Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

5/15/2006
09:30 AM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Penetration Testing Is First Stop for Alstom

Transportation company needed to get secure, so it turned to penetration testing for a big-picture view

When Nikk Gilbert took the position of IT security and telecom director last September at Alstom -- a major power generation, transportation, and shipbuilding company -- he guessed the job wouldn't be a picnic.

He was right.

Gilbert's mandate was to build a security program, from the ground up, for Alstom's approximately 28,000 users in 60 countries. That meant working out security for an estimated 1,000 servers running various releases of Unix, Windows NT, 2000, and 2003 worldwide. And, oh, by the way, he had virtually no background information, no network map, and no listings of assets.

The company needed to get a quick assessment of its network and its vulnerabilities. Gilbert started out using Solarwinds network discovery tools and GFI LanGuard Network Security Scanner to begin the discovery process. He also used a Linux auditor CD.

But Alstom needed a product that provided more information and required less learning. Knowing he needed to move fast and decisively, Gilbert decided to invest in Impact, penetration testing software from Core Security.

"LanGuard told me about potential vulnerabilities, but Impact let me see exactly what systems were vulnerable to break-ins," Gilbert said. "When I came in, I didn't even have an account. I plugged in and started breaking into servers just like a [penetration]-tester would do."

The Core Security product helped Gilbert build his case. "I needed some teeth to my presentation to management, and using Impact, I was able to cut down on the time showing management how vulnerable their systems were. It was less expensive than hiring a penetration testing team or security staff dedicated to penetration testing, which typically costs over 100,000 Euros." The software also helped Gilbert develop a security policy, business continuity plan, disaster recovery plan, and site surveys.

Penetration testing is usually the last step in developing a security infrastructure, after doing an assessment, planning the security controls, and implementing security processes and products. Closing the cycle with a penetration test often makes sense, because it gives the enterprise a chance to test new security initiatives and exercise planned responses to an attack. But Gilbert chose to start with the penetration test, because he wanted to get a worst-case picture that his team could use to build the other parts of its security plan.

Alstom had good success with all of its systems on the network, except for OpenBSD, which Impact didn't identify properly. In the first round of testing, Gilbert and his team were focused on network and service vulnerabilities. After they fix the problems from that round, Gilbert and his team will starting focusing on the applications. "There is a lot of fine-tuning to test applications. We have 3,000 to 4,000 applications we use -- and that is a whole 'nother monster we will have to tackle eventually."

Once they got a snapshot of the network assets, Gilbert and his team began solving the problems they found, deploying Altris's Patch Management Solution and McAfee's Intrushield IPS/IDS at key locations while adding more firewalls and policies. "Once we get closer to taking care of the problems we have already found -- and we have an established plan in place -- we will continue to use Impact on a regular basis, to ensure that our security program is functioning as planned," Gilbert said.

Impact is a solid product, but it's not for beginners, Gilbert says. "Even though the Impact product greatly simplifies penetration testing, a user needs a few years experience of networking and security and a solid knowledge of protocols and processes to use a penetration testing tool." During his introductory Webinar with Core Security, Gilbert says he found 48 vulnerable systems in Alstom's network.

Although Alstom used the product for several months on a global scale, Gilbert didn't find any issues with wide-area bandwidth consumption or system instability on the vulnerable systems. "When in the attack phase within Impact, I checked a box which disabled exploits that would leave a service unusable, and I had no issues with services being taken out."

Gilbert still has a lot of work to do. The company has "30 to 40" projects going, ranging from single sign-on to PKI and encryption across the company.

— Mike Fratto, Editor at Large, Dark Reading

Organizations mentioned in this story

  • Altiris Inc. (Nasdaq: ATRS)
  • Core Security Technologies
  • GFI Software Ltd.
  • IntruVert Networks Inc.
  • McAfee Inc. (NYSE: MFE)
  • Solarwinds

    Mike Fratto is a principal analyst at Current Analysis, covering the Enterprise Networking and Data Center Technology markets. Prior to that, Mike was with UBM Tech for 15 years, and served as editor of Network Computing. He was also lead analyst for InformationWeek Analytics ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Mobile Banking Malware Up 50% in First Half of 2019
    Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
    7 Tips for Infosec Pros Considering A Lateral Career Move
    Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
    For Mismanaged SOCs, The Price Is Not Right
    Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win a Starbucks Card! Click Here
    Latest Comment:   It's a PEN test of our cloud security.
    Current Issue
    IT 2020: A Look Ahead
    Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
    Flash Poll
    How Enterprises are Attacking the Cybersecurity Problem
    How Enterprises are Attacking the Cybersecurity Problem
    Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-3697
    PUBLISHED: 2020-01-24
    UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of gnump3d in openSUSE Leap 15.1 allows local attackers to escalate from user gnump3d to root. This issue affects: openSUSE Leap 15.1 gnump3d version 3.0-lp151.2.1 and prior versions.
    CVE-2019-3694
    PUBLISHED: 2020-01-24
    A Symbolic Link (Symlink) Following vulnerability in the packaging of munin in openSUSE Factory, Leap 15.1 allows local attackers to escalate from user munin to root. This issue affects: openSUSE Factory munin version 2.0.49-4.2 and prior versions. openSUSE Leap 15.1 munin version 2.0.40-lp151.1.1 a...
    CVE-2019-3693
    PUBLISHED: 2020-01-24
    A symlink following vulnerability in the packaging of mailman in SUSE SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Server 12; openSUSE Leap 15.1 allowed local attackers to escalate their privileges from user wwwrun to root. Additionally arbitrary files could be changed to group mailman. Th...
    CVE-2019-3687
    PUBLISHED: 2020-01-24
    The permission package in SUSE SUSE Linux Enterprise Server allowed all local users to run dumpcap in the "easy" permission profile and sniff network traffic. This issue affects: SUSE SUSE Linux Enterprise Server permissions versions starting from 85c83fef7e017f8ab7f8602d3163786d57344439 t...
    CVE-2019-3692
    PUBLISHED: 2020-01-24
    The packaging of inn on SUSE SUSE Linux Enterprise Server 11; openSUSE Factory, Leap 15.1 allows local attackers to escalate from user inn to root via symlink attacks. This issue affects: SUSE SUSE Linux Enterprise Server 11 inn version 2.4.2-170.21.3.1 and prior versions. openSUSE Factory inn versi...