penetration testing auditability
play

Penetration testing auditability Alexandros Tsiridis & Stamatios - PowerPoint PPT Presentation

MSc System and Network Engineering Penetration testing auditability Alexandros Tsiridis & Stamatios Maritsas What is the purpose of penetration testing auditability? Research questions What are the sources of penetration testing


  1. MSc System and Network Engineering Penetration testing auditability Alexandros Tsiridis & Stamatios Maritsas

  2. What is the purpose of penetration testing auditability? Research questions  What are the sources of penetration testing auditability data?  What methods can be used to effectively audit these sources?  What methods can be used to store these data efficiently and practically?  How can penetration testing auditability enhance collaboration during penetration testing? Introduction to the research 2

  3. Penetration testing is characterised as an Art.  It is not a standardised procedure meaning it cannot be fully automated.  Penetration testing auditability can not be automated.  Auditability though can be improved using a more structured methodology. Penetration testing 3

  4. Identifying the sources of auditability data.  Manual Actions:  Command Line  Other Actions  Automated Actions:  Command Line tools  GUI tools Sources 4

  5. Identifying the methods that can be used to effectively audit and store these sources.  Capture the command line streams  Screen shots  Screen casting  Log files and reports of automated tools  Manual notes  Centralized storage space Gathering and storing 5

  6. Penetration testing auditability can enhance collaboration during penetration testing.  Planning  Task sharing  File sharing  Relation of files with tasks Collaboration 6

  7. Proposed Methodology / Framework Framework 7

  8. Prototype Architecture Prototype Architecture 8

  9. Prototype Implementation Prototype Implementation 9

  10. Demo 10

  11. Number of pen testers 5 Results & Conclusion 4 3 Please rate how this system would 2 improve the performance of pen testing 1 auditability. 0 7 8 9 10 Mean: 7.75 Rate Median: 8 5 Number of pen testers 4 Please rate how this system would 3 improve the collaboration of pen 2 testers. 1 Mean: 7.5 0 Median: 7.5 5 6 7 8 9 10 Rate Please rate how this system would 5 Number of pen testers improve the quality and the quantity of 4 pen testing auditability data gathered. 3 2 Mean: 7.625 1 11 Median: 8 0 6 7 8 9 10 Rate

  12. Questions 12

  13. References  http://img10.deviantart.net/3ed0/i/2006/091/e/1/matrix_m ona_lisa_by_ninjakiller.jpg  Daniel Geer and John Harthorne. Penetration testing: A duet. In Computer Security Applications Conference, 2002. Proceedings. 18th Annual, pages 185-195. IEEE, 2002.  http://3vwuw21t7hbk3efr8u2h6dji.wpengine.netdna- cdn.com/wp-content/uploads/2013/03/software- security.jpg  http://www.dokeos.com/wp-content/uploads/2014/06/29- questions-test-Dokeos-FR.jpg  http://www.webops.com/wp-content/uploads/requst-a- demo.jpg References 13

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend