vault backup: 2024-08-24 21:44:58

This commit is contained in:
Anton Nesterov 2024-08-24 21:44:58 +02:00
parent 35aa42f6d0
commit 0938fe66f4
No known key found for this signature in database
GPG key ID: 59121E8AE2851FB5
15 changed files with 280 additions and 89 deletions

BIN
.DS_Store vendored Normal file

Binary file not shown.

4
.obsidian/app.json vendored
View file

@ -1 +1,3 @@
{} {
"alwaysUpdateLinks": true
}

View file

@ -1,4 +1,3 @@
[ [
"drawio-obsidian",
"obsidian-git" "obsidian-git"
] ]

View file

@ -1,10 +0,0 @@
{
"welcomeComplete": true,
"theme": {
"dark": null,
"layout": "full"
},
"drawing": {
"sketch": true
}
}

File diff suppressed because one or more lines are too long

View file

@ -1,10 +0,0 @@
{
"id": "drawio-obsidian",
"name": "Diagrams",
"version": "1.5.0",
"minAppVersion": "0.9.12",
"description": "Draw.io diagrams for Obsidian. This plugin introduces diagrams that can be included within notes or as stand-alone files. Diagrams are created as SVG files (although .drawio extensions are also supported).",
"author": "Sam Greenhalgh",
"authorUrl": "https://www.radicalresearch.co.uk/",
"isDesktopOnly": true
}

View file

@ -1,28 +0,0 @@
.progress-bar-line {
width: 100%;
left: 0;
}
.progress-bar-indicator {
width: 90%;
margin: 0 10%;
}
.diagram-view svg {
max-width: 100%;
max-height: 100%;
display: block;
}
.diagram-view svg a:link,
.diagram-view svg a:visited {
color: var(--interactive-accent, #00f);
filter: drop-shadow(
0 0 3px rgba(var(--interactive-accent-rgb, "0, 0, 255"), 0.5)
);
}
.diagram-view svg a:hover {
color: var(--interactive-accent-hover, #00f);
filter: drop-shadow(0 0 3px var(--interactive-accent-hover, #00f));
}

View file

@ -4,16 +4,16 @@
"type": "split", "type": "split",
"children": [ "children": [
{ {
"id": "dfa4a56144cd5b62", "id": "9ce37b2adfa353ad",
"type": "tabs", "type": "tabs",
"children": [ "children": [
{ {
"id": "6e35c33355be0706", "id": "dd62e704c8bd0cbe",
"type": "leaf", "type": "leaf",
"state": { "state": {
"type": "markdown", "type": "markdown",
"state": { "state": {
"file": "01 - Planning Considerations.md", "file": "templates/REPORT TEMPLATE.md",
"mode": "source", "mode": "source",
"source": false "source": false
} }
@ -32,16 +32,6 @@
"id": "632bce2f74bfdfc3", "id": "632bce2f74bfdfc3",
"type": "tabs", "type": "tabs",
"children": [ "children": [
{
"id": "3884b7735138f109",
"type": "leaf",
"state": {
"type": "file-explorer",
"state": {
"sortOrder": "alphabetical"
}
}
},
{ {
"id": "2fc1292cd3d73710", "id": "2fc1292cd3d73710",
"type": "leaf", "type": "leaf",
@ -64,8 +54,19 @@
"type": "bookmarks", "type": "bookmarks",
"state": {} "state": {}
} }
},
{
"id": "237c3890441a3c0a",
"type": "leaf",
"state": {
"type": "file-explorer",
"state": {
"sortOrder": "alphabetical"
}
}
} }
] ],
"currentTab": 2
} }
], ],
"direction": "horizontal", "direction": "horizontal",
@ -85,7 +86,7 @@
"state": { "state": {
"type": "backlink", "type": "backlink",
"state": { "state": {
"file": "01 - Planning Considerations.md", "file": "templates/REPORT TEMPLATE.md",
"collapseAll": false, "collapseAll": false,
"extraContext": false, "extraContext": false,
"sortOrder": "alphabetical", "sortOrder": "alphabetical",
@ -102,7 +103,7 @@
"state": { "state": {
"type": "outgoing-link", "type": "outgoing-link",
"state": { "state": {
"file": "01 - Planning Considerations.md", "file": "templates/REPORT TEMPLATE.md",
"linksCollapsed": false, "linksCollapsed": false,
"unlinkedCollapsed": true "unlinkedCollapsed": true
} }
@ -125,7 +126,7 @@
"state": { "state": {
"type": "outline", "type": "outline",
"state": { "state": {
"file": "01 - Planning Considerations.md" "file": "templates/REPORT TEMPLATE.md"
} }
} }
} }
@ -146,10 +147,22 @@
"command-palette:Open command palette": false "command-palette:Open command palette": false
} }
}, },
"active": "6e35c33355be0706", "active": "dd62e704c8bd0cbe",
"lastOpenFiles": [ "lastOpenFiles": [
"templates/pentest-report-template.md", "templates/Untitled Diagram.svg",
"templates/METHODOLOGY.svg",
"templates/REPORT TEMPLATE.md",
"Pasted image 20240824205517.png",
"01 - Planning Considerations.md", "01 - Planning Considerations.md",
"2024-08-24.md",
"Untitled.md",
"templates/legal/DPA-en.odt",
"templates/legal/MSA-en.odt",
"templates/legal/NDA-en.odt",
"templates/legal/Untitled.md",
"templates/legal/NDA.md",
"templates/legal",
"Untitled",
"templates", "templates",
"().md", "().md",
"Welcome.md" "Welcome.md"

View file

@ -14,7 +14,6 @@ Asses reasons for the assessment. Security, risk assessments, customer personal
Establish guidelines (or necessity) for compliance with internal and external regulations. Establish guidelines (or necessity) for compliance with internal and external regulations.
Example: PCI DSS Example: PCI DSS
## Resources ## Resources
1. Define budgeting requirements for the campaign. 1. Define budgeting requirements for the campaign.
@ -32,8 +31,7 @@ Example: PCI DSS
## Product/Report ## Product/Report
Establish reporting guidelines Establish reporting guidelines
[Report Template](./templates/pentest-report-template.md) [[REPORT TEMPLATE]]
## Technical Constraints ## Technical Constraints
@ -41,5 +39,4 @@ Identify and establish all technical restrictions during the engagement. What pa
## Comprehensiveness ## Comprehensiveness
Identify specifics on the engagement, what parts of the infrastructure is tested, what type of vulnerabilities, etc. Identify specifics on the engagement, what parts of the infrastructure is tested, what type of vulnerabilities, etc.

BIN
templates/.DS_Store vendored Normal file

Binary file not shown.

View file

@ -0,0 +1,243 @@
## EXECUTIVE SUMMARY
[TEAM NAME] performed a security assessment of the internal corporate network of [CLIENT NAME] on [TEST DATE]. [TEAM NAME]s penetration test simulated an attack from an external threat actor attempting to gain access to systems within the [CLIENT NAME] corporate network. The purpose of this assessment was to discover and identify vulnerabilities in [CLIENT NAME]s infrastructure and suggest methods to remediate the vulnerabilities. [TEAM NAME] identified a total of [VULN TOTAL NUM] vulnerabilities within the scope of the engagement which are broken down by severity in the table below.
|CRITICAL|HIGH|MEDIUM|LOW|
|--|--|--|--|
|**1**|**2**|**2**|**1**|
The highest severity vulnerabilities give potential attackers the opportunity to [BAD ACTIONS THAT COULD OCCUR HERE - FULL PARAGRAPH WITH HIGH-LEVEL DETAIL]. In order to ensure data confidentiality, integrity, and availability, security remediations should be implemented as described in the security assessment findings. 
Note that this assessment may not disclose all vulnerabilities that are present on the systems within the scope. Any changes made to the environment during the period of testing may affect the results of the assessment.
[Optional - Big Issue] Recommendation
This is an optional paragraph that discusses a very critical series of business failures (e.g. failure to adhere to applicable legal regulations) that isnt a technical vulnerability but still should be brought to the attention of the executive team.
---
## HIGH LEVEL ASSESSMENT OVERVIEW
### Observed Security Strengths
[TEAM NAME] identified the following strengths in [CLIENT NAME]s network which greatly increases the security of the network. [CLIENT NAME] should continue to monitor these controls to ensure they remain effective.
[Strength Category]
- Great thing we saw here that causes us issues (which is a good thing)
- Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. 
### Areas for Improvement
[TEAM NAME] recommends [CLIENT NAME] takes the following actions to improve the security of the network. Implementing these recommendations will reduce the likelihood that an attacker will be able to successfully attack [CLIENT NAME]s information systems and/or reduce the impact of a successful attack.
### Short Term Recommendations
[TEAM NAME] recommends [CLIENT NAME] take the following actions as soon as possible to minimize business risk. 
[Recommendation Category]
- [Individual Recommendation]
- Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. 
### Long Term Recommendations 
[TEAM NAME] recommends the following actions be taken over the next [NUM] months to fix hard-to-remediate issues that do not pose an urgent risk to the business.
[Recommendation Category]
- [Individual Recommendation]
- Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
---
### SCOPE
All testing was based on the scope as defined in the Request For Proposal (RFP) and official written communications. The items in scope are listed below.
Networks
| | |
|---|---|
|**Network**|**Note**|
|10.0.1.0/24|Network for Corporate HQ|
|10.0.2.0/24|Gotham, NY, branch site|
Other
| | | |
|---|---|---|
|**Name**|**System Type**|**Note**|
|IVR System|Phone|555-555-1234|
Provided Credentials
[CLIENT NAME] provided [TEAM NAME] with the following credentials and access to facilitate the security assessment listed below.
| | |
|---|---|
|**Item**|**Note**|
|Customer Account|(testuser@example.com) A fake customer account in the XXXX application for testing functionality that requires authentication.|
|IVR Testing Phone|(555-555-5678) Specific phone to use for IVR system testing.|
---
### TESTING METHODOLOGY
[TEAM NAME]s testing methodology was split into three phases: _Reconnaissance_, _Target Assessment_, and _Execution of Vulnerabilities_. During reconnaissance, we gathered information about [CLIENT NAME]s network systems. [TEAM NAME] used port scanning and other enumeration methods to refine target information and assess target values. Next, we conducted our targeted assessment. [TEAM NAME] simulated an attacker exploiting vulnerabilities in the [CLIENT NAME] network. [TEAM NAME] gathered evidence of vulnerabilities during this phase of the engagement while conducting the simulation in a manner that would not disrupt normal business operations.
The following image is a graphical representation of this methodology.
[DIAGRAM]
---
### CLASSIFICATION DEFINITIONS
#### Risk Classifications
| | | |
|---|---|---|
|**Level**|**Score**|**Description**|
|**Critical**|**10**|The vulnerability poses an immediate threat to the organization. Successful exploitation may permanently affect the organization. Remediation should be immediately performed.|
|**High**|**7-9**|The vulnerability poses an urgent threat to the organization, and remediation should be prioritized.|
|**Medium**|**4-6**|Successful exploitation is possible and may result in notable disruption of business functionality. This vulnerability should be remediated when feasible.|
|**Low**|**1-3**|The vulnerability poses a negligible/minimal threat to the organization. The presence of this vulnerability should be noted and remediated if possible.|
|**Informational**|**0**|These findings have no clear threat to the organization, but may cause business processes to function differently than desired or reveal sensitive information about the company.|
#### Exploitation Likelihood Classifications
| | |
|---|---|
|**Likelihood**|**Description**|
|**Likely**|Exploitation methods are well-known and can be performed using publicly available tools. Low-skilled attackers and automated tools could successfully exploit the vulnerability with minimal difficulty.|
|**Possible**|Exploitation methods are well-known, may be performed using public tools, but require configuration. Understanding of the underlying system is required for successful exploitation.|
|**Unlikely**|Exploitation requires deep understanding of the underlying systems or advanced technical skills. Precise conditions may be required for successful exploitation.|
#### Business Impact Classifications
| | |
|---|---|
|**Impact**|**Description**|
|**Major**|Successful exploitation may result in large disruptions of critical business functions across the organization and significant financial damage.|
|**Moderate**|Successful exploitation may cause significant disruptions to non-critical business functions.|
|**Minor**|Successful exploitation may affect few users, without causing much disruption to routine business functions.|
#### Remediation Difficulty Classifications
| | |
| -------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| **Difficulty** | **Description** |
| **Hard** | Remediation may require extensive reconfiguration of underlying systems that is time consuming. Remediation may require disruption of normal business functions. |
| **Moderate** | Remediation may require minor reconfigurations or additions that may be time-intensive or expensive. |
| **Easy** | Remediation can be accomplished in a short amount of time, with little difficulty. |
---
### ASSESSMENT FINDINGS
| | | | | |
|---|---|---|---|---|
|**Number**|**Finding**|**Risk Score**|**Risk**|**Page**|
|1|Example Vulnerability Finding|**9**|**High**|11|
|2|Firewall Rule Set Not Best Practice|**8**|**High**|12|
|3|Outdated Software|**6**|**Medium**|69|
|4|Multiple XYZ Vulnerabilities|**5**|**Medium**|420|
|5|Fake Finding|**2**|**Low**|6969|
### 1. Example Vulnerability Finding
 
| | |
| --------------------------- | ------------ |
| **HIGH RISK (8/10)** | |
| **Exploitation Likelihood** | **Possible** |
| **Business Impact** | **Severe** |
| **Remediation Difficulty** | **Easy** |
**Security Implications**
This is where you give a 1-2 sentence description about the major impact of the finding. This finding is very important because it can destroy the entire business if left unchecked.
**Analysis**
Longer discussion of the finding. Includes screenshots. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum (see Appendix 1).
```
#CODE
```
**Recommendations**
- Remove XYZ to make things more secure
- If you can not remove XYZ do this…
**References  (opt)**
- [https://github.com/Sevaarcen/RADAR/tree/master/radar/playbooks](https://github.com/Sevaarcen/RADAR/tree/master/radar/playbooks)
- [https://owasp.org/www-project-top-ten/](https://owasp.org/www-project-top-ten/)
---
### APPENDIX A - TOOLS USED
| | |
|---|---|
|**TOOL**|**DESCRIPTION**|
|**BurpSuite Community Edition**|Used for testing of web applications.|
|**Metasploit**|Used for exploitation of vulnerable services and vulnerability scanning.|
|**Nmap**|Used for scanning ports on hosts.|
|**OpenVAS**|Used to scan the networks for vulnerabilities.|
|**PostgreSQL Client Tools**|Used to connect to the PostgreSQL server.|
**_Table A.1:_** _Tools used during assessment_
---
### APPENDIX B - ENGAGEMENT INFORMATION
Client Information
| | |
|---|---|
|**Client**|<CLIENT NAME>|
|**Primary Contact**|<Person Name>, <br><Persons Title>|
|**Approvers**|The following people are authorized to change the scope of engagement and modify the terms of the engagement<br><br>- <PERSON NAME 1><br>- <PERSON NAME 2>|
Version Information
| | | |
|---|---|---|
|**Version**|**Date**|**Description**|
|1.0|<DATE HERE>|Initial report to client|
Contact Information
| | |
|---|---|
|**Name**|<TEAM NAME> Consulting|
|**Address**|1001 Fake Street, Gotham, NY 11201|
|**Phone**|555-185-1782|
|**Email**|<REPLACE WITH PROVIDED EMAIL>|

BIN
templates/legal/DPA-en.odt Normal file

Binary file not shown.

BIN
templates/legal/MSA-en.odt Normal file

Binary file not shown.

BIN
templates/legal/NDA-en.odt Normal file

Binary file not shown.