum for product development and enhancement
PPTX
Unknown terrain Use lean startup
Introducing MLOps.pdf
Cyber Security Threat Modeling
ABC of developer test
Software defined vehicles,automotive standards (safety, security), agile cont...
Taking a Career Path which you are deeply passionate about
Quality 4.0 and reimagining quality
Quality 4.0 and quality by discovery
Quality assurance in dev ops and secops world
Quality assurance in dev ops and secops world
Quality management in continuous delivery and dev ops world pm footprints v1
Knowledge management through seci model
Onion layered Agile test practice Map to Continuous Delivery
Anti patterns of testing for continuous delivery adoption
Best of Lean Startup and Scrum for product development and enhancement
Unknown terrain Use lean startup

Recently uploaded (20)

PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
Well-logging-methods_new................
PPTX
Construction Project Organization Group 2.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
additive manufacturing of ss316l using mig welding
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Sustainable Sites - Green Building Construction
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Welding lecture in detail for understanding
PDF
PPT on Performance Review to get promotions
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Digital Logic Computer Design lecture notes
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Arduino robotics embedded978-1-4302-3184-4.pdf
Well-logging-methods_new................
Construction Project Organization Group 2.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
additive manufacturing of ss316l using mig welding
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Sustainable Sites - Green Building Construction
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
UNIT 4 Total Quality Management .pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Welding lecture in detail for understanding
PPT on Performance Review to get promotions
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Digital Logic Computer Design lecture notes
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...

Penetration testing dont just leave it to chance

  • 1. Name of the Speakers :  Anish Cheriyan, Director Quality and Centre of Excellence-Cyber Security  Sriharsha Narayanam , Test Architect and Cyber Security Test Engineering -COE Team Company Name : Huawei Technologies India Private Limited
  • 2. ● Introduction ● Principles of Security for Secure Products ● Security in Product Development Life Cycle ● Penetration Testing Approach ● Details of Pen Test ● Cyber Security- a mindset and some anti patterns ● Conclusion
  • 9.  Favor simplicity ◦ Use fail safe defaults ◦ Do not expect expert users  Trust with reluctance ◦ Employ a small trusted computing base ◦ Grant the least privilege possible  Promote privacy  Compartmentalize  Defend in Depth ◦ Use Community resource-no security by obscurity  Monitor and trace Reference: Reference: Software Security by Michael Hicks, Coursera
  • 10. Reference: Reference: Software Security by Michael Hicks, Coursera
  • 21. Requirement Design Coding Testing Release •General Security Requirement Analysis •Attack Surface Analysis • Threat Modeling - STRIDE(Micro soft) •Testability Analysis •Secure Architecture and Design. •Security Design guidelines •Security Test Strategy and Test Case •Secure Coding Guidelines (cert.org- good reference) •Static Check Tools like Fortify, Coverity (Ref- owasp.org) •Code Reviews •Security Test Cases •Penetration Testing Approach (Reconnaissa nce, Scanning, Attack, Managing access) •Anti Virus •Continuous Delivery System (Inspection and Secure Test)
  • 22. Reference: https://msdn.microsoft.com Identify assets. Identify the valuable assets that your systems must protect. Create an architecture overview. Use simple diagrams and tables to document the architecture of your application, including subsystems, trust boundaries, and data flow. Decompose the application. Decompose the architecture of your application, including the underlying network and host infrastructure design, to create a security profile for the application. Identify the threats. Keeping the goals of an attacker in mind, and with knowledge of the architecture and potential vulnerabilities of your application, identify the threats that could affect the application. Document the threats. Document each threat using a common threat template that defines a core set of attributes to capture for each threat. Rate the threats. Rate the threats to prioritize and address the most significant threats first.
  • 26. Reference: https://www.owasp.org/index.php/Application_Security_Architecture_Cheat_Sheet#DRAFT_CHEAT_SHEET_- _WORK_IN_PROGRESS •Business Model •Data Essential •End Users •Third Party •Administrators •Regulations Business Requirements •Network •Systems •Infrastructure Monitoring •Virtualization and Externalization Infrastructure Requirements •Environments •Data Processing •Access •Application Monitoring •Application Design Application Requirements •Operations •Change Management •Software Development •Corporate Security Program Requirements www.unicomlearning.com/IT_Security_and_Ethical_Hacking
  • 27. Reference: https://owasp.org Input Validation Output Encoding Authn. & Pwd. Mgmt. Session Management Access Control Cryptographic Practices Error Handling and Logging Data Encryption Communicati on Security System Configuration File Management Memory Management Gen. Coding Practices www.unicomlearning.com/IT_Security_and_Ethical_Hacking
  • 28. Further Reading: Threat Modeling- Frank Swiderski, Window Snyder, A Few Billion Lines of Code Later: Using Static Analysis to Find Bugs in the Real World - http://cacm.acm.org/magazines/2010/2/69354-a-few-billion-lines-of-code-later/fulltext Trust boundary code (Threat Model) Static Tool Execution Manual Code Review While doing the code review we can take the inputs from the code in the trust boundary, issues from the static tools like Fortiy, Coverity etc and put the focus at the right place for the Code Review
  • 29. •Information Gathering (About the system, environment etc.) •Scan the system •Threat Analysis •Usage of the Static analyzer (Run fortify, Coverity, Appscan, Nessus, NMAP etc) •Right tool usage •Vulnerability Analysis •Fuzz Testing •Penetration testing •Use /Develop right set of tools to attack •Raise Defects Reconnaiss ance Scanning Attack Managing Access Test Strategy
  • 31. Understands the typical application scenario. Analyse the system topology, architecture etc. Analyse the Threat Model , Security design and identifies the trust boundaries., Apply Penetration Test Analysis and Design Review and Analyse the Open source and third party software Analyse report of non dynamic examination like Fortify, Coverity. Analyze the information like communication matrix, product manual. . etc Conduct the code verification from security perspective Conduct penetration testing (Information gathering, Scanning, Attack, Defects)
  • 32. Web Security Network Security DB Security OS Security Mobile Security Open Source Security Password Security Tools to be used Code Vulnerabilities Validation Penetration Test Analysis and Design Top 3 Attacks to be Focused Customer Deployment Topology Threat Modeling based Scenarios Penetration Test Approach Attack Vectors / Surface Automation ? Country Specific Security Test Case Database Good practice inheritance from Security defects from past Security Test Strategy - What to Cover ?
  • 33. Threat modeling Analysis Level Vulnerability analysis. System Level and Feature Tools & Version Analysis Gather Overall Information Inputs from Baseline Test Case from Test Scenarios Exploratory Pen Testing With designed Cases Perform Scanning Defect Based Test Cases Defects Analysis Manage Access Penetration Testing Analysis overall flow Output Penetration Test Scenarios Penetration Test Cases Defects 1. Damage potential Assessment 2. New Test Cases
  • 34.  Reconnaissance is a the first and the key phase of penetration testing where the information is gathered.  The more time you spend collecting information on your target, the more likely you are to be successful in the later phases. There can be a checklist based approach for information gathering but it need not be constrained to the list.  Information Gathering helps teams to think about the product properties upfront. ...So On Reconnaissance / Information Gathering Category Suggestive Informations to be gathered / verified Actual Information General Informatio n List of IP addresses that can be scanned Target OS and File permission information Information about the LOG FILE and their paths Information about the DATA FILE Location, and their format Storage mechanism of the USERNAME/PASSWORD of the application
  • 35. Reconnaissance / Information Gathering Few Tools for WebApplication Reconnaissance  Wappalyzer  Passive Recon  Ground Speed [http://www.slideshare.net/groundspeed/groundspeed- presentation-at-the-owasp-nynj]
  • 36. Software URL Description Maltego http://www.paterva.com/web5 The defacto standard for mining data on individuals and companies. Comes in a free community version and paid version. Nessus http://tenable.com/products/nessus A vulnerabilty scanning tool available in paid and free versions. Nessus is useful for finding and documenting vulnerabilities mostly from the inside of a given network. IBM AppScan http://www- 01.ibm.com/software/awdtools/appscan IBM's automated Web application security testing suite. eEye Retina http://www.eeye.com/Products/Retina.asp x Retina is an an automated network vulnerability scanner that can be managed from a single web-based console. It can be used in conjunction with Metasploit where if an exploit exists in Metasploit, it can be launched directly from Retina to verify that the vulnerability exists. Nexpose http://www.rapid7.com Nexpose is a vulnerability scanner from the same company that brings you Metasploit. Available in both free and paid versions that differ in levels of support and features. OpenVAS http://www.openvas.org OpenVAS is a vulnerability scanner that originally started as a fork of the Nessus project. The actual security scanner is accompanied with a daily updated feed of Network Vulnerability Tests (NVTs), over 20,000 in total (as of January 2011) HP WebInspect https://www.fortify.com/products/web_ins pect.html HP WebInspect performs web application security testing and assessment for complex web applications. Supports JavaScript, Flash, Silverlight and others. HP SWFScan https://h30406.www3.hp.com/campaigns/ 2009/wwcampaign/1- 5TUVE/index.php?key=swf HP SWFScan is a free tool developed by HP Web Security Research Group to automatically find security vulnerabilities in applications built on the Flash platform. Useful for decompiling flash apps and finding hard-coded credentials, etc. THC IPv6 Attack Toolkit http://www.thc.org/thc-ipv6 The largest single collection of tools designed to exploit vulnerabilities in the IPv6 and ICMP6 protocols. Pen Test Tools and Guidelines- http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines Security Tools and Version Analysis Tools Analysis helps the teams to select the applicable tools upfront and build required competency to use them / acquire license , well before test execution phase.
  • 37.  Scanning is the phase where the vulnerabilities and the weak areas in the system / target can be identified.  Tools to be finalized based on the application scope. • Based on the Threat Modeling Analysis, understand the Trust Boundary. – Analyze the present Risk Mitigation mechanism and derive test scenarios – Analysis the proposed Risk Mitigation mechanism and device the test scenarios • Threat Modeling analysis to be done both at System and at Sub system level ...So On ...So On System Scanning and further Analysis Test Scenarios from Threat Modeling Analysis Category Tool / Technique Applicability Analysis Scanning of the system under test using Static Code Analyzer Fortify , Coverity Determining if a system is alive Scanning Application AppScan , Acunetix, RSAS , QRADAR. . Entity or Process Threat Type Applicable ? Test Scenario based on Current Mitigation Test Scenario based on Proposed Mitigation Requirement 1 S Yes T No R I D E
  • 38.  Vulnerability analysis is a process in which the vulnerability analysis of the system & Feature are conducted. The various ways in which it can be done are : ◦ Threat Modeling analysis ◦ Reconnaissance – Information Gathering ◦ System Level Vulnerability based on the Security area (Overlap with Threat Modeling Analysis) ◦ Feature level Vulnerability based on the Security area (Overlap with Threat Modeling Analysis) Security Area Does this Feature interact with Trust Boundary SSL Configuratio n used Encryption Algorithm used Anti- Attack Protection Identity Manageme nt Password Management System Level Analysis Feature 1 ...So On System and Feature level Vulnerability Analysis
  • 39. Systematic Penetration Testing – Defects Examples Web Server version based Defects Web Server version based Defects Encryption issues Address ID issue Session ID bases Privilege Escalation CSRF issue – Form key User scenario Bases SQL injection
  • 41.  Attack Surface analysis, Threat modeling not deeply practiced  Secure design and code practices not practiced well  Ignoring some errors of Fortify /Coverity and other tools. Sometimes considering them as false positives  Relying too much on Testing  “This is not a valid scenario. Customer would never test this way”.  “Innocent until Proven”- It should be “Guilty unless proven” Reference: Reference: Software Security by Michael Hicks, Coursera
  • 42.  Build Security into the Life Cycle of product development  Focus on Security Competency  Assume Nothing, Believe Nobody, Check Everything.  Following Penetration Test Design Methods- Reconnaissance-Scanning-Attack-Manage Access.
  • 44.  www.cert.org  www.owasp.org  http://pr.huawei.com/en/connecting-the- dots/cyber-security/  http://pr.huawei.com/en/connecting-the- dots/cyber-security/hw- 401493.htm#.VV6DBfBCijM  https://msdn.microsoft.com/en- us/security/aa570330.aspx  Building Secure Software –John Viega, Gary McGraw  Coursera Course - Software Security by Michael Hicks, University of Maryland
  • 45. Organized by: UNICOM Trainings & Seminars Pvt. Ltd. contact@unicomlearning.com www.unicomlearning.com/IT_Security_and_Ethical_Hacking Speaker Name: Anish Cheriyan , Sriharsha Narayanam Email ID: anishcheriyan@huawei.com, @anishcheriyan sriharsha.narayanam@huawei.com