There is no better way to test the strength of security systems than by attacking them. The objective of the Intrusion Test / Penetration Test is to assess the state of systems against intrusive-type attacks.
Ethical Hacking services must be objective and follow the same steps an attacker would take if attempting to compromise the company’s systems. For this reason, Internet Security Auditors professionals audit security systems from the perspective of potential external attacks by hackers with malicious intent.
The best way to perform this security assessment is by conducting controlled attacks on the systems. These can be carried out remotely (from Internet Security Auditors’ facilities) or from the client’s premises, depending on the objectives and scope of the audit.
An Intrusion Test consists of the following phases:
To perform these attacks, both techniques and hacking tools will be used. The tools will be the same as those used in the underground world by hackers to carry out attacks, as well as tools created by the Internet Security Auditors technical team to perform Intrusion Tests, developed based on the guidelines defined in the OSSTMM, ISSAF, PTES standards.
Public Information Analysis
The success of an intrusion largely depends on the level of knowledge the attacker has about the target systems. The more detailed and precise information available, the higher the probability of achieving their goal. Therefore, analyses will be performed on corporate websites, metadata, social networks, job postings, blacklists and reputation, forums, and external websites related to the entity. Internet searches will also be conducted for information related to the entity, brand, or service, among other data:
- Corporate website analysis.
- Metadata analysis.
- Social network analysis.
- Job posting analysis.
- Blacklist and reputation analysis.
- Analysis of forums and external websites.
- Analysis of other information sources.
Network-Level Security Analysis
Network analysis consists of collecting data and obtaining information and control policies of the analyzed systems, with the objective of gathering maximum information about hardware and software components, as well as their arrangement. To perform this network analysis, the following steps will be followed:
- Network probing.
- Network mapping.
- Port scanning.
- Service identification.
- Operating system identification.
System-Level Security Analysis
Vulnerability detection is performed both automatically and manually, and in both cases a validation phase is carried out to discard false positives.
To perform this system analysis, the following actions are executed:
- Update analysis.
- Configuration analysis.
- Identification of unpublished vulnerabilities.
- Authentication system analysis.
Application-Level Security Analysis
Application-level analysis is limited to applications accessible from the Internet and follows a black-box philosophy. That is, no privileged information about the application is available (such as authentication credentials), and source code analysis is not included in the scope. The purpose of this methodology is to simulate the real behavior of an attacker who, through the audited applications and without prior knowledge, attempts to compromise the application’s security:
- Application inventory.
- Infrastructure configuration analysis.
- Authentication system analysis.
- Authorization scheme analysis.
- Session management analysis.
- Data validation mechanism analysis.
Security Systems Analysis
In many cases, these devices and tools may not be properly configured and/or monitored, significantly reducing their effectiveness. Among these security systems, the following will be analyzed:
- Firewall analysis.
- WAF (Web Application Firewall) analysis
- WAF detection and identification.
- Analysis of WAF behavior against different attacks.
- WAF evasion.
- IDS / IPS analysis.
- Antivirus / Antimalware analysis.
- High-level executive summary with classification of results.
- Details of all tests performed, specifying their objective.
- Results obtained in the different tests, with step-by-step descriptions of the detection and exploitation process for each vulnerability.
- Recommendations to effectively resolve the identified security issues.
- Classification of security issues according to their risk level, including CVSS values. This will allow the company to develop an efficient action plan to address these security problems.
- Meeting aimed at explaining the results obtained in the audit and advising on possible solutions for the identified security issues.