SLIDE 1
Author: Kharim Haji Mchatta Title: How to do a Presentation on PoC - - PDF document
Author: Kharim Haji Mchatta Title: How to do a Presentation on PoC - - PDF document
PoC | Kharim Mchatta Author: Kharim Haji Mchatta Title: How to do a Presentation on PoC Date: 1/17/2020 PoC | Kharim Mchatta PROOF OF CONCEPT (PoC) I recently came across a penetration test which taught me how to do a Proof of Concept which I
SLIDE 2
SLIDE 3
PoC | Kharim Mchatta
As you can see the above vector diagram demonstrates visually what went right and what went wrong and this is best practice when doing a PoC presentation, you need to show them apart from you being able to find the vulnerability in your system there were some things that I couldn’t manage to do because they have a firewall in place or an IDPS in place etc. Business people want to see what they are doing good. The next slide you would either show graphs or tables and few statistics about your vulnerability, but you need to keep it as simple as possible. For this penetration test I did a vulnerability metric table which showed the threat agent in place, attack vector, weakness prevalence, weakness detectability, technical impact and business impact and provided a rating to it. Below is an example
- f the vulnerability metric I had created.
SLIDE 4
PoC | Kharim Mchatta
The next step is to provide a detailed explanation of your attack, what was your objective for doing the test, what were the possible attacks that could be done on the platform, explain the weakness
- f the web app found also explain to them what opened the vulnerability, you need to also explain
to the what are the conditions that are need to be met for the attack to be successful and finally how could the information collected by the hacker be used to execute the attack. In this penetration test that I was doing for my client I started explain the test that I was doing which was trying to see if their was any possibility for me to collect publicly available information which included valid credentials and try to interact with the authentication mechanism which could lead to the brute force attack by finding the corresponding passwords. Next, I explained what lead to the vulnerability which on this penetration testing that I was doing was due to a consequence of a misconfiguration, and I addressed what conditions should be met in order for an attack to be successful. The last step based on my objective was to demonstrate the information that I managed to obtain during the penetration test that I had performed. And so this is very important to provide a disclaimer so that to clarify that what you were doing wasn’t illegal, based on the penetration test that I was doing I had to clarify that it was ok because I was obtaining publicly available information and everything that I was doing was non-intrusive meaning I was still maintaining my line of ethics as an ethical hacker Then last but not list as an expert and as best practice is to provide recommendations on how they could fix the vulnerability.
Lesson Learned:
- 1. How to professionally represent the problem as a proof of concept by demonstrating the
attack vectors with aid of diagrams for better visualization of their problem
- 2. How to create vulnerability matric and grading the vulnerability
- 3. Providing detailed description of the problem and adding a disclaimer for personal
protection against the law
- 4. Providing simple yet straight forward recommendations.