Thursday, January 2, 2014

2014: The Age of Pentest Apocalypse.

Happy new year everyone.

We are entering 2014. After doing pentest for so many years.... I can safely say "Penetration Testing is Dead". I am not the first person to declare such statement . Popping a remote shell and rooting is quite challenging for the last 2 years (challenging but not impossible).

Summary from year 2013.

1. Secured Framework is being deployed widely .
2. IPS/IDS being deployed widely (Juniper/Bluecoat/blax3) .
3. HIPS becoming quite common  (whitelisting application)
4. SQL Injection /XSS /Remote Code Exec  still exist . But no longer straightforward ,it's quitre rare to see ' or 1=1 # , but sometimes ' or  RAND() > 0.5 still works , wide usage of WAF
5. VA is deadly inaccurate...... (it might cover most but not all).
6. Local clients are willing to sign up for more offensive security testing approach. (brutefoce attack , sniffing etcx3).
7. Weak/Default credential seems to be the weakest link of all time.

mandatory Skills required in this age.

1. The Art Of Tunneling and Pivoting... It's mandatory to mitigate firewall.
2. Bypassing Antivirus IDS IPS.. need to say more, implementing own VM....
3. Bypassing HIPS, executing unlisted/blacklisted binary outside whitelist domain usually windows
4. Bypassing noexec()... knowledge on ld based rootkit might help. usually nix
5. Forensics and Anti-Forensics technique.
6. Modifiying PoC exploits to suitable your needs.. ms08-067 is just not there anymore  lolz.

Expect to see more revolution in 2014 pentest.!!!



P/S: If someone comes and around and **shitng u about great Tools. Tell em pentest is dead.


No comments: