Presenter Information

Bradford RegeskiFollow

Campus

Dahlonega

Proposal Type

Presentation - proposed research/incomplete

Subject Area

Computer Science/GIS

Location

Nesbitt 3204

Start Date

23-3-2018 1:00 PM

End Date

23-3-2018 2:00 PM

Description/Abstract

In linear terms, A penetration tester discovers B exploit in the designated area of the system and gains access to C product, A + B = C. But in the hyper-connected world we know today, the exponential occurrences of exploits and vulnerabilities rises across many different systems, programs and applications. The company-defined scope of a normal penetration test limits the potential ability and potency of any penetration test, but this remains the popular approach in the industry today, as dynamic companies very often develop new products/applications which require vulnerability assessments before being deployed. Limiting the test to just the new product, and failing to calculate for the entirety of the broad scope of the system, allows for malicious attackers to bypass these “product-defined areas” and find exploits on the other side of the system that allow them access into the new, desired product. In new holistic terms, A penetration tester finds Z exploit on the other side of the system which magnifies to comprise the entire “alphabet” of the system and then gain access to the desired C product, A(Z)=A…Z=C. In the proposed paper, an analyzation of the experimental holistic penetration testing will occur, regarding its benefits, potential damages, and a comparison to the regular pre-defined pen test. Said comparison will be calculated by real-world examples of potential threats, the potential approach by both, and their own calculations of the popular OWASP Risk Rating Methodology [1], an equation used to determine potential risk and cost to business entities.

Share

COinS
 
Mar 23rd, 1:00 PM Mar 23rd, 2:00 PM

Holistic Penetration Testing and its Potency

Nesbitt 3204

In linear terms, A penetration tester discovers B exploit in the designated area of the system and gains access to C product, A + B = C. But in the hyper-connected world we know today, the exponential occurrences of exploits and vulnerabilities rises across many different systems, programs and applications. The company-defined scope of a normal penetration test limits the potential ability and potency of any penetration test, but this remains the popular approach in the industry today, as dynamic companies very often develop new products/applications which require vulnerability assessments before being deployed. Limiting the test to just the new product, and failing to calculate for the entirety of the broad scope of the system, allows for malicious attackers to bypass these “product-defined areas” and find exploits on the other side of the system that allow them access into the new, desired product. In new holistic terms, A penetration tester finds Z exploit on the other side of the system which magnifies to comprise the entire “alphabet” of the system and then gain access to the desired C product, A(Z)=A…Z=C. In the proposed paper, an analyzation of the experimental holistic penetration testing will occur, regarding its benefits, potential damages, and a comparison to the regular pre-defined pen test. Said comparison will be calculated by real-world examples of potential threats, the potential approach by both, and their own calculations of the popular OWASP Risk Rating Methodology [1], an equation used to determine potential risk and cost to business entities.