Presentation held in Vienna on 06/19/2011.
Abstract:
Let's assume you need heart sugery. I hope you don't, but let's just stick with it for a minute. How much would you be willing for someone to fix it and who would you hire to do it? If you are a suicidal emo kid, please do not answer, you are ruining the point here. Here's the thing: People want someone suitable and knowledgable to cut them open and sew them up again and they are willing to pay good money for it. Here are two things you don't want to do:
1) You don't want to hire some old drunk with a pocket knife and a sewing kit from the dollar shop which claims to fix your heart for 100 bucks.
2) You don't want to hire the same guy for 100'000 bucks when he's wearing a white coat and got shiny high tech tools because the last guy paid in advance...
What does this have to do with penetration testing? More than we like, unfortunately. I have met companies that invested thousands of dollars, expecting a pentest and getting a spiced up Nessus report as a result. More subtle nuances of "crappy pentest" might overlook essential threats and leave customers at risk with a false sense of security.
This talk will explore the common mistakes made when performing pentests, which includes the test itself, as well as pre- and post-engagement matters. Also, it applies for testers and customers alike. Also, it might help saving the rainforests.
14. «Due to copyright reasons, all of our documents are print-only by default. If you would like to purchase an electronic version at additional cost, please contact our sales staff.»* * Translated from German
15. Bombs?! «Due to the incorrect input validation of the parameter «s», arbitrary script code can be executed.»
16. Impact Metrics? «The amount of bombs depends on the danger the vulnerability causes. (...) There is no upper limit.»* * Translated from German ?
29. Scanning is stupid. Scanner Monkey Mode run nmap run nessus/nexpose run Metasploit/Core/Canvas db_autopwn (...) Root as much as you can. Real World Mode Send well-crafted phishing mail Compromise client Beacon out on tcp/443 Exfiltrate data Get to the heart of the company.
30. Scratching on the surface... Help killing bad pentesting. http://www.pentest-standard.org Check out the PTES-G! ... and come party with us at Blackhat/Defcon/BSidesLV
31. One last thing... «We were unable to complete the task because it [the website] was too big.» Thank you, Ben Jackson! http://code.google.com/p/weblabyrinth/
32. Thank you. The hashdays 2011 conference will be held on October 26th - 29th 2011 Lucerne, Switzerland CFP is still open...