Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

3/17/2015
11:30 AM
Cricket Liu
Cricket Liu
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

The End of Pen Testing As We Know It?

It's time to expand the scope of penetration tests beyond the periphery of the enterprise network.

As attack surfaces expand exponentially, security professionals need to broaden their focus beyond just stopping attackers, to finding malware inside their organizations and preventing data from leaving their networks. Analyst firm Gartner's report on 2015 tech trends predicts that digital businesses will find it impossible to maintain a 100% secured environment and will need to opt for risk assessment and mitigation tools instead.

“The old approach to security that emphasizes securing access is inadequate for digital business,” the report notes. “Security must be enhanced inside the enterprise boundaries and inside the applications themselves.”

Security teams have traditionally turned to penetration testing to perform mock attacks on computer systems in order to locate vulnerabilities that could be exploited. Entry points can occur on any externally facing part of the network including web servers, email servers, and firewalls. The practice has been effective but is dated, coming into existence in the 1960s and 1970s, when defense contractors and US defense agencies began the practice of systematically simulating attacks on the Pentagon's network, among other targets.

In 2015, with the rise of the Internet of Things and the continuing impact of Bring Your Own Device (BYOD), the number of entry points to networks has grown exponentially in size and complexity. Policing the periphery of the network is no longer enough:  It’s a foregone conclusion that infected devices—perhaps infected on another network, but infected nonetheless—will connect to what used to be thought of as the secure side of most networks.

The nature of attacks has changed as well. Cyberattacks were once a way of gaining notoriety in the hacker community, with attacks that were noisy and boastful in nature. Now, whether attackers are motivated by monetary gain or political interest, the nature of attacks has become less visible and more sophisticated. For example, advanced persistent threats (APTs) are common now. APTs invisibly infiltrate the network, lie undetected, and then communicate with offsite command-and-control centers to subversively operate on the network.

What next?

These days, most security professionals would concede that their networks have become more vulnerable, particularly with the rise of mobile device connections. Given the likelihood that attacks have already infiltrated the network, what’s next?

In addition to the network’s perimeter, security professionals need to focus on points where communication leaves the network and expand the scope of penetration testing to include the possibility—perhaps the inevitability—that compromised devices are connected to the network. Often, this external communication is via the Domain Name System, or DNS. APTs often use DNS to call home and receive instructions, at which point they may download additional malware payloads and steal sensitive information—possibly tunneled through DNS.

[Find out 5 Ways To Monitor DNS Traffic For Security Threats.]

By monitoring DNS traffic, looking both for known malicious destinations as well as suspicious traffic patterns, and disrupting this communication, companies can prevent valuable business and personal information from leaving the network. If an APT is prevented from “calling home,” it loses its potency. It may lie on the network for months undetected, but without a connection to the outside world, the damage it can do is very limited. This way, no matter how large the perimeter of a network grows, security teams can effectively manage key points of communication—including DNS—to render APTs ineffective.

 

Cricket Liu is a leading expert on the Domain Name System (DNS) and EVP and Senior Fellow at Infoblox. With more than 25 years of experience with enterprise-scale DNS infrastructure, technical writing, training, and course development experience, Cricket serves as a liaison ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
PZav
50%
50%
PZav,
User Rank: Author
3/17/2015 | 1:05:41 PM
Is that enough?
Great post, solid points. The question I have is where does the network peremiter end? Is it phyiscal hardware owned by IT and physical devices owned by employees or is there more to it? What about IaaS, website services like jQuery, analtics/tracking, ad networks...how do you go about pen testing all that?

 
HackerOne Drops Mobile Voting App Vendor Voatz
Dark Reading Staff 3/30/2020
Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
Curtis Franklin Jr., Senior Editor at Dark Reading,  3/31/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11565
PUBLISHED: 2020-04-06
An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing, aka CID-aa9f7d5172fa.
CVE-2020-11558
PUBLISHED: 2020-04-05
An issue was discovered in libgpac.a in GPAC 0.8.0, as demonstrated by MP4Box. audio_sample_entry_Read in isomedia/box_code_base.c does not properly decide when to make gf_isom_box_del calls. This leads to various use-after-free outcomes involving mdia_Read, gf_isom_delete_movie, and gf_isom_parse_m...
CVE-2020-11547
PUBLISHED: 2020-04-05
PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.
CVE-2020-11548
PUBLISHED: 2020-04-05
The Search Meter plugin through 2.13.2 for WordPress allows user input introduced in the search bar to be any formula. The attacker could achieve remote code execution via CSV injection if a wp-admin/index.php?page=search-meter Export is performed.
CVE-2020-11542
PUBLISHED: 2020-04-04
3xLOGIC Infinias eIDC32 2.213 devices with Web 1.107 allow Authentication Bypass via CMD.HTM?CMD= because authentication depends on the client side's interpretation of the <KEY>MYKEY</KEY> substring.