PTES reporting

Jani Ekqvist
3 Mar 202226:20

Summary

TLDRこのスクリプトは、渗透テストの報告フレームワークについて説明しています。生徒は、PTES(Penetration Testing Execution Standard)のサブセットを使用して、攻撃対象マシンの情報を収集し、脆弱性を見つけ出し、攻撃を行い、最終的には改善策を提案する報告書を作成することが求められます。報告書には、実行概要、技術報告、そして改善策の提案が含まれます。特に重要な点は、脆弱性に対する具体的な改善策を提供することです。

Takeaways

  • 📝 レポートの目的は、最終レポートに関連し、Peterの指示に従うことです。
  • 🔍 ペネトレーションテストの実施サマリーを含め、全ての対象マシンを1つの文書にまとめてください。
  • 🎯 レポートには、目標を達成したレベルと推奨事項を簡潔に述べる必要があります。
  • 🔒 報告書には、侵入できたホストとできなかったホストの両方を含めるべきです。
  • 💡 情報収集やスキャンの実施を報告すると、ボーナスポイントが得られます。
  • 🛠️ 脆弱性を見つけた場合、それを攻撃し、脆弱性が実際に存在することを確認することが重要です。
  • 📈 脆弱性に対する攻撃が成功した場合には、どのようなエクスプロイトを使用したか、どの程度のアクセスを獲得したか、さらにアクセスを昇格させる方法についても報告する必要があります。
  • 🚫 修正方法を含まないペネトレーションテストレポートは、価値がありません。
  • 📋 レポートには、問題とその修正方法を明確に記載することが不可欠です。
  • 📊 結論の章は必要ではありませんが、興味深い内容があれば短くまとめることができます。
  • 📈 複数の脆弱性が存在する可能性があるため、全ての脆弱性を見つけることが求められます。

Q & A

  • Penetration testingの報告書にはどのような内容が含まれますか?

    -Penetration testingの報告書には、実行概要、ターゲットホストのリスト、情報収集、ホスト情報、見つかった脆弱性、実施された攻撃、脆弱性の悪用に成功したかどうか、どのような悪用手法が使用されたか、アクセスの昇格パス、そして最終的にどのように問題を修正するかの修正策が含まれます。

  • レポートの実行概要には何を含める必要がありますか?

    -実行概要には、バックグラウンド、達成された目標、推奨事項を簡潔に述べる必要があります。これは、コースの課題であるため、一般的なレベルで言及されます。

  • レポートでターゲットホストをリストアップする際に注意すべき点は何ですか?

    -レポートでターゲットホストをリストアップする際には、達成できていないホストも含めることが重要です。また、情報収集やスキャンを行ったにもかかわらず、実際に侵入できなかったホストについても報告することが求められます。

  • 脆弱性に対する攻撃を実施する際にはどのようなことが重要ですか?

    -脆弱性に対する攻撃を実施する際には、脆弱性が実際に存在することを確認することが重要です。また、脆弱性が実際に活発ではない場合や、ホスト上で有効ではない場合についても報告することが求められます。

  • レポートで推奨される修正策を含める際に注意すべき点は何ですか?

    -修正策を含める際には、問題を示すだけでなく、どのようにして修正されるかのアドバイスも含める必要があります。具体的には、コードの修正方法を詳細に指示する必要はありませんが、問題点を明確にし、修正策を提案する必要があります。

  • レポートの技術部分にはどのような内容が含まれますか?

    -レポートの技術部分には、情報収集、脆弱性評価、悪用、昇格、そして修正策の詳細が含まれます。また、各ターゲットホストに対して特定のセクションを作成し、それぞれのホストに関する情報を記載することが求められます。

  • レポートの締めくだりや結論部分にはどのような内容が含まれますか?

    -締めくだりや結論部分には、テストの概要と、セキュリティ・ポスチャの改善に向けたアイデアが含まれます。ただし、この場合は結論部分が必ずしも必要ではなく、もし興味深い内容がない場合は一つか二つの文でまとめることも可能です。

  • PETRA標準のレポート構造についてどうやって理解できますか?

    -PETRA標準のレポート構造については、petrastandard.orgで技術ガイドラインをチェックすることができます。特にレポートの部分に焦点を当て、今日はレポートに関する情報のみを焦点にしています。

  • レポートの執筆において、どのようなポイントが評価に影響を与えますか?

    -レポートの執筆において、完全なレポートだけでなく、情報収集やスキャンの実施、攻撃の実施、昇格のパス、そして特に修正策の提案が評価に影響を与えます。不完全なレポートや修正策の提案が不足している場合は、評価からポイントが差し引かれる可能性があります。

  • レポートを提出する際に名前とコース名を含める理由は何ですか?

    -レポートに名前とコース名を含めることで、インストラクターはレポートを特定の学生に関連付けることができます。これは、学習プラットフォーム外でレポートを読む場合でも、インストラクターが学生とレポートを適切に関連付けることができるようにするものです。

  • PETRA標準でなくても、どのような一般的なPenetration Testingのレポートテンプレートを使用できますか?

    -PETRA標準でなくても、通常のレポートテンプレートを使用することができます。インストラクターからの要求は、レポートの表紙に名前とコース名を含めることで、レポートを特定の学生に関連付けられるようにすることです。

Outlines

00:00

📝 レポート制作とPenTestの基礎

この段落では、PenTestのレポート制作フレームワークと最終レポートに従う必要性について説明されています。PTES(Penetration Testing Execution Standard)のサブセットを使用し、ターゲットマシンの全てを含む一つの文書を作成することが求められています。レポートには、背景、目標、推奨事項、そして利用できなかったと成功したホストのリストが含まれます。また、情報収集、スキャン、攻撃の詳細と、期待されたが実際には効果なかった攻撃についても含めるべきです。

05:02

🎯 脆弱性と攻撃の詳細報告

この段落では、脆弱性を見つけ出し、攻撃を実施した際の詳細を報告することが重要であると強調されています。脆弱性に対する攻撃を検証し、どの脆弱性が実際に悪用可能かを確認し、使用した.Exploitの種類や得られたアクセスレベル、さらに特権昇格のパスを記録することが求められます。最後に、どのようにして脆弱性を修正するか、つまりどのようにホストを修正するかを含める必要があります。

10:02

📊 実行概要と技術報告の分割

この段落では、レポートの構造について説明されています。実行概要はビジネスのラインに向けていて、技術報告はより詳細な情報を提供します。実行概要では、セキュリティの状況やリスクの影響、推奨事項の概要を述べる一方、技術報告では個別のターゲットに焦点を当てた報告が行われます。また、脆弱性の確認と全ての脆弱性に対する攻撃を試みることが求められます。

15:02

🔍 情報収集と脆弱性評価

この段落では、情報収集と脆弱性評価の過程について説明されています。オープンソースインテリジェンスは除外され、アクティブインテリジェンスに焦点が当てられます。ポートスキャン、ソフトウェアバージョンの特定、そしてターゲットに対する攻撃を理解するための活動が含まれます。また、脆弱性評価では自動化ツールを使用して脆弱性をスキャンし、攻撃の実行には手動テストが行われます。

20:02

🚫 省略可能なセクションとレポートのフォーマット

この最終段落では、レポートのフォーマットと構造について説明されています。PTESの標準的なガイドラインに従い、実行概要、技術報告、そして推奨事項を含む必要があります。特定のセクション(例えば、間接攻撃やリスクと露出の評価)はこのコースでは省略可能であり、レポートの構造はシンプルで明確にすることが期待されています。また、レポートのフロントページには名前とコース名を含めるよう要求されています。

Mindmap

Keywords

💡Penetration Testing

Penetration Testing(侵入テスト)は、システムのセキュリティを評価するために行われるプロセスで、不正ユーザーがシステムに侵入し、データや機能に影響を及ぼす可能性を探るために、技術的な手法を用いてテストを行います。このビデオでは、Penetration Testingの実施方法と報告書の作成について説明されています。

💡Reporting Framework

Reporting Framework(報告書の枠組み)は、Penetration Testingの結果を効果的に報告するための構造化された方法です。この枠組みは、報告書に含めるべき要素や、それらをどのように記述するかを定義します。ビデオスクリプトでは、PTESのサブセットを使用して報告書を作成する手順が説明されています。

💡Executive Summary

Executive Summary(実行概要)は、報告書の概要を要約した部分です。このセクションは、ビジネスのリーダーや決定権を持つ人々がシステムのセキュリティ状況を理解するために読むことが想定されています。ビデオスクリプトでは、実行概要の重要性や、どのような内容を含めるべきかについて説明されています。

💡Technical Report

Technical Report(技術報告)は、Penetration Testingの詳細な結果を記録した部分です。このセクションでは、技術的な情報やデータ、脆弱性の詳細、攻撃手法、および修正策が含まれます。ビデオスクリプトでは、技術報告の作成方法と、どのようにターゲットごとに分割するかについて説明されています。

💡Vulnerabilities

脆弱性とは、システムのセキュリティにおける弱点のことを指します。これらの弱点は、攻撃者によって悪用される可能性があります。ビデオスクリプトでは、脆弱性の発見、分析、および報告について説明されています。

💡Exploits

Exploits(悪用)は、システムの脆弱性を利用して攻撃を行う技術的な手法です。Penetration Testingにおいては、発見された脆弱性を悪用して、攻撃者がシステムに侵入したり、データにアクセスしたりする可能性を検証するためにExploitsが使用されます。ビデオスクリプトでは、Exploitsの使用とその結果の報告について説明されています。

💡Privilege Escalation

Privilege Escalation(特権昇格)は、攻撃者がシステム内でより高い権限を持つアカウントにアクセスすることを指します。これにより、攻撃者はシステムの制御をより多く得ることができます。ビデオスクリプトでは、Penetration Testingにおいて特権昇格の経路を発見し、報告することの重要性について説明されています。

💡Remediation

Remediation(修正)は、発見された脆弱性やセキュリティの問題を解決するためのプロセスです。Penetration Testingの目的の一つは、問題点を特定し、それらを修正するためのアドバイスを提供することです。ビデオスクリプトでは、報告書においてどのように修正策を提案するかについて説明されています。

💡PTES

PTES(Penetration Testing Execution Standard)は、Penetration Testingの実施方法を標準化するための国際的なガイドラインです。ビデオスクリプトでは、PTESの一部を使用して報告書を作成するプロセスについて説明されています。

💡Information Gathering

Information Gathering(情報収集)は、Penetration Testingの最初のステップであり、ターゲットシステムに関する情報を集めることです。これには、オープンソースの情報を収集する手間不到な方法から、より深いfootprintingや脆弱性スキャンなどの技術的な手法までがあります。ビデオスクリプトでは、情報収集の重要性について説明されています。

💡Risk Management

Risk Management(リスク管理)は、組織が潜在的なリスクを識別、評価、および制御するプロセスです。セキュリティリスク管理の一環として、Penetration Testingの結果を使用して、リスクを評価し、適切な対策を決定します。ビデオスクリプトでは、リスク管理の技術的な詳細を省略し、Penetration Testingの実際の実施に焦点を当てています。

Highlights

The lecture focuses on reporting penetration testing and introduces the PTES (Penetration Testing Execution Standard) reporting framework.

Students are required to create a single document for their report, covering all target machines and including an executed summary, background, goals, and recommendations.

Bonus points are awarded for reports that include information gathering, scanning, and conducted attacks, even if penetration was not successful.

Reports should detail the vulnerabilities found, attacks conducted, and the level of access gained, including the escalation path to higher privileged accounts.

Remediation suggestions are crucial; a report without remediation steps is considered worthless for the company or blue team.

The report should include both an executive summary for non-technical stakeholders and a technical report for colleagues in the organization.

The executive summary should provide a high-level overview of the company's security posture, while the technical report should contain detailed guidance.

Students must successfully penetrate and escalate at least three machines and report on them to pass the assignment, with additional points for more machines.

Incomplete reports, especially those lacking remediation guidance, may result in the loss of half the points for the assignment.

Students are encouraged to submit their first report version by the end of March for feedback and potential improvement.

The PTES reporting structure includes an executive summary, technical report, and a focus on the impact to the business rather than listing every technical detail.

Reports should summarize recommendations for improving the company's security posture at a high level, such as creating a patch management process.

For the technical report, each target should have a specific section detailing information gathering, vulnerability assessment, and exploits.

Reports should include relevant details from vulnerability scans, avoiding irrelevant information for readability and clarity.

Students are not expected to perform client-side or browser-side attacks in this course, simplifying the report structure.

The report should document the path of privilege escalation and any countermeasures encountered during the testing.

Risk and exposure assessment is not required in the report, focusing instead on the direct attack and remediation steps.

Transcripts

play00:02

so

play00:03

uh welcome again to the lecture today's

play00:06

topic is

play00:08

the reporting penetration testing

play00:10

reporting framework that we are going to

play00:12

use the p test

play00:15

and it's

play00:17

closely related to your final report

play00:19

since it should follow the peter's

play00:21

instructions

play00:23

and more specifically we are using a

play00:26

subset of the standard

play00:29

so you are not required to complete the

play00:33

full peta standard report instead please

play00:37

use this structure here

play00:40

so

play00:41

for your own report please create a

play00:44

single

play00:45

document that contains all the target

play00:47

machines

play00:49

and then

play00:50

include these so include one executed

play00:54

summary which describes quickly or

play00:57

briefly what

play00:59

what's the background uh in this case

play01:02

this is a course assignment

play01:04

um in general level the achieved

play01:08

goals and then recommendations and then

play01:11

list all the target hosts that you were

play01:14

unable and you were able to exploit

play01:18

so

play01:18

for your report most of your create will

play01:21

come from these

play01:23

target hosts

play01:24

that you were able to exploit but i will

play01:27

grant

play01:28

bonus points

play01:30

for good reports that include

play01:33

this

play01:34

information

play01:35

gathering

play01:36

and

play01:37

scanning and

play01:39

conducted so

play01:41

even if you are unable to actually

play01:44

penetrate the host

play01:47

please

play01:48

include everything that you did or all

play01:50

the information that you gathered

play01:52

and all the attacks attacks that were

play01:56

not really

play01:57

uh that you ex

play01:59

expected or assumed that would be

play02:05

effective but turned out not to be so

play02:08

just a reminder you are allowed to

play02:10

report on other machines to not just the

play02:13

ones that you were able to exploit

play02:17

for the machines that you were able to

play02:18

exploit

play02:20

the same topics so information gathering

play02:23

host information in this case these are

play02:26

basically the same since

play02:28

the target host or the target is an

play02:31

individual host on all cases

play02:34

then any vulnerabilities that you are

play02:38

able to find um any attacks that you

play02:41

conduct against those vulnerabilities

play02:44

especially

play02:46

just to verify that the vulnerability

play02:48

exists or to find out that the

play02:51

vulnerability isn't actually

play02:55

active or

play02:57

in this host

play02:59

and then finally which vulnerabilities

play03:01

you were success can be successfully

play03:04

exploited

play03:06

what kind of exploits did you actually

play03:08

use

play03:09

what level of access you gained what was

play03:13

the escalation path so how did you gain

play03:17

additional access once you gained so you

play03:21

typically in these

play03:23

penetration

play03:25

tests you gain initial access on some

play03:28

low level account and then you are able

play03:31

to escalate to hire

play03:33

more privileged account typically a root

play03:36

account or an administrator account is

play03:39

the

play03:40

final target

play03:42

and finally please do not forget

play03:45

to include the remediation so so how

play03:48

should this vulnerability or how should

play03:52

this host be fixed

play03:53

what the defenders should do

play03:57

to actually

play03:59

secure this machine

play04:01

and this is always the most important

play04:04

part of your feedback so

play04:06

a penetration testing or a red team

play04:08

report which

play04:10

does not include any suggestions on how

play04:13

to fix the situation is basically

play04:16

worthless for the company for the

play04:23

blue team for the software developers

play04:27

so if you don't tell

play04:30

how

play04:31

the problems can be fixed then

play04:34

no one is going to have time

play04:36

to recreate the conditions and retest

play04:40

and find out what happened instead

play04:42

that's the main service that you are

play04:45

providing as a penetration tester

play04:48

you are telling

play04:49

these are the problems and here are the

play04:52

fixes

play04:53

of course you don't have to give line by

play04:56

line instructions

play04:58

how to fix the code but you have to tell

play05:01

what is the problem in the code that

play05:04

should be

play05:05

remediated

play05:07

i hope that's clear and finally you can

play05:11

basically

play05:12

have a short conclusions chapter

play05:15

but

play05:16

if you don't

play05:18

find anything interesting to write in

play05:20

this chapter

play05:23

it it can be one or two sentences long

play05:26

so conclusions are not really necessary

play05:28

in this case since you already have the

play05:31

uh general executive recommendations

play05:34

here

play05:37

so the main split in these two parts is

play05:40

executive summary is meant for the line

play05:43

of business

play05:44

this is for the people who have the

play05:46

money but who do not have the technical

play05:48

expertise

play05:50

so here you should help them understand

play05:54

what is the security posture of the

play05:57

company

play06:00

how secure they are how secure they

play06:03

should feel themselves

play06:06

and in the technical part you are giving

play06:08

guidance to your uh your other your

play06:11

colleagues in the organization the

play06:14

people who are actually developing the

play06:16

software

play06:17

uh administering administering the

play06:20

servers and so on

play06:22

so technical part should contain

play06:25

technical details executive summary

play06:28

should contain just a high level

play06:31

overview of the situation

play06:35

and finally please remember that a

play06:38

single target may contain more than one

play06:40

exploitable vulnerability so

play06:45

there can be and there are in couple of

play06:48

the machines at least several

play06:49

vulnerabilities

play06:52

uh on some machines

play06:54

they are on the

play06:55

sort of initial access level

play06:58

like in the target one there are at

play07:00

least three ways of attacking that

play07:02

machine

play07:04

and on some machines they are

play07:07

on the escalation path so there are at

play07:09

least two or three different ways of

play07:12

gaining

play07:13

root access on those machines

play07:17

so try

play07:19

to

play07:22

check everything

play07:25

excuse me

play07:26

once you have collected all the

play07:27

information you have collected the

play07:29

vulnerabilities please try to check all

play07:32

of them don't just stop when you find

play07:35

the first one

play07:37

do a thorough job so

play07:41

you are

play07:42

being paid well in this case with uh

play07:47

study credits but anyhow you are paid to

play07:51

do a full scan and full attack on the

play07:55

machine not just find a single entry

play07:58

point

play08:01

so this is not like the cpfs this is not

play08:05

like the

play08:07

in that sense these are not your typical

play08:09

try hack me rules

play08:11

where you are you expect to find one way

play08:15

into the machine and then you just fill

play08:17

in the

play08:19

flags and be done with it

play08:21

now these rooms

play08:25

or of course they are try hackney rules

play08:28

in the sense that that's where they are

play08:30

hosted but they do contain at least some

play08:32

of them do contain several

play08:34

vulnerabilities

play08:39

and for the

play08:42

grading

play08:43

so you have to find or you have to

play08:47

successfully

play08:49

penetrate and escalate at least three

play08:51

machines and report on them that's a

play08:55

one

play08:56

great one and then for each

play08:59

additional machine that you are able to

play09:02

uh gain access to or gain root level

play09:05

level access to gives you another point

play09:08

up to

play09:10

five so

play09:14

and i may

play09:16

deduct half a point for

play09:19

incomplete report on a

play09:23

host so you might lose basically half of

play09:26

the points

play09:27

for this assignment if you don't

play09:30

include all the information especially

play09:32

if you don't include remediation

play09:35

guidance

play09:37

so for that reason it's also a good idea

play09:40

to also include the rest of the work

play09:43

that you do because that will give you

play09:45

bonus points back back and will give you

play09:48

an idea

play09:50

um and of course it's a good idea

play09:53

to return

play09:54

the first version already at the end of

play09:56

the march because then you will receive

play09:58

the feedback and hopefully you will see

play10:01

where you can

play10:04

make your report better and gain those

play10:07

lost points back

play10:12

okay

play10:13

then for a couple of details on the

play10:16

peta standard

play10:18

and especially the reporting page so you

play10:21

can check the whole peters technical

play10:23

guideline on the petastandard.org

play10:27

we'll focus only on the reporting here

play10:30

for today

play10:33

in the

play10:35

sort of unabridged so the complete

play10:38

report

play10:39

the structure is the same so that's the

play10:41

executing summary and then there's a

play10:43

technical report

play10:45

but especially the executive summary is

play10:49

a lot more comprehensive than in our

play10:51

document so

play10:52

you are not required to do this security

play10:56

risk rating

play10:57

you don't have to generate risk scales

play11:01

i believe you studied iso 27000

play11:05

iso 27005

play11:07

includes risk management techniques

play11:11

let's leave it out of this report and

play11:13

focus on the actual penetration testing

play11:17

you don't have to create

play11:19

risk origin category diagrams

play11:22

you don't have to create road maps for

play11:25

the fixes

play11:26

so the only things that you should

play11:31

document on some level is the

play11:34

overall

play11:35

okay the background

play11:37

so

play11:39

what you are doing the overall posture

play11:44

so

play11:47

what

play11:49

what is the impact to the business

play11:53

how badly things are

play11:55

in the network if there is

play11:58

something

play12:01

a systemic

play12:03

so

play12:04

for example

play12:06

lacking effective patch management

play12:08

process so if it looks like the

play12:11

uh

play12:12

all the targets are missing missing

play12:15

latest patches then that's

play12:17

stuff that you can mention here

play12:20

but

play12:22

don't focus on these symptoms so even if

play12:26

ms-08067

play12:31

bug or deep

play12:38

problem is on some host

play12:41

please don't list them in this overall

play12:44

posture those are the technical details

play12:47

focus on what's

play12:49

the impact to the business

play12:55

and finally a summary of recommendations

play12:58

so

play13:00

you

play13:00

have the

play13:02

remediation descriptions for each target

play13:06

then final once you are finished with

play13:09

those pick

play13:11

the

play13:11

again the common theme

play13:14

on those so what are the

play13:18

what are the large steps that the

play13:21

company should take to fix the security

play13:24

posture so

play13:26

all these message machines exist in one

play13:29

company for this assignment

play13:32

even though they don't look anything

play13:33

like they would

play13:35

exist in a single company

play13:40

so what are the sort of

play13:43

procedural or governmental issues

play13:47

in the company

play13:49

that you recommend them

play13:51

to focus on to fix the security

play13:55

not single technical fixes but

play13:59

sort of

play14:00

high level

play14:01

for example

play14:03

create a patch management process

play14:07

conduct

play14:09

quarterly

play14:10

vulnerability scans

play14:13

include vulnerability scanning in the

play14:16

acceptance testing

play14:18

that's sort of

play14:20

already close to technical detail but

play14:23

give the customer higher level

play14:26

recommendations what to do how to create

play14:29

the road map basically

play14:31

you don't have to create the actual

play14:33

roadmap so we are leaving that also out

play14:36

of this

play14:37

assignment

play14:39

then for the technical report

play14:42

so

play14:43

here it's

play14:45

in our case it's easiest if you split

play14:48

the technical part

play14:49

um

play14:50

to a

play14:52

target specific sections so create one

play14:56

section for each target

play14:59

from one to eight

play15:02

missing two

play15:06

you

play15:07

probably will not be doing information

play15:10

gathering you want to be doing passive

play15:13

intelligence in this case the machines

play15:15

are given to you

play15:17

you receive the ib addresses and there

play15:20

is really nothing

play15:23

in in google or in anywhere else in the

play15:26

internet

play15:27

about these machines

play15:30

so

play15:32

the information gathering the open

play15:34

source intelligence part can be left out

play15:37

at this point

play15:40

but you should

play15:42

do the uh active intelligence so

play15:47

this is the footprinting this is the

play15:48

nmap scans this is

play15:51

trying to find out so port scanning

play15:56

identifying

play15:58

the software versions stuff like that

play16:01

trying to understand what are you are

play16:05

up against

play16:07

at this point

play16:09

then corporate intelligence personal

play16:11

intelligence

play16:12

don't really con

play16:14

concern us on this report

play16:17

but vulnerability assessment

play16:21

so this is the step where you

play16:25

use the automatic automated tools to

play16:27

scan

play16:29

the

play16:30

post

play16:32

trying to find

play16:35

any level

play16:36

vulnerabilities in any technical level

play16:39

of the target

play16:42

[Music]

play16:43

you

play16:45

may

play16:46

include a screenshot of the results

play16:50

but please make sure that your results

play16:54

are actually relevant

play16:56

to the target host

play16:58

so

play16:59

don't just screenshot everything that

play17:02

you do and include that

play17:04

instead

play17:06

either type out the relevant parts to

play17:09

your report or screenshot things that

play17:13

only contain

play17:15

information that is

play17:16

relevant one of the sort of

play17:20

typical

play17:21

problems with reports

play17:25

on this course and on real life too is

play17:30

on this step

play17:31

you have to identify the operating

play17:35

system

play17:36

and

play17:37

some have some level understanding of

play17:40

the software versions that are installed

play17:43

in the machine

play17:45

so for example if you run the

play17:49

nmap

play17:52

vulnerability scan against the host

play17:56

you will

play17:58

find uh multiple occur occurrences of

play18:02

the same cve

play18:05

so that because the same cv i can't

play18:08

recall now

play18:09

what it is but there are are a couple of

play18:12

cves that exist on all linux

play18:15

distributions for example

play18:18

so i don't want to see a report which

play18:20

lists that this

play18:23

host which we already know is a ubuntu

play18:27

12.04 for example

play18:29

contains

play18:31

cve something something

play18:34

for

play18:35

oracle linux

play18:37

because obviously

play18:39

this cve concerns a different operating

play18:42

system a different distribution it

play18:46

cannot be relevant for this report

play18:50

and especially if you have pages and

play18:52

pages

play18:53

of basically listing all possible linux

play18:56

versions for example

play18:58

that's not relevant that's not a good

play19:00

report

play19:02

so especially on those cases please just

play19:05

pick

play19:06

the relevant parts of the

play19:09

output

play19:11

and just include them

play19:15

if you feel that you need to include

play19:17

more information for completeness sake

play19:20

then just create an appendix and include

play19:22

it there that's a sort of

play19:25

service for the

play19:27

blue team

play19:28

they can actually see

play19:29

the scan and the results directly from

play19:32

there but if

play19:34

if you included it inside the actual

play19:37

report it just makes it harder to read

play19:42

then the exploits so

play19:45

on this step you basically manually test

play19:49

the vulnerabilities that you located in

play19:51

the assessment phase

play19:56

and at that point you basically check

play19:59

whether this exploit works against this

play20:02

host or not

play20:04

there are exploits

play20:08

that don't work

play20:10

there are exploits that do work and then

play20:13

there are exploits that should work but

play20:15

for some reason just don't

play20:20

you probably should report

play20:22

though especially those that you believe

play20:26

exist in the machine but you were unable

play20:29

to actually get working

play20:32

because um

play20:34

that helps again the defenders

play20:38

they might

play20:40

identify that yes we are using an

play20:43

exploitable or vulnerable version

play20:45

but for some reason there is a some

play20:48

configuration parameter

play20:50

or there's

play20:52

some closed port or non-standard

play20:54

configuration option which for this case

play20:58

prevented this exploit from running

play21:02

these are things that you probably will

play21:04

not be able to find out but the blue

play21:06

team the

play21:10

developers should have pretty good

play21:12

understanding of

play21:13

so

play21:14

these are valid this is valuable

play21:17

information

play21:18

for the defenders

play21:20

even if the attack is not successful

play21:24

to understand

play21:26

why you expected this attack to work

play21:30

they can then verify from the source

play21:33

code for example or fro from the

play21:35

configurations that yep this actually

play21:38

should have worked

play21:40

except we had this parameter a bit

play21:42

differently so if the attacker had

play21:45

noticed this parameter they would have

play21:48

been able

play21:49

to exploit this vulnerability and they

play21:52

then they can fix this

play21:54

even if you were not able to gain access

play21:57

through there

play21:58

so don't leave

play22:00

stuff out of the report just because you

play22:03

were unable to exploit it

play22:06

but please do

play22:07

leave stuff out of the report that

play22:10

should never be able to be exploited

play22:12

against this host

play22:14

so which is meant against a different

play22:16

software version different uh operating

play22:18

system

play22:20

so on different processor architecture

play22:24

what not

play22:27

okay uh the indirect attack you can

play22:30

basically skip completely

play22:33

uh we are not performing these on this

play22:36

course so no facing no client side

play22:38

attacks no browser side attacks so

play22:40

that's why i've left the directed attack

play22:45

from the

play22:46

structure

play22:48

i've simplified this a bit

play22:50

on that level too

play22:52

and

play22:53

rearranged it a bit too

play22:57

okay and then we don't

play23:00

really have to go to the post

play23:01

exploitation so

play23:03

yep you have to document the path that

play23:06

you took

play23:07

for the privilege escalation

play23:10

it's sort of included here

play23:14

but you don't have to evaluate

play23:17

the countermeasure effectiveness

play23:20

there is uh

play23:23

at least one simple web application

play23:25

firewall

play23:28

or sort of

play23:30

application level firewalling

play23:32

going on in at least one of the machines

play23:35

which does prevent

play23:39

brute force attacks

play23:42

after a couple of tries but

play23:44

nothing really

play23:46

heavily guarded on this

play23:49

assignment

play23:50

and finally you can leave the risk and

play23:52

exposure

play23:54

out of your report

play23:58

and

play23:59

so the conclusion as it says here

play24:02

is that you echo portions of the test

play24:06

and give ideas for the posture

play24:09

yeah please do that but

play24:12

you don't have to focus on the

play24:13

conclusions so

play24:15

the most

play24:16

relevant part is the

play24:19

directed attack this part here

play24:27

what vulnerabilities exist what

play24:29

vulnerabilities you were able to exploit

play24:32

and

play24:33

how you were able to escalate your

play24:35

access and what are the remediation

play24:38

steps that the defenders should take

play24:42

that's the structure of a good report

play24:50

and

play24:51

as i mentioned this is the

play24:56

this is the outline that i expect you to

play24:59

use you can use

play25:02

as your reporting

play25:05

template

play25:06

the

play25:07

normal to us report template or just

play25:10

grab a word template from the

play25:12

default directory if you feel that

play25:14

that's easier

play25:16

what i do request is that include your

play25:21

name and the course name on the front

play25:24

page of the report so that that if i

play25:27

have to

play25:29

uh read them outside of its learning

play25:32

i can still

play25:35

attach them to you so that i can create

play25:38

you

play25:40

without too much default i should be

play25:42

able to see them inside its learning and

play25:44

then i can just directly create you

play25:48

but just in case something happens

play25:52

okay

play25:53

any questions about

play25:55

the peta's structure or the reporting

play25:58

instructions at this point

play26:05

okay

play26:06

if not then

play26:08

[Music]

play26:09

thanks for listening i'll end the

play26:11

english recording here and then we can

play26:13

continue

play26:15

with your specific questions

Rate This

5.0 / 5 (0 votes)

Related Tags
セキュリティPenTestレポートPTES脆弱性リスク管理システム分析エグゼクティブサマリー技術報告改修アドバイス
Do you need a summary in English?