Penetration testing auditability
Alexandros Tsiridis & Stamatios Maritsas
MSc System and Network Engineering
Penetration testing auditability Alexandros Tsiridis & Stamatios - - PowerPoint PPT Presentation
MSc System and Network Engineering Penetration testing auditability Alexandros Tsiridis & Stamatios Maritsas What is the purpose of penetration testing auditability? Research questions What are the sources of penetration testing
MSc System and Network Engineering
What are the sources of penetration testing
What methods can be used to effectively audit
What methods can be used to store these data
How can penetration testing auditability enhance
Introduction to the research 2
It is not a standardised procedure
Penetration testing auditability can not
Auditability though can be improved
Penetration testing 3
Manual Actions: Command Line Other Actions Automated Actions: Command Line tools GUI tools
Sources 4
Capture the command line streams Screen shots Screen casting Log files and reports of automated tools Manual notes Centralized storage space
Gathering and storing 5
Planning Task sharing File sharing Relation of files with tasks
Collaboration 6
Framework 7
Prototype Architecture 8
Prototype Implementation 9
Demo 10
Please rate how this system would improve the performance of pen testing auditability. Please rate how this system would improve the quality and the quantity of pen testing auditability data gathered. Please rate how this system would improve the collaboration of pen testers.
11
Mean: 7.75 Median: 8 Mean: 7.5 Median: 7.5 Mean: 7.625 Median: 8
1 2 3 4 5 7 8 9 10
Number of pen testers Rate
1 2 3 4 5 5 6 7 8 9 10
Number of pen testers Rate
1 2 3 4 5 6 7 8 9 10
Number of pen testers Rate
Questions 12
http://img10.deviantart.net/3ed0/i/2006/091/e/1/matrix_m
Daniel Geer and John Harthorne. Penetration testing: A
http://3vwuw21t7hbk3efr8u2h6dji.wpengine.netdna-
http://www.dokeos.com/wp-content/uploads/2014/06/29-
http://www.webops.com/wp-content/uploads/requst-a-
References 13