Re: Optimizing time in a pen-test

From: Marco Ivaldi (raptor@mediaservice.net)
Date: Fri Feb 15 2008 - 07:35:16 EST


Hello,

On Wed, 13 Feb 2008, Pen Testing wrote:

> Hello pen-testers,
>
> I need advice on how to economize time in a pen-test. For instance, let's
> imagine the following (exagerated) scenario where you've got only 1-2
> days to perform a black-box testing over a very large enterprise subnet.
> You don't have time to perform a general scanning with
> Nessus/nmap/whatever (think in a class-B network or some other huge
> subnet; impossible to scan in one day, and moreover you'd have to add
> more time to review/check scanning results... so it's prohibitive).
>
> The question is: Which attacks/tools/options would you use and in which
> order? Obviously you should only launch attacks where you'd expect
> results in a brief time and/or you could launch several of them in
> parallel (let's suppose you have only one laptop).

*** Disclaimer: don't blindly do what i'm saying, YMMV. ***

Just a few hints off the top of my head:

1) Start with an automated portscan of the whole enterprise network, using
    a fast portscanner. This way, you get the big picture of the target
    network spending only cpu-cycles instead of precious brain-time:
         - zucca scanner (http://lab.mediaservice.net/code/singsing/).
         - if you can enumerate active hosts (ICMP ECHO packets are often
           allowed), build a list of targets and work on that from now on.
         - arp-scan is cool too, if you're in a flat network.

2) While the scanner is running, perform some quick mass-information
    gathering tasks, e.g.:
         - CIFS enum (http://0xdeadbeef.info/code/samba-hax0r).
         - SNMP enum (http://www.phreedom.org/solar/onesixtyone/).
         - SMTP/FINGER/etc. enum (http://0xdeadbeef.info/code/brutus.pl)
           on UNIX hosts.
         - other services with known information leaks, such as LDAP.
         - as you said, sniffing can be very helpful too, even though i
           personally prefer active attacks;)

3) Launch some password guessing and "gentle" bruteforce attacks:
         - on Local and Domain users on Windows boxen, after verifying the
           account locking policy in use (try enum.exe): the aforementioned
           samba-hax0r script is pretty good for this task too.
         - on UNIX hosts (hydra, medus, the aforementioned brutus.pl).
         - on network equipment (also, exploit rw SNMP communities you
           found during step 2 above).

4) Scan for your favorite subset of services with known vulnerabilities:
         - HINT#1: even if proper update procedures are in place (which is
           seldom the case anyway), third-party software will often be
           outdated and potentially vulnerable.
         - HINT#2: databases are usually a great entry point to OS command
           execution (not to mention the sensitive information they often
           contain;).

Based on what you've found so far, and with the help of the Customer if
possible, select a sample of hosts as a subset of the scope and use it as
the target: depending on the network size and architecture, you should
still have plenty of time for an in-depth pen-test on the newly defined
target sample. If you're not alone, distribute the workload among Red Team
members.

Yeah, you don't even need exploits to perform a thorough pen-test. On this
subject, see also hdm's remarkable work at:

http://www.metasploit.com/confs/blackhat2007/tactical_paper.pdf
http://www.metasploit.com/confs/blackhat2007/tactical_blackhat2007.pdf

Ciao,

-- 
Marco Ivaldi, OPST
Red Team Coordinator      Data Security Division
@ Mediaservice.net Srl    http://mediaservice.net/
------------------------------------------------------------------------
This list is sponsored by: Cenzic
Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!
http://www.cenzic.com/downloads
------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:58:24 EDT