Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create a Penetration Testing plan #40

Closed
2 of 6 tasks
ExperimentsInHonesty opened this issue Aug 11, 2022 · 12 comments
Closed
2 of 6 tasks

Create a Penetration Testing plan #40

ExperimentsInHonesty opened this issue Aug 11, 2022 · 12 comments

Comments

@ExperimentsInHonesty
Copy link
Member

ExperimentsInHonesty commented Aug 11, 2022

Overview

We need to create a Penetration Test Methodology for Hack for LA projects so that we can integrate routine security testing into each project.

Action Items

  • review some websites
  • define a process and documentation
    • templates
      • repos
      • hosted applications
      • drives

Resources/Instructions

A site which defines the process https://www.imperva.com/learn/application-security/penetration-testing/

@KHGonzalez
Copy link
Member

What are the priorities?

Internal information needs to be audited prior to perform an external penetration testing plan.

Small guide Cybersecurity for Nonprofits: Best practices

First Step - Risk Assessment

Will follow Template / Guide on this link

Inventory all the data that we collect. Where is it stored?

Excel template for information identification and classification has been created.

@ExperimentsInHonesty
Copy link
Member Author

@KHGonzalez Please provide update

  1. Progress: "What is the current status of your project? What have you completed and what is left to do?"
  2. Blockers: "Difficulties or errors encountered."
  3. Availability: "How much time will you have this week to work on this issue?"
  4. ETA: "When do you expect this issue to be completed?"
  5. Pictures or links* (if necessary): "Add any pictures or links that will help illustrate what you are working on."
  • remember to add links to the top of the issue if they are going to be needed again.

@ExperimentsInHonesty
Copy link
Member Author

@KHGonzalez We have not heard from you since you last commented on this issue, so we are assuming you have left hack for la. If you want to come back and or reassign yourself to this issue, feel free. But in the meantime, I am putting it back into the prioritized backlog.

@sgordi
Copy link
Member

sgordi commented Feb 1, 2023

Taking lead on this project if that is okay. Below I have a testing methodology I wrote up to get the ball rolling.

**Planning and Preparation:**
    - Define the scope and objectives of the test
    - Identify the stakeholders and their requirements
    - Obtain necessary approvals and sign offs
    - Gather information about the target systems and networks

**Reconnaissance:**
    - Collect information about the target organization, its employees, network, and systems
    - Use tools and techniques like OSINT, WHOIS, and DNS reconnaissance to gather information

**Threat Modeling:**
    - Identify potential threats to the organization
    - Evaluate the impact and likelihood of each threat

**Vulnerability Assessment:**
    - Identify vulnerabilities in the target systems and networks
    - Use tools like network and web application scanners to automate the process
    - Validate the findings manually

**Exploitation:**
    - Attempt to exploit the identified vulnerabilities
    - Test the security controls and response mechanisms in place

**Reporting:**
    - Document the findings and provide recommendations
    - Present the results to the stakeholders
    - Provide a roadmap for remediation

**Follow-Up:**
    - Monitor the remediation process
    - Perform additional tests to verify the effectiveness of the remediation efforts

@sgordi
Copy link
Member

sgordi commented Feb 1, 2023

Setup a Security Management folder on the shared drive that can be found at DevOps (Communities of Practice)

I also took the liberty of running a web scan on a personal test site with Nikto and posted the log results as a baseline. Although not a complete and thorough scan it's a good starting point for the Ops Team.

@ExperimentsInHonesty
I added a document with the methodology I had written above. Additionally, I wrote a quick info and process doc for Nikto and how it would be used for scanning. I would like to go ahead and start following standard practice and put in a request to scan a hfla site (preferably a temporary test site, if not a site with the least traffic + after hours scan) pending yours and the Ops Team's approval.

These are my initial findings of course and if there are additional steps + precautions you need me to take please let me know.

@sgordi
Copy link
Member

sgordi commented Feb 1, 2023

Blockers: @ExperimentsInHonesty I did a DNS lookup for the hfla primary site. It appears that the website is proxied by it's DNS provider Cloudflare. This means that the IP that leads to the website isn't the IP for hfla but the IP for Cloudflare's DNS servers.

A vulnerability scan for hfla would have to be in collaboration with the site admin in order to turn off the Cloudflare proxy temporarily to complete the scan. Will document how this process should look like on the Security Management folder.

@JasonEb
Copy link
Contributor

JasonEb commented May 31, 2023

@sgordi any update on this ever since? I see your work at https://drive.google.com/drive/folders/1FqEkm1O5fJrr3UHF42CQcFmzTa9bMquY, it's pretty profound. Not sure if there's anything more you want to share, but looks like we can close this ticket. If there's more to do we can open another one

@hkatzdev

This comment was marked as outdated.

@chelseybeck
Copy link
Member

I'm moving this back to new issue review for refinement. Great work was done here and I want to make sure that it's reviewed and documented in the right place (likely the wiki)

@freaky4wrld
Copy link
Member

@chelseybeck please specify your question as of what you are asking here?

@ExperimentsInHonesty
Copy link
Member Author

This issue is being moved to the new issue approval column so that a CoP lead can summarize all the notes that are necessary in order for a new person to take on this issue, and add that to the top and hiding all the comments. The goal here is to make the issue clear for a new person, while taking advantage of all the work that went into it so far.

@chelseybeck
Copy link
Member

Leads met and agreed that we should close this issue as there is nothing to pen test when we use cloud services

@chelseybeck chelseybeck closed this as not planned Won't fix, can't repro, duplicate, stale May 9, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Development

No branches or pull requests

7 participants