Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

5/15/2006
09:30 AM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Penetration Testing Is First Stop for Alstom

Transportation company needed to get secure, so it turned to penetration testing for a big-picture view

When Nikk Gilbert took the position of IT security and telecom director last September at Alstom -- a major power generation, transportation, and shipbuilding company -- he guessed the job wouldn't be a picnic.

He was right.

Gilbert's mandate was to build a security program, from the ground up, for Alstom's approximately 28,000 users in 60 countries. That meant working out security for an estimated 1,000 servers running various releases of Unix, Windows NT, 2000, and 2003 worldwide. And, oh, by the way, he had virtually no background information, no network map, and no listings of assets.

The company needed to get a quick assessment of its network and its vulnerabilities. Gilbert started out using Solarwinds network discovery tools and GFI LanGuard Network Security Scanner to begin the discovery process. He also used a Linux auditor CD.

But Alstom needed a product that provided more information and required less learning. Knowing he needed to move fast and decisively, Gilbert decided to invest in Impact, penetration testing software from Core Security.

"LanGuard told me about potential vulnerabilities, but Impact let me see exactly what systems were vulnerable to break-ins," Gilbert said. "When I came in, I didn't even have an account. I plugged in and started breaking into servers just like a [penetration]-tester would do."

The Core Security product helped Gilbert build his case. "I needed some teeth to my presentation to management, and using Impact, I was able to cut down on the time showing management how vulnerable their systems were. It was less expensive than hiring a penetration testing team or security staff dedicated to penetration testing, which typically costs over 100,000 Euros." The software also helped Gilbert develop a security policy, business continuity plan, disaster recovery plan, and site surveys.

Penetration testing is usually the last step in developing a security infrastructure, after doing an assessment, planning the security controls, and implementing security processes and products. Closing the cycle with a penetration test often makes sense, because it gives the enterprise a chance to test new security initiatives and exercise planned responses to an attack. But Gilbert chose to start with the penetration test, because he wanted to get a worst-case picture that his team could use to build the other parts of its security plan.

Alstom had good success with all of its systems on the network, except for OpenBSD, which Impact didn't identify properly. In the first round of testing, Gilbert and his team were focused on network and service vulnerabilities. After they fix the problems from that round, Gilbert and his team will starting focusing on the applications. "There is a lot of fine-tuning to test applications. We have 3,000 to 4,000 applications we use -- and that is a whole 'nother monster we will have to tackle eventually."

Once they got a snapshot of the network assets, Gilbert and his team began solving the problems they found, deploying Altris's Patch Management Solution and McAfee's Intrushield IPS/IDS at key locations while adding more firewalls and policies. "Once we get closer to taking care of the problems we have already found -- and we have an established plan in place -- we will continue to use Impact on a regular basis, to ensure that our security program is functioning as planned," Gilbert said.

Impact is a solid product, but it's not for beginners, Gilbert says. "Even though the Impact product greatly simplifies penetration testing, a user needs a few years experience of networking and security and a solid knowledge of protocols and processes to use a penetration testing tool." During his introductory Webinar with Core Security, Gilbert says he found 48 vulnerable systems in Alstom's network.

Although Alstom used the product for several months on a global scale, Gilbert didn't find any issues with wide-area bandwidth consumption or system instability on the vulnerable systems. "When in the attack phase within Impact, I checked a box which disabled exploits that would leave a service unusable, and I had no issues with services being taken out."

Gilbert still has a lot of work to do. The company has "30 to 40" projects going, ranging from single sign-on to PKI and encryption across the company.

— Mike Fratto, Editor at Large, Dark Reading

Organizations mentioned in this story

  • Altiris Inc. (Nasdaq: ATRS)
  • Core Security Technologies
  • GFI Software Ltd.
  • IntruVert Networks Inc.
  • McAfee Inc. (NYSE: MFE)
  • Solarwinds

    Mike Fratto is a principal analyst at Current Analysis, covering the Enterprise Networking and Data Center Technology markets. Prior to that, Mike was with UBM Tech for 15 years, and served as editor of Network Computing. He was also lead analyst for InformationWeek Analytics ... View Full Bio

     

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 7/9/2020
    Introducing 'Secure Access Service Edge'
    Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  7/3/2020
    Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
    Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    Special Report: Computing's New Normal, a Dark Reading Perspective
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    The Threat from the Internetand What Your Organization Can Do About It
    The Threat from the Internetand What Your Organization Can Do About It
    This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-15526
    PUBLISHED: 2020-07-09
    In Redgate SQL Monitor 7.1.4 through 10.1.6 (inclusive), the scope for disabling some TLS security certificate checks can extend beyond that defined by various options on the Configuration > Notifications pages to disable certificate checking for alert notifications. These TLS security checks are...
    CVE-2020-10756
    PUBLISHED: 2020-07-09
    An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, re...
    CVE-2020-12421
    PUBLISHED: 2020-07-09
    When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an administrator.) This could have caused add-ons to become out-of-date silently without notification to the user. This vulnerability affects Firefox ESR < 6...
    CVE-2020-12422
    PUBLISHED: 2020-07-09
    In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 78.
    CVE-2020-12423
    PUBLISHED: 2020-07-09
    When the Windows DLL "webauthn.dll" was missing from the Operating System, and a malicious one was placed in a folder in the user's %PATH%, Firefox may have loaded the DLL, leading to arbitrary code execution. *Note: This issue only affects the Windows operating system; other operating sys...