Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

3/17/2015
11:30 AM
Cricket Liu
Cricket Liu
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

The End of Pen Testing As We Know It?

It's time to expand the scope of penetration tests beyond the periphery of the enterprise network.

As attack surfaces expand exponentially, security professionals need to broaden their focus beyond just stopping attackers, to finding malware inside their organizations and preventing data from leaving their networks. Analyst firm Gartner's report on 2015 tech trends predicts that digital businesses will find it impossible to maintain a 100% secured environment and will need to opt for risk assessment and mitigation tools instead.

“The old approach to security that emphasizes securing access is inadequate for digital business,” the report notes. “Security must be enhanced inside the enterprise boundaries and inside the applications themselves.”

Security teams have traditionally turned to penetration testing to perform mock attacks on computer systems in order to locate vulnerabilities that could be exploited. Entry points can occur on any externally facing part of the network including web servers, email servers, and firewalls. The practice has been effective but is dated, coming into existence in the 1960s and 1970s, when defense contractors and US defense agencies began the practice of systematically simulating attacks on the Pentagon's network, among other targets.

In 2015, with the rise of the Internet of Things and the continuing impact of Bring Your Own Device (BYOD), the number of entry points to networks has grown exponentially in size and complexity. Policing the periphery of the network is no longer enough:  It’s a foregone conclusion that infected devices—perhaps infected on another network, but infected nonetheless—will connect to what used to be thought of as the secure side of most networks.

The nature of attacks has changed as well. Cyberattacks were once a way of gaining notoriety in the hacker community, with attacks that were noisy and boastful in nature. Now, whether attackers are motivated by monetary gain or political interest, the nature of attacks has become less visible and more sophisticated. For example, advanced persistent threats (APTs) are common now. APTs invisibly infiltrate the network, lie undetected, and then communicate with offsite command-and-control centers to subversively operate on the network.

What next?

These days, most security professionals would concede that their networks have become more vulnerable, particularly with the rise of mobile device connections. Given the likelihood that attacks have already infiltrated the network, what’s next?

In addition to the network’s perimeter, security professionals need to focus on points where communication leaves the network and expand the scope of penetration testing to include the possibility—perhaps the inevitability—that compromised devices are connected to the network. Often, this external communication is via the Domain Name System, or DNS. APTs often use DNS to call home and receive instructions, at which point they may download additional malware payloads and steal sensitive information—possibly tunneled through DNS.

[Find out 5 Ways To Monitor DNS Traffic For Security Threats.]

By monitoring DNS traffic, looking both for known malicious destinations as well as suspicious traffic patterns, and disrupting this communication, companies can prevent valuable business and personal information from leaving the network. If an APT is prevented from “calling home,” it loses its potency. It may lie on the network for months undetected, but without a connection to the outside world, the damage it can do is very limited. This way, no matter how large the perimeter of a network grows, security teams can effectively manage key points of communication—including DNS—to render APTs ineffective.

 

Cricket Liu is a leading expert on the Domain Name System (DNS) and EVP and Senior Fellow at Infoblox. With more than 25 years of experience with enterprise-scale DNS infrastructure, technical writing, training, and course development experience, Cricket serves as a liaison ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
PZav
50%
50%
PZav,
User Rank: Author
3/17/2015 | 1:05:41 PM
Is that enough?
Great post, solid points. The question I have is where does the network peremiter end? Is it phyiscal hardware owned by IT and physical devices owned by employees or is there more to it? What about IaaS, website services like jQuery, analtics/tracking, ad networks...how do you go about pen testing all that?

 
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.