Penetration Testing mailing list archives
Re: Pen Testing for investigators
From: Security Professional <redteamer () gmail com>
Date: Tue, 20 Sep 2005 08:31:56 -0400
Ish, I changed the subject in my response because to be honest, I don't think investigators, law enforcement officers, and the like need to focus as much on pen testing, as they do with forensic analysis (hardware and network), Intrusion analysis, law, etc. Traditionally, pen testing is left to a whole other group. That being said, it is still somewhat understandable that you would still want to provide an overview of pen testing to broaden horizons. So, here is my opinion on a few courses and classes (most of which I have taken and recommend): 1) Intrusion Detection Training and Packet Analysis - This to me is one of the most important pieces of training if you are in the field of incident handling or intrusion detection. To me, there is one class which stands up above the rest and that is the SANS Track 3 course. Now, opinions aside on what they have done recently with the certification (GCIA) requirements, this class is one of the most intense courses I have gone through. The amount of packet level analysis and IDS analysis that you do will make your head hurt. I highly recommend this class to everyone I meet. 2) Forensic Analysis (Hardware) - Since we are mostly an Encase shop, I can only speak about Encase training. I do know that SANS also offers a Forensics course (I think it is Track 8), but I have not been so I cannot speak on that one. That being said, I would go to whatever vendor you decide to use for software, and ask them for training. This is probably your best best for understanding the software that your guys will be using in the field. Sorry, not a lot of help here on this one. 3) Malcode analysis - I don't know if you guys will be getting into this, but if you are, there are two options I would suggest here. One is a SANS certification called GREM ( http://www.giac.org/certifications/security/grem.php). A few of my colleagues have gotten this certification and it seems to have helped them a great deal. Also, if you are looking for a cheaper alternative to this, you can do what many of us have done and train yourself. Quite honestly, the best way I feel to learn how different malcode works / operates is to play with it yourself. Get yourself a copy of regmon, filemon, Tripwire, etc., and set up a little test LAN with a router and simulate a normal network environment. Run the code, analyze the packets, look at what registry settings are changed, see what files are created, changed, or accessed, and you will be well on your way. Please keep in mind that this is a very technically oriented job duty and is not for the everyday Joe just wanting to dabble. 4) Pen Testing - This is what your original question was asking for, but as I stated earlier, I don't know if you really understand what you were asking (please take no offense...this is just my opinion). Pen Testing and classes that supposedly teach it have become all the rage lately and quite frankly, I have yet to see a class that truly teaches someone how to be a Pen Tester. That being said, there are a few courses out there that will allow your guys to get their feet wet and get a base knowledge if that is what you are looking for. The best Intro course I have attended to date was the CEH class (Certified Ethical Hacker). This class does not delve deep into the advanced techniques, but does provide a broad sweep and understanding into how a Pen Test is performed and the every day tools used in the process. Also, I recently attended NSA's IAM and IEM courses which in my opinion, give a nice overall view on a methodology to use when doing an evaluation. Also, ISECOM offers two classes based on the OSTMM that teach a somewhat different methodology. Again, please keep in mind that it is somewhat not the norm when you use the words Law Enforcement Officer, Forensics Analyst, and Pen Tester in the same sentence. These are usually three, at the least two, completely separate job functions that are performed within an organization. I have yet to stumble across an employer who wants their badge waivers to also be Pen Testers, Intrusion Analysts, and Forensics Analysts at the same time (at least in the Govt. side of things). I hope this helps you out a bit. Everyone has their own opinions on all these courses and subject matter, so please take this as an OPINION and nothing more. In no way am I saying that this is the path you should follow. Take care. - Brian Bartholomew
Current thread:
- Pen Testing for investigators J Isherwood (Sep 19)
- <Possible follow-ups>
- Re: Pen Testing for investigators Don Parker (Sep 19)
- Re: Pen Testing for investigators Security Professional (Sep 20)
- Re: Pen Testing for investigators eutaw_uass (Sep 20)
- RE: Pen Testing for investigators Craig Wright (Sep 21)
- Looking for HP Laserjet emulator Max (Sep 27)