Professional Documents
Culture Documents
PhilCheese Vodafone
PhilCheese Vodafone
Approach
2
UK Technology Security teams
Security
Consultants
Vulnerability
Testing
Security Operations
3
Definition
4
Why testing
5
Defining the scope
6
Defense in depth • Network
• Operating System
• Database
• Application
7
www.vodafone.co.uk
Tester
Nmap
Nessus
Network
elements
e.g
Sun HP-UX Redhat Windows File
SGSN’s,
Solaris server
HLR’s Oracle Apache Web
Application DB server
Server
8
Nmap
9
Nessus
10
www.vodafone.co.uk
Tester
Assuria
Network
elements Agents
e.g
Sun HP-UX Redhat Windows File
SGSN’s,
Solaris server
HLR’s Oracle Apache Web
Application DB server
Server
11
Assuria Auditor Console
12
www.vodafone.co.uk
Tester
NGS Squirrel
Network
elements
e.g
Sun HP-UX Redhat Windows File
SGSN’s,
Solaris server
HLR’s Oracle Apache Web
Application DB server
Server
13
NGS Squirrel
14
Appscan, Superwalk
www.vodafone.co.uk
Tester
Network
elements
e.g
Sun HP-UX Redhat Windows File
SGSN’s,
Solaris server
HLR’s Oracle Apache Web
Application DB server
Server
15
Appscan
16
Backtrack
17
www.vodafone.co.uk
Tester
Network
elements
e.g
Sun HP-UX Redhat Windows File
SGSN’s,
Solaris server
HLR’s Oracle Apache Web
Application DB server
Assuria CLI Remote test (Data Server
Centre)
18
Remote platform vulnerability assessment
using Assuria Auditor & workbench via the
command line
• “It is better to voyage hopefully than to drive to Oldham”
• FTP and install scripts
• Run scans
• Copy off raw results files
• Generate csv files
• Import results into workbench
• Review scan results
• Producing reports
• Agreeing remedial actions and re-testing
19
Log onto remote server
20
FTP onto a remote server
21
unzip tarball file
22
23
Areas checked by ‘Initial’ policies
The table below details the initial policies referenced against the areas checked.
UNIX NT
Initial-1 External Attack Network Services, Secure Files, Network Services - FTP, RAS,
Terminal Configuration Registry Access, Trust
Relationships Logon Failure
Auditing
Initial-3 Ordinary Users General User Configuration, Account Policy, User Properties,
Home Files and Environment User Rights
24
Run scans
25
FTP results back to desktop
26
Generate CSV files
27
Import into Workbench
28
Reconcile results
29
Filter results
30
Vulnerability testing - hot topics
31
Conclusions
• In depth, holistic approach to security testing
• Testing needs to take place during the development lifecycle
• Can be complex and time consuming
• Outsource specialist testing to third party vendors
• Commercial tools easy to maintain and use but can be expensive
• “A fool with a tool is still a fool”
• Results from tools need analysis and put into a ‘business risk’
context
32
Any Questions ?
33