The Importance of Pentesting

Protect your company against hackers, not lamers

Blog The Importance of Pentesting

| 4 min read

Contact us

Without a doubt, the recent events in relation to the infringement of privacy, such as the theft of personal information from celebrities, the Sony, Target, and Equifax hacks, and the big ransomware that affected Telefónica, make us reflect on how organizations protect their information.

In an economy greatly influenced by the digital era, where technology platforms are increasingly integrated into businesses and where changes and time-to-market have to be faster and faster, cybersecurity risks for companies are growing. Even more so when they focus only on meeting required security standards rather than actually being conscious of what is happening and what they are protecting themselves from.

In a rush to feel secure at a very low cost, many companies incur great risks by running "good security tests." They believe that these cheap assessments are enough to prove that they are secure, that they can meet the business needs and that it's fitting to release their software to production.

It's here where the so-called "lamers" come into play, who are essentially individuals or organizations that not only claim to have a certain expertise that they don't actually possess but also are not willing to learn. Technological societies come to call them out and label them as incompetent. In layman's terms, a lamer is someone who has below-average knowledge, some tools at their disposal and, obviously, knows how to google.

But, what does a lamer have to do with your company's sense of security?

Security testing is among the processes and controls companies implement to protect themselves. Organizations believe they are meeting the required security testing standards when they implement specific tools that perform vulnerability scans to comply with what their security areas require from the development teams to approve each software release. However, if the difference between vulnerability scanning and ethical hacking or pentesting is unclear, it can create a false sense of security, putting organizations at risk.

A vulnerability scan or analysis is a test performed by an automated tool to verify whether the ToE (target of evaluation) has known vulnerabilities previously reported in a central database such as the CVE (Common Vulnerabilities and Exposures). This implies that vulnerability scanning alone is not capable of discovering zero-day vulnerabilities. Anyone (a lamer) is capable of running an automated tool. However, the most challenging work comes afterward, analyzing the results and discarding the false positives (close to 35% of what is reported).

A vulnerability scan usually identifies exposed services with default passwords, weak authentication controls, outdated software, missing patches, etc. Security tests based on automated tools (vulnerability scanning with selective exploitation) cannot detect architectural design and implementation flaws from the attacker's point of view. Therefore, the vulnerability exploitation some vendors can make from these tests is based solely on the results obtained by the scanners and not on the attackers' cunning and ability to interpret the environment.

injection

SQL injection exploit by acuberos.

Unlike vulnerability scanning, pentesting aims to simulate a real attack scenario to evaluate the performance of implemented security controls and the potential impacts on a company's systems and assets. Pen testing allows vulnerabilities to be correlated, which is how an attacker would seek to cause the greatest possible damage to a company. Since teams of developers may constantly be modifying an organization's systems, it is advisable to perform continuous pentesting so that they can deploy significantly more secure versions than they would otherwise.

Get started with Fluid Attacks' Penetration Testing as a Service right now

Finding

Example of vulnerability correlation for attacks.

One of the most critical factors that ethical hacking aims to avoid is the potential effects of exploiting vulnerabilities. This can be achieved by executing ethical hacking with 100% coverage, in other words, by thoroughly evaluating the target.

The only way to determine the assessment coverage is to delimit the test to be performed properly. There must be a standard measure for this, so we propose to delimit ethical hacking by a known and previously set scope.

The way to achieve this is to normalize the factors on which the tests are based. Thus, if we are going to perform application security testing, we must determine the number of input fields. If we are going to execute infrastructure security testing, we must establish the number of open ports. Finally, if we are going to run source code analysis, we need to define the number of lines of code.

Once the above scopes are clearly defined, we can feel confident that everything related to the targets will be adequately evaluated. This differs from testing with automated tools, which are bounded based on execution time and only exploit a portion of the reported vulnerabilities.

Next up, a table that helps us synthesize all the items previously described:

Pentesting vs. vulnerability scanning

CriteriaPentesting (Fluid Attacks)Vulnerability scanning (others)
MethodHybrid (automated tools + expert intelligence)Static (automated tools)
ModelRed teamingVulnerability analysis with selective exploitation
CoverageVariableVariable
Scope definitionBased on open TCP ports, visible or invisible form input fields and application headersBased on IP/hosts and URLs
Professional profileOSCP, OSWP, CEHCEH
RetestYesNo
Exploitation100%Variable
False positivesNoYes (~20%)
Creation of own exploitsYesNo
Zero-day vulnerabilitiesYesNo
Finding typesOf a specific business impact: insecure programming practices and alignment with security standards or regulationsBased on signatures and syntax
Leaks0% of the target of evaluation~65% of the target of evaluation
Type of evidenceImages, GIFs or short videosAutomated tool output and images
DeliverablesExploit evidence and high-level remediation suggestionsSummary report

Fortunately, when pentesting is done with Fluid Attacks, our skilled engineers can easily create their own exploits thanks to their programming expertise. In many cases, this allows them to exploit zero-day vulnerabilities and report them asap so that companies can implement the necessary security controls quickly. In addition, by continuously performing penetration tests, security responsibilities do not slow down the speed of software development in organizations. In short, pentesting, within a vulnerability management strategy, is a very beneficial technique for improving the detection of security issues in IT systems.

From now on, when it is necessary to perform security tests because the organization or current regulations require it, ask yourself, do I want to protect myself against a lamer or a hacker?

Share

Subscribe to our blog

Sign up for Fluid Attacks' weekly newsletter.

Recommended blog posts

You might be interested in the following related posts.

Photo by Clay Banks on Unsplash

Protecting your PoS systems from cyber threats

Photo by Charles Etoroma on Unsplash

Top seven successful cyberattacks against this industry

Photo by Anima Visual on Unsplash

Challenges, threats, and best practices for retailers

Photo by photo nic on Unsplash

Be more secure by increasing trust in your software

Photo by Dmitry Ant on Unsplash

How it works and how it improves your security posture

Photo by The Average Tech Guy on Unsplash

Sophisticated web-based attacks and proactive measures

Photo by Randy Fath on Unsplash

The importance of API security in this app-driven world

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.