New Risks in Penetration Testing
In a recent IPS (Intrusion Prevention System) deployment, I noticed that the newest version of the OS for the appliance I was putting in had a new feature - "Reputation Filtering". How this works from a customer point of view is:
- if an inbound attack is seen, the IPS reports the attacker and the attack back to the reputation service. This affects the reputation of the attacking IP address
- The reports of all users of the reputation service are aggregated, and attackers are "scored"
- Traffic inbound into the network is evaluated against the reputation database, such that traffic from lower reputation addresses is penalized from an IPS detection perspective
Since I work on the attack side of the things as well as the defence side, this got me thinking about Penetration Testing and Vulnerability Assessments. This now means that when Pentesting, care should be taken in selecting the public ip address that you mount attacks from. If you attack from home or from a free desk at work, you may find that because of this new Reputation Filtering feature, you've just blocklisted an IP address that you need every day to do "real work". You might be blocklisting your entire company, or even worse, your spouse (from personal experience - you just never want to do this ! ).
This adds another factor into the process of deciding where exactly you should run a Penetration Test or Vulnerability Assessment from. Other factors might include:
- ensuring that your ISP does not filter suspicious traffic, or in fact any ISP between you and your target
- ensuring that your activity is actually legal on all ISP's between you and your target
- if using GHDB (Google Hacking Database) methods, you can blocklist your public IP with Google (spouses hate this too!)
- If the client uses load balancers, you may find that subsequent tests might be against different hosts
All these factors conspire to move your penetration test or vulnerability assessment as close as possible to the target systems. Using the same ISP as your target is often a reasonable solution, but if you can negotiate it, using a free ip address and switch port on your target's external network takes care of a many of these issues nicely.
=============== Rob VandenBrink, Metafore ===============
Comments
Steven Chamberlain
Feb 22nd 2010
1 decade ago
Depending on how an IPS' 'problem child' database is maintained, this could be a useful thing - though one would expect that unlike spam, more of the kinds of attacks that are really harmful would involve automated recon from compromised hosts and a low and slow exploitation of the automated results from a different set of IPs under direct control. The hope, I suppose, is that different attackers' list of usable IPs would overlap, so that attacker A would already have advertised the botnet which attacker B was hoping to stage a manual attack through.
peter
Feb 22nd 2010
1 decade ago
tcptraceroute is your friend when trying to sort out this kind of issue.
David
Feb 22nd 2010
1 decade ago
Frank
Feb 23rd 2010
1 decade ago
IP based blacklisting is always a losing proposition.
If I want to wreck a network's "reputation" with a service like this, all I have to do is pick a network that doesn't do source IP egress filtering (practically every network), and blast you with malicious-looking stateless traffic (UDP/ICMP) with spoofed source IPs of the network I want to have blacklisted.
Stupid.
Mark
Feb 23rd 2010
1 decade ago
Also, I think that blacklisting one's spouse every time and again adds a certain spice to the relationship.
William
Feb 23rd 2010
1 decade ago
Frank
Feb 23rd 2010
1 decade ago
I'm just not sure that it helps a network's security all that much though to use these as blacklists, since a targetted attack may come from a clean IP address.
Steven Chamberlain
Feb 23rd 2010
1 decade ago
Frank
Feb 23rd 2010
1 decade ago
https://www.eccouncil.org/certification/licensed_penetration_tester.aspx
Smith
Smith
Feb 24th 2010
1 decade ago