Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

4/17/2020
05:25 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Pen-Test Results Hint at Improvements in Enterprise Security

Though many problems remain, organizations are making attackers work harder.

Aggregated data from penetration tests and red team engagements suggests that many enterprise organizations are making progress in securing their networks against cyber adversaries.

External and internal assessments that pen-testing firms have conducted in recent years show that although organizational networks continue to present multiple weaknesses, attackers may be having a harder time finding and exploiting them from outside the network.

"I won't say that the days of 'point, click, and exploit' are over, but they sure are rare," says Chris Nickerson, CEO at pen-testing firm Lares. While security hardening, hygiene, patch management, password quality, and lack of visibility continue to remain big challenges, security organizations are evolving, he notes.

Increasingly, attackers are being forced to change their tactics and employ malware-less, "living-off-the-land" approaches to hide their malicious activity. "It is rare that 'exploitation' is the first hook into the environment anymore," Nickerson says. "Now tools and technology are required to observe normal system functions to determine if they are being used maliciously."

Lares recently analyzed data from hundreds of pen-test engagements to see what similarities it could find across enterprise networks. The results showed that accounts with weak and easily guessable passwords continue to be the biggest problem for most organizations. Other common vulnerabilities and attack vectors include weaknesses related to Kerberos authentication, excessive file system permissions, Window Management Interface (WMI)-enabled lateral movement, inadequate network segmentation, and improper access control.

Other pen-testing firms have found similar issues. In a report last year, Coalfire identified out-of-date software as the most commonly present threat in organizations where it conducted pen tests. Like Lares, Coalfire discovered that password flaws were a big problem. as was patch management, insecure protocols. and configuration protocols.

For security vendor Rapid7, meanwhile, the most common security issues that its pen testers encountered included weak transport layer security and vulnerabilities related to password management. In 72% of engagements, Rapid7 researchers were able to capture a user credential using generic password spraying, known defaults, or easily guessable passwords.

"Taken together, these information exposure issues do tend to be serious enough to report out to the client," says Tod Beardsley, director of research at Rapid7. "But penetration testers are rarely able to exercise these vulnerabilities to traverse the boundary between external and internal networks."  

That's because in many instances, the network segmentation controls that organizations have implemented to separate internal and external networks appear to be working effectively, Rapid7 said in a pen test report of its own last year.

In externally based pen tests last year, Rapid7's pen testers were only able to gain internal LAN access just 21% of the time. In assessments of Web application security, Rapid7 testers were able to achieve total sitewide compromise just 3% of the time. The vendor found that the ongoing move to the cloud and the growing use of services like AWS, Microsoft Azure, and Google Cloud to host Web applications and data has made life significantly harder for attackers.

For internally focused engagements, Rapid7 found that most vulnerabilities and exploits were Windows-related simply because most internal environments are also Windows-based. Windows remote administration technologies like WMI and PsExec continue to provide opportunities for attackers to move laterally on breached networks. Rapid7 found that SMB relaying remains the most popular technique for attackers to gain an initial foothold. But like other pen-testing firms, Rapid7's own experience suggests that organizations are tightening their controls, Beardsley says.

Slow Improvement
"Enterprise security among the organizations that we pen test seems to be slowly but surely getting better," Breadsley says. "But we still struggle with the fundamentals: password management, network segmentation, and legacy systems."

One major issue that organizations still need to work through is what Lares' Nickerson describes as a "tooling debt." Over the years, many organizations have spent millions on security tools and have kept adding and churning through them. This has created a situation where organizations often have a large number of poorly integrated tools. "This is something we see at all layers of the program," Nickerson says.

Even with major technologies such as SIEM and SOAR platforms, some organizations can change them upward of three times in five years. "This turbulence in defense makes it quite hard for customization to stay in effect," Nickerson says. "Often, an alert or detection that was made from a previous test is lost" in the chaos.

According to pen-testing firms, the vulnerabilities and attack vectors they commonly encounter remain mostly the same regardless of the organization's size. But there are some differences. PowerShell-related exploits, for instance, are becoming less of a threat to the enterprise because larger organizations are adding more restrictions around its use, Beardsley says.

Similarly, while both large and small organizations have issues related to patch management, the reasons for the exposure are different. Small and midsize organizations often are reluctant to deploy patches because of concerns over "breaking" their system, says Nickerson.

"In the enterprise, it ends up being the sheer size of the environment," he adds. "There always seems to be a legacy box lurking in the corners, outside of the purview of the patch management program or asset inventory."

Related Content:

A listing of free products and services compiled for Dark Reading by Omdia analysts to help meet the challenges of COVID-19. 

 

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Cybersecurity Home-School: The Robot Project."

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
seven_stones
50%
50%
seven_stones,
User Rank: Apprentice
4/22/2020 | 7:07:40 PM
Disagree mostly
External testing - the testing restrictions (strict control over source address and use of 0days) make it v hard to break in via a DMZ. Other ways are easy though. And once inside a network - its wide open. Always. Nothing changed since 2001 - if anything it got worse. Loss of focus on the basics.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/4/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13768
PUBLISHED: 2020-06-04
In MiniShare before 1.4.2, there is a stack-based buffer overflow via an HTTP PUT request, which allows an attacker to achieve arbitrary code execution, a similar issue to CVE-2018-19861, CVE-2018-19862, and CVE-2019-17601. NOTE: this product is discontinued.
CVE-2020-13849
PUBLISHED: 2020-06-04
The MQTT protocol 3.1.1 requires a server to set a timeout value of 1.5 times the Keep-Alive value specified by a client, which allows remote attackers to cause a denial of service (loss of the ability to establish new connections), as demonstrated by SlowITe.
CVE-2020-13848
PUBLISHED: 2020-06-04
Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.
CVE-2020-11682
PUBLISHED: 2020-06-04
Castel NextGen DVR v1.0.0 is vulnerable to CSRF in all state-changing request. A __RequestVerificationToken is set by the web interface, and included in requests sent by web interface. However, this token is not verified by the application: the token can be removed from all requests and the request ...
CVE-2020-12847
PUBLISHED: 2020-06-04
Pydio Cells 2.0.4 web application offers an administrative console named “Cells Console� that is available to users with an administrator role. This console provides an administrator user with the possibility of changing several settings, including the applicat...