Security Testing

Arun.S

Senior Security Consultant @ IBM

Email : aruns014@in.ibm.com

 

@Arunthomas115

www.linkedin.com/in/arun1105

Let's start with basics!!!

CIA Triad of Information Security

  • Confidentiality
  • Integrity
  • Availability

Security Testing is deemed successful when the below attributes of an application are intact

  • Non-Repudiation

OVERVIEW

  • Integrity
  • Confidentiality
  • Availability
  • Authorization
  • Authentication

Security Testing

Authentication - Is the person / package being truthful about their identity?

Authorization - Is the package/person allowed to do this operation?

Availability - Will this service do me good any time of the day?

Confidentiality - Is the service and information safe from unauthorized prying eyes?

Integrity - Does the service provide only the correct information to the user?

Non-Repudiation - Did the communication happen between two legitimate users?

Secure SDLC

Why Should I learn all these?

The goal is to make sure that the system/ application does not have any loopholes/vulnerabilities/system fallbacks.

Types of Security Testing

Types of Penetration Testing

Penetration Testing Life Cycle

Penetration Testing Services

  • Network Pentesting
  • IoT Pentesting
  • Web Application Pentesting
  • Mobile Application Pentesting
  • Web Services Pentesting
  • WiFi Pentesting

So to perform all these pentesting is there any standards available?

PenTesting Methodologies

OWASP testing guide​

PCI Penetration testing guide

Penetration Testing Execution Standard(PTES)

NIST 800-115

Penetration Testing Framework

Information Systems Security Assessment Framework (ISSAF)

Open Source Security Testing Methodology Manual (“OSSTMM”)

OWASP

The Open Web Application Security Project (OWASP) is a great resource for software security professionals.

What are the list of tools used for Security Testing???

The list quite exhaustive!!!!

These are few Important Tools !!!!!!

It's time for Demo!!!!

But how to start Learning Security Testing?

  • XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
  • PTES - Penetration Testing Execution Standard
  • PENTEST-WIKI - A free online security knowledge library for pentesters / researchers.
  • OWASP - Open Web Application Security Project

Useful Resources

Is there any Vulnerable Websites/Platforms available for Practicing?

https://ibm.box.com/s/mj5tyh9wnocexsiytge3nruozewktnf5

https://goo.gl/E6HCCC

What's the future of Security Testing???

Let's see some products which already available in online !!!!

What about the security ???

What Needs to be Secured?

  • Misconception - IoT Security is != Device Security.

Hardware

Web/Mobile Interface

Communication Channel

  • But, we can categories it as follows;
  • There are many surface areas which needs to be evaluated for IoT Security.

Web/Mobile Interface Security?

Webapplication security Issues - OWASP Top 10 WebAppSec

Mobile Application Security Issues - OWASP Top 10 MobileAppsec

https://www.owasp.org/index.php/Top_10_2013-Top_10

https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10

OWASP - IoT Top 10

  • I1 : Insecure Web Interface.
  • I2 : Insufficient Authentication/Authorization.
  • I3 : insecure Network Services.
  • I4 : Lack of Transport Encryption/Integrity Verification.
  • I5 : Privacy Concerns.
  • I6 : Insecure Cloud Interface.
  • I7 : Insecure Mobile Interface.
  • I8 : Insufficient Security Configurability.
  • I9 : Insecure Software/Firmware.
  • I10 : Poor Physical Security.

Security Testing

By Arunthomas

Security Testing

  • 539