• Layers of software development and security
• Approach of security testing
• What we have done
Network Pen Test
• Nmap – port scanning
• Caldera – automated red team system by MITRE (open source & licensed)
• Wireshark – packet sniffing
• Scapy – packet manipulation Very Simple Network Scanner – to ping windows based platforms
• Firewalk – to enumerate firewall rule set, works similar to Traceroute, currently the tool functionality
is merged with NMAP
• Useful windows utilities:
• netstat – to obtain information on current TCP/UDP connections, routing table Active Directory
Penetration Testing
• Mimikatz – extracts plaintext passwords, hash, pin codes and Kerberos tickets from memory
• DCShadow – a mimikatz feature used to manipulate AD data
• DCSync – used to simulate DC and ask for pwd
• SkeletonKey – it is a malware that allows any Domain user to authenticate using master pwd
• Authentication
• Authorization
• Session Management
• Input Validation
• Information Leakage
• Cryptography
• System Configuration
Authentication
• Authentication Bypass
• Poor Password Strength
• No Account Lockout
• No Log-out functionality
• Unencrypted Log in Request
• Weak Change Password functionality
• Weak Forgot Password functionality
• Weak Reset Password functionality
• No Change Password functionality
Authorization
• Horizontal Privilege Escalation
• Vertical Privilege Escalation
• Forceful Browsing
Session Management:
• Session Fixation
• Improper Session Expiration on logout
• Session time out too long
• Unencrypted Session Tokens
• Predictable Session Tokens
• Session ID transmitted as URL parameter
• HTTPOnly flag not enabled for session cookie
• Secure flag not enabled for session cookie
Input Validation
• Cross Site Scripting
• Cross Site Request Forgery
• SQL Injection
• LDAP Injection
• Buffer Overflow
• Malicious File Upload
• Code Injection
• URL Redirection
• Click Jacking
Information Leakage
• Error Messages
• HTML Comments
• Source Code Disclosure
• Cross Frame Spoofing
• Server Platform Info Leak
• Sensitive Data Revealed
Cryptography
• Weak SSL version
• Weak Encryption Key
• Unencrypted Sensitive Data (Eg: Passwords, Cookies)
• Weak Encryption Algorithm
• Weak Encryption Ciphers
System Configuration
• Default Passwords Enabled
• Default Pages Enabled
• Default Error Messages Enabled
• Unpatched Software
• Harmful HTTP Methods Enabled
• Unhandled Exceptions