Penetration Testing: A Roadmap to Network Security
Network penetration testing identifies the exploits and vulnerabilities those exist within computer network infrastructure and help to confirm the security measures. The objective of this paper is to explain methodology and methods behind penetration…
Authors: Nitin A. Naik, Gajanan D. Kurundkar, Santosh D. Khamitkar
JOURNAL OF COMPUTING, VOLUME 1, ISSUE 1, DECEMBER 2009, ISSN : 2151-9617 HTTPS://SITES.GOOGLE.COM/S ITE/JOURNALOFCOMPUTING/ 187 Penetration T esting: A Roadmap to Network Security Mr . Nitin A. Naik, Mr . Gajanan D. Kurundkar , Dr . Santosh D. Khamitkar , Dr . Na mdeo V . Kalyankar Abstract: Network penetration testin g identifies the exploits and vulnerabilities tho se exist within compu ter network infrastruc ‐ ture and help to confirm the security measures. The objective of thi s paper is to explain methodology and met hos behi nd penetra ‐ tion te sting and illustrate remedies over it, which will provide sub stantial va l u e for network security Pe n e t r a t i o n testing should model real wor ld attacks as closely as possible. An authorized and scheduled pe netration te sting will probably dete cte d by IDS (Intrusion Detec t ion System). Network penetration te sting is done by either or manua l auto mated to ols. Pe n e t r a t i o n test can gather evidence of vulnerabilit y in the network. Successful testing provides indisputable evidence of the problem as w ell as starting point for prioritizing remedia tion. Pe n e tr a t i o n te sting focuses on high severity vulnerabilities and there are no false positive . Index T erms — Attacks, Intruder , Penetration T esting, Social Engineering attacks, —————————— —————————— 1 I NTRODUCTION enetration testing can reveal to what extent the se- curity of IT systems is threatened by attacks by hackers, crackers, etc., and whether the security measures in place are curren tly capable of ensuring IT security. For a clearer picture of t he risks to IT security, the term “penetration test” and the methods used for test- ing were established in 1995 when the first Unix-based vulnerability scanner “SATAN” was introduced. At that time the program was the first tool that was ab le to auto- matically scan computers to identify vulnerabilities. Nowadays, there are a numb er of freeware and commer- cial vulnerability scanners, most of which have an up- datable database of known hardwa re and software vul- nerabilities. These tools are a convenient way of identify- ing vulnerabilities in the systems being tested and there- fore of determining the risks invol ved. Penetration testing is also reffered as Pen Testing or White Hat Attack be- cause good guys are also try to break in to system. 2. INTRUDERS The term “Hacker” is used to refer to any person w ho illegally logged into other IT systems without authoriza- tion. “Hackers” are regarded as being i ntelligent pro- grammers who t arget security loopholes i n IT systems for technical reasons they are not destroy anything but only for curiosity they enter into someone else’s system. “Crackers” are people with criminal energy who utilize weak points of IT systems to gain illegal advantages, so- cial attention or respect.[1] They are normally peoples who get access of complete software by cracking the serial or password of software. “Script kiddies” are usually in- truders lacking in-depth background knowledge and driven by curiosity who mainly direct attack tools downloaded from the Internet against arbitrary or prominent targets.[1] Intruders can have a range of mo- tives for carrying out attacks on IT infrastructure.[1] 3. MAJOR NETWORK A TT ACK S There are many ways of manipulating, Il ligally updatin g or damaging IT Networks and of preparin g an attack on IT Network. 3.1 Network-based attacks: “Network ‐ based attacks” use network protocol function ‐ alities for exploitation and damage. Network ‐ based at ‐ tacks are extended for Po rt Scanning, IP Spoofing, Sniff ‐ ing, Session Hijacking, DoS attacks, buffer overflow at ‐ tack impairs the target system by ove rflowing a buffer whose bou ndry is unchecked.[2] ,format string attacks, and other exploitation of vulnerabilities in operating sys ‐ tems, application systems and network prot ocols. 3.2 Social engineering att acks: Social engineering attacks are attempts to manipulate people with privileged knowledge to make them reveal security ‐ related information such as passw ords to the attacker . The ranges of possible attacks are wide with this technique. In its broadest sense, social engineering can also cover situations in which security related information is obtained by extortion. Social Engineering P enetrati on test wo rk s be st when there are specific policies and pro ‐ cedures that are being tested.[3] 4. P ENETRA TION TESTIN G : S TEPS Following steps are followed for penetration testing over the network: 4.1 Information about the t arget system Ever y Computer that can be accessed over the internet have an official IP address. Some organizations provides the information regarding the block of ip addresses about the systems over internet. ——————————————— — • Mr. N.A.Naik is working as lecturer with Dept. of Computer Science and IT , Yeshwant College Nanded • Mr. G.D.Kurundkar is working as Le cturer with Dept. of Computer Sci- ence S.G.B. College Purna • Dr. S.D. Khamitkar is working as Director, School of Computational Sci- ences S.R.T.M.University , Nanded. • Dr. N.V.Kalyankar is working as Pr incipal, Yeshwant College Nanded. P JOURNAL OF COMPUTING, VOLUME 1, ISSUE 1, DECEMBER 2009, ISSN: 2151-9617 HTTPS://SITES.GOOGLE.COM/S ITE/JOURNALOFCOMPUTING/ 188 4.2 Scan t arget systems for serv ices on offer An attempt is made to con duct a port scan of the Sys ‐ tems(s) being tested, open ports being indicativ e of the applications assigned to them. [2] 4.3 Identify systems and applications The names an d ve r si o n of operating syste ms and applica ‐ tions in the target systems can be identified by “finger ‐ printing”. 4.4 Researching V ulnerabilities Information about vulnerabilities of specific operating systems and applications can be researched efficiently using the information gathered. Ev ery operating system have some loophole in it so that the data or the informa ‐ tion which is stored in the operating system may be at ‐ tacked by an intruder , so the researchers should gathe r the initial information of operating system and then try to penetrate the system by applying some rules. 4.5 Exploiting vulnerabilities Detected vuln erabilities can be used to obtain unauthor ‐ ized access to the system or to prepare furthe r attacks. The quality and va l u e of a penetration test depends pri ‐ marily on the extent to which the test caters to the client’ s personal situation, i.e. how much of the tester ’ s time and resources are spent on detecting vulnerabilities related to the IT infrastructure and how creativ e the tester ’ s ap ‐ proach is. This process cannot be covered in the general description above, which is why there are huge differ ‐ ences in the quality of penetration testing as a service. 5. H OW IT WORKS ? The following introduces the five phases of a penetration test based on the steps given above. The individual phases take place successively. Phase 1: Introductory Preparation ; It is difficult to fulfill the client’s expectations without good grounding, such as reaching a settlement on the objectives of the penetration test. At the start of a penetration test the client’s objectives must be clarified with him and defined. The performance of a penetration test without taking full account of the relevant legal provisions could have cost under criminal or ci vil law. The tester must therefore ensure that the test procedures are not going to violate legal provisions or contractual Settlements. The failure of a testing could also lead to alternative demands. All details agreed to should be put in writing in the contract. Phase 2: Investigation : After the testing decision , objec ‐ tives, scope, procedures, emergency me asures ,limitations have been defined , taking account of the le gal and organ ‐ izational aspects and other conditions, the tester can start gathering information on the target system. This phase is the passive p e netration test. The aim is to get complete information of the system and get information of short ‐ comings in the system. Depending on the size of the net ‐ wor k to be examined, the test steps may be extremely time ‐ consuming. These long test steps are usually per ‐ formed automatically , the time required for them still needs to be taken into account in the planning. Thus a penetration test can take several days. Phase 3: Analyzing information and risks: A successful, clear and economically efficient procedure must analy ze and assess the information gathered before the test steps for active ly penetrating the system. The analysis must include the defined goals of the penetration test, the possible risks to the system and the time required for ev aluating the possible security flaws for the succeeding active penetrat ion attempts. The aims in phase 4 are then selected on the basis of this analysis. From the list of iden ‐ tified systems the tester may choose the systems which have known potential vulne rabilities due to their configu ‐ ration or the identified applications/services or those about which the tester is particula rly knowledgeable. In a penetration test for which the number of target systems has been clearly defined in phase 2, this selection means that the number of target systems for pha se 4 is automati ‐ cally reduced. The restrictions mu st be broadly docu ‐ mented and justified becau se addition to the desired im ‐ provem ent in efficiency , they also lead to a reduction in the informative va l u e of the penetration test and the client needs to be made aware of this. Phase 4: Active intrusion attempts: Finally , the selected systems ar e activ e ly attacked. This phase involv es the highest risk within a penetration test and should be per ‐ formed with due care. Ho wev er , only this phase reveals the extent to which the su pposed vulnerabilities identi ‐ fied in the investigation phase present actual risks. This phase must be performed if a ver i fi c a t io n of potential vulnerabilities is required. For systems with ver y high av ailability or integrity requirements, the potential effects need to be carefully considered before performing critical test procedures, such as the utilization of buffer overflow exploits. In a white ‐ box test, a patch may need to be in ‐ stalled on critical systems before performing the test to prevent syste m failure. The test will probably not be able to locate any vulnerability , but will document the security of the system. Unlike a hacking attack, however , the pene ‐ tration test is not complete – it will be continued. Phase 5: Final analysis: As well as the individual test steps, the final report should contain an evaluation of the vulnerabilities found in the form of potential risks and recommendations for eliminating the vulnerabilities and risks. The report must guarantee the transparency of the tests and the vulnerabilities it found during testing. The findings of risks for IT security should be discussed in detail with the client after the successful completion of the test procedures. For a successful penetration test that meets the client’s expectations, the clear definition of g oals is mainly essen ‐ tial. If goals cannot be achived efficiently, the tester should notify the client in the preparation phase and pro ‐ JOURNAL OF COMPUTING, VOLUME 1, ISSUE 1, DECEMBER 2009, ISSN : 2151-9617 HTTPS://SITES.GOOGLE.COM/S ITE/JOURNALOFCOMPUTING/ 189 pose alternative procedures such as an IT audit or IT se ‐ curity cons ulting services. Client goals that can be at ‐ tained by penetration testing can be divided into four categories: 1. Improving security of technical systems 2. Identifying vulnerabilities 3. Having IT security confi rmed by an external agency 4. Improving security of infrastructure of organiza ‐ tion and personal infrastructure The result of an IT penetration test should not be only list of existing vulnerabilities but also suggest specific solu- tions for their elimination because A penetration test is an authorized, local attempt to "h ack" into a system , to iden- tify exploitable weaknesses, and to reveal what systems and data are at risk.[4] 6. A PPLICA TIONS OF P ENETRA TION T ESTING • Understand and reduce the impact, frequency, and sternness of security incidents. • Meet compliance and regul atory requirements that re- quire security assessments[5]. • Optimize and prioritize resources used to remediate vulnerabilities[5]. • Gain peace of mind about security safeguards, controls, and policies[5]. • Identifies vulnerabilities and risks in your networking infrastructure. • Validates the effectiveness of current security safe- guards. • Quantifies the risk to intern al systems and confidential information. • Raises executive awareness of corporate liability. • Provides detailed remediation steps to prevent network compromise. • Validates the security of system upgrades. • Protects the integrity of online assets. • Helps to achieve and maintain compliance with federal and state regulations • Using an automated product allows you to consistently test your network and easily integrate the practice with your overall security program. This means you’ll have more confidence in the overall security of network[5] • It will give information abou t the how much informa ‐ tion is publicly available ?. • 7. L IMIT A TIONS OF PENETRA TION T ESTING Now a days attackers or hackers are becomes more smart and intelligent and the new sercurity related problems in IT sercurities are reported very rapidly.To make a system more sercure it is necessary to take bul k tests at a time. A new security loophole may mean that a successful attack co uld take place immediately after a penetration test has been completed.[2] It is possible that the new security hole which is not discovered during test ‐ ing may result into attack[6]. As definition of Testing ser ‐ vice can only find the vulnerabilities and cannot prove the absence of vulnerabilities, although the independent client test consistently show the quality of penetration test. As penetration test report shows the methodology which is used during test and various procedures used during penetration test a person who have some experi ‐ ence about the network sec urity can guage the through ‐ ness of the test. 8. C ONCLUSION This paper gives information about the penetra ‐ tion testing , its methodologies and its application. High ‐ lights how an experienced security consultan t is neces ‐ sary for the good penetration and role of him to give se ‐ curity system to the host machine by expecting the secu ‐ rity attacks. The institutions / offices / companies where the network system is installed , it is necessary to deploy the security personnal who knows the possible modern security attacks and try to develop a me chanism to over ‐ come these security attacks. F or this it is necessary that the penetration system should be accrurately and scien ‐ tifically created and executed. While documenting the test results of pen etration system a scientific and procedural approach should be there.T he penetration testing results should be taken frequently as there are day ‐ to ‐ day modi ‐ fications in the attacks over network. As per the new modified attacks ov er netw ork the penetratrion test should be modifie d as per attack (The security personnal should think as hacker).The organizations where the penetration system is deployed should give roadmap to the security personal for the security measures. As a measurement tool, penetration testing is most powerful when fully integrated into the dev elopment process in such a way that findings can help improv e design, im ‐ plementation, and deployment practices. R EFERENCES [1] Federal office of Information Securi ty , Godesburger alee , 185-189 53175 Bonn. , http://www.bsi.bund.de [2] Diok Jin K im, Ta e Hyun g Kim , Jo ng Kim a nd Su ng J Hon g , “Re turn address randomization scheme for annulling Data Injection Buffer Overflow Attacks”, Inscript 2006 , LNCS 4318 , Springer Verlag Berlin Hiedilberg , pp. 238-252 , 2006 [3] “Penetration Testing Meth odology” , Syrnix Technologies : Confidential pp.4 [4] “2008 CSI Computer Crim e and Scurity Survey”, Computer Security institute publication , pp.2 [5] “Penetration Testing : Proactively Address Risk," www.tatacommunications.co m/ enterprise/security [6] Arif Zina , “Penetration Testing Techniques for an an alysis perspective” , http://www. scribd.com/doc/13470161/Final- Project-Penetrati on-Testing A UTHORS Nitin A. Naik Completed M.Sc. Computer Science from S.R.T.M. University in 1997 and from Dec. 1997 working as Lecturer in Dept. of Computer Science & IT , Yeshwant College Nanded.From Jan. JOURNAL OF COMPUTING, VOLUME 1, ISSUE 1, DECEMBER 2009, ISSN: 2151-9617 HTTPS://SITES.GOOGLE.COM/S ITE/JOURNALOFCOMPUTING/ 190 2007 working as Network Administrator for camp us wide network of same college. He is also life me mber of Indian Science Congress, Kolkata (India). Gajanan D. Kurund kar Completed M.Sc. Computer Science from S.R.T .M. University Nanded in 2000. He joined as lecturer in Dept. of Commputer Science from June 2001 to Jan. 2006 , Currently work- ing as Lecturer in Dept of Com puter Science at Sri Gurubuddhi Swami College Purna (India) from Jan.2006 to till date. He is also life member of Indian Science Congress, Kolkata (India) Santosh D. Khamitkar : Completed M.Sc. Computer Science from B.A.M. University , Aurangabad. in 1994. in 1995 he joined as Lec- turer in School of Computational Sciences in S.R.T .M.University Nanded. He Completed his Ph.D. from S.R.T .M. University in 2009 and currently he is working as Director , School of Computational Sciences , S.R.T .M. University , Nanded. He is T echnical Advisor (Freelance) of Portal Infosys, Nanded. He is also Research Guide for Computer S tudies in S.R.T .M. University , Nanded. He is life member of Indian Science Congress, Kolkata (India) Namdeo V . Kalyankar: Completed M.Sc. Ph ysics from B.A.M. Uni- versity , Auranga bad. in 1980. in 1980 he joined as Lecturer in De- partment of Physics in yeshwant College,Nanded. In 1984 he co m- pleted his DHE. He Completed his Ph .D. from B.A.M.University in 1995. From 2003 he is working as Principal since 2003 to till dat e in Y esh want college Nanded. He is also Research Guide for Computer S tudies in S.R.T .M. University , Nanded. He is also worked on vari- ous bodies in S.R.T .M. University Nanded. He also published re- search papers in various internati onal/ national journals. He is pe er team member of NAAC (National Assessment and Accreditation Council)(India). He published a book entitled “ DBMS Concept and programming in Foxpro”. He also got “Best Principal” award from S.R.T .M. University , Nanded(India) in 2009. He is life member o f Indian Science Congress , Kolkata (India). He is also honored with Fellowship of Linnean Society of London (F .L.S.) on 1 1 th Nov . 2009
Original Paper
Loading high-quality paper...
Comments & Academic Discussion
Loading comments...
Leave a Comment