This forum is in archive mode. You will not be able to post new content.

Author Topic: B.Eng. Final Thesis - Comparing Pentesting Methodologies  (Read 4446 times)

0 Members and 1 Guest are viewing this topic.

Offline Mordred

  • Knight
  • **
  • Posts: 360
  • Cookies: 135
  • Nvllivs in Verba
    • View Profile
B.Eng. Final Thesis - Comparing Pentesting Methodologies
« on: February 22, 2013, 10:42:38 AM »
Okay guys, I think it's time to give a short description of the project that I am currently working on. It's my final thesis (a.k.a. after this I graduate, woo) and because I want to follow a career in security, I was adamant to find an internship (we do our final thesis as an Individual Project - IP - as an intern in a company) that will further my personal goals.

It took a lot of struggles with my teachers to convince them that it's okay to do a "hacking"-themed project, mostly because real security gets studied at a Master's level, and most Bachelor's degrees focus on networking/programming/other crap.
Most teachers of Bachelor's courses are scared to allow students to follow-up on hacking related topics because they are scared of their students turning "evil" or something like that. Don't ask me, I know it's idiotic.

Anyway, the project is taking place over 20 weeks, and I'm gonna be working alone on it.

At the moment I'm busy with studying because I started 3 weeks ago, but I've already prepared a nice project plan (my teacher's asked for it of course) which contains a bunch of information on the project. Because it's not definitive yet, for the moment I will just write the big ideas of the project, and I'll follow up with more information once I know what's ok and what isn't (in the project plan) and what's confidential and what's public (so that I can post it here).

Now that the intro is taken care of, let's get down to business. The first thing I will post is a part of the project plan, the goals.


I. Aims of the Project

Research questions:
1. What are the minimum security measures a company which uses the Internet as a tool for their business should employ and what are the most common vulnerabilities present in a live working environment?


2. How far do the companies which are the target of the audit deviate from the minimum necessary security measures, and are they affected by the most common vulnerabilities of today?

3. Are modern penetration test methodologies the most effective way of detecting common vulnerabilities in a live working environment and is there any feasible way in which these methodologies could be improved or optimized?

4. What subset of a complete and full scale penetration test is best suited for each of the scanned companies from the point of view of the relevance/price ratio?



II. General description of the Project

The target number of companies is between 5 and 10, depending on how many of them volunteer for the assessment. In order to explain to the Chief Security Officers (or equivalent) exactly what the project will offer as an outcome, the company-specific evaluation will be conducted completely for <employer company snip> as a first Step of the project. This will allow us to then present the report as a sample result of the research.

Step 2 of the project will be to find out what are the minimum security measures that a company which conducts business by using the Internet as an intermediary should employ, and also what are the most likely-to-encounter weaknesses that infect the aforementioned firms.

Following that will be Step 3, in which the base case is established. This means that scans will be run in order to check the current security posture of the various companies. The results will then be compiled and compared with what are known as being the most common vulnerabilities currently.


At this stage there can be two different situations:

1. The scans reveal that security is very well implemented and no (almost no) vulnerabilities can be located in the networks. This would mean that the base case would be compromised. As such, in the unlikely event of this occurring, the base case will be constructed by means of a testing lab which will be configured particularly to contain the same vulnerabilities that were found to be most common in Step 2.

2. The scans reveal the necessary number of vulnerabilities, situation in which it’s just a matter of comparing them with the research to confirm that indeed the most common vulnerabilities are also present in the current situation.


At this point in the project the main research question will be answered. In Step 4 I will take the methodologies and evaluate how easy they are to apply, how effective they are in tracking down weak points, exactly how long time it takes to conduct the full test and how many vulnerabilities is each technique able to track down.


The final stage, Step 5 will be divided into two main tasks:

1. Make recommendations for companies on which specific subset of the full scale test they should conduct in order to keep the relevance/price ratio adequate.

2. Identifying the strengths and weaknesses of the current methodologies, and, if possible, try to improve or optimize them.



That's it for now. I have some more stuff written of course, but it's in regard to scheduling and other stuff that's not related directly to hacking.
« Last Edit: February 22, 2013, 10:45:30 AM by Mordred »
\x57\x68\x79\x20\x64\x69\x64\x20\x79\x6f\x75\x20\x65\x76\x65\x6e\x20\x66\x75\x63\x6b\x69\x6e\x67\x20\x73\x70\x65\x6e\x64\x20\x74\x68\x65\x20\x74\x69\x6d\x65\x20\x74\x6f\x20\x64\x65\x63\x6f\x64\x65\x20\x74\x68\x69\x73\x20\x6e\x69\x67\x67\x72\x3f\x20\x44\x61\x66\x75\x71\x20\x69\x73\x20\x77\x72\x6f\x6e\x67\x20\x77\x69\x74\x68\x20\x79\x6f\x75\x2e

Offline Mordred

  • Knight
  • **
  • Posts: 360
  • Cookies: 135
  • Nvllivs in Verba
    • View Profile
Re: B.Eng. Final Thesis - Comparing Pentesting Methodologies
« Reply #1 on: February 28, 2013, 11:10:55 AM »
So I'm trying to figure out a proper title for the whole project. Considering it is a scientific research paper, the title also has to be in the same style.

For the moment I was thinking of something along the lines of:

"A comparison of modern day penetration testing methodologies" or "Comparing modern day penetration testing methodologies"

I was curious which one of these is actually more correct given the scientific context, and also if somebody has an idea for a more appropriate formulation I'd be glad to hear it.

Thank you.
\x57\x68\x79\x20\x64\x69\x64\x20\x79\x6f\x75\x20\x65\x76\x65\x6e\x20\x66\x75\x63\x6b\x69\x6e\x67\x20\x73\x70\x65\x6e\x64\x20\x74\x68\x65\x20\x74\x69\x6d\x65\x20\x74\x6f\x20\x64\x65\x63\x6f\x64\x65\x20\x74\x68\x69\x73\x20\x6e\x69\x67\x67\x72\x3f\x20\x44\x61\x66\x75\x71\x20\x69\x73\x20\x77\x72\x6f\x6e\x67\x20\x77\x69\x74\x68\x20\x79\x6f\x75\x2e

Offline Deque

  • P.I.N.N.
  • Global Moderator
  • Overlord
  • *
  • Posts: 1203
  • Cookies: 518
  • Programmer, Malware Analyst
    • View Profile
Re: B.Eng. Final Thesis - Comparing Pentesting Methodologies
« Reply #2 on: February 28, 2013, 12:56:06 PM »
I would write: "Comparison of penetration testing methodologies"

I would strike the "modern", because one time your thesis won't be modern anymore and still have this name.

I also have learned not to state actions in the title, which is why I think comparison (--> states what it is) is better than comparing (--> focus on the action of comparing)
Maybe because scientists might come up to investigate how peope compare things and in that case they would use "comparing" in the title.

Your teachers are weird not allowing security projects.
Actually that's the reason people are not secured at all, because they shall not deal with topics like that. Knowledge and awareness is so important to secure yourself.
« Last Edit: February 28, 2013, 12:57:45 PM by Deque »

Offline Mordred

  • Knight
  • **
  • Posts: 360
  • Cookies: 135
  • Nvllivs in Verba
    • View Profile
Re: B.Eng. Final Thesis - Comparing Pentesting Methodologies
« Reply #3 on: February 28, 2013, 01:32:33 PM »
Thanks Deque, that really makes sense actually. Both the formatting and the idea to not have modern. I didn't really think about the fact that this paper should theoretically survive quite some years.

Your teachers are weird not allowing security projects.
Actually that's the reason people are not secured at all, because they shall not deal with topics like that. Knowledge and awareness is so important to secure yourself.

They do allow Sec projects if it's like securing an application, or developing some software (firewall, AV, IDS), but they don't really like it when you have to do actual hacking, even if it's just to prove that a system is vulnerable. I actually had an old teacher tell me that they aren't in the business of training hackers to steal money (this guy is a huge retard tho and doesn't even teach a tech class, he teaches International Corporate Strategies - a dumb fucking class that nobody in IT needs).
\x57\x68\x79\x20\x64\x69\x64\x20\x79\x6f\x75\x20\x65\x76\x65\x6e\x20\x66\x75\x63\x6b\x69\x6e\x67\x20\x73\x70\x65\x6e\x64\x20\x74\x68\x65\x20\x74\x69\x6d\x65\x20\x74\x6f\x20\x64\x65\x63\x6f\x64\x65\x20\x74\x68\x69\x73\x20\x6e\x69\x67\x67\x72\x3f\x20\x44\x61\x66\x75\x71\x20\x69\x73\x20\x77\x72\x6f\x6e\x67\x20\x77\x69\x74\x68\x20\x79\x6f\x75\x2e

Offline Mordred

  • Knight
  • **
  • Posts: 360
  • Cookies: 135
  • Nvllivs in Verba
    • View Profile
Re: B.Eng. Final Thesis - Comparing Pentesting Methodologies
« Reply #4 on: June 27, 2013, 09:45:24 AM »
Thesis has been finished! 8/10 is the score, and I am very happy about that  8)
\x57\x68\x79\x20\x64\x69\x64\x20\x79\x6f\x75\x20\x65\x76\x65\x6e\x20\x66\x75\x63\x6b\x69\x6e\x67\x20\x73\x70\x65\x6e\x64\x20\x74\x68\x65\x20\x74\x69\x6d\x65\x20\x74\x6f\x20\x64\x65\x63\x6f\x64\x65\x20\x74\x68\x69\x73\x20\x6e\x69\x67\x67\x72\x3f\x20\x44\x61\x66\x75\x71\x20\x69\x73\x20\x77\x72\x6f\x6e\x67\x20\x77\x69\x74\x68\x20\x79\x6f\x75\x2e

 



Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.