10.07.2015 Views

MyCERT 3rd Quarter 2011 Summary Report - CyberSAFE Malaysia

MyCERT 3rd Quarter 2011 Summary Report - CyberSAFE Malaysia

MyCERT 3rd Quarter 2011 Summary Report - CyberSAFE Malaysia

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Criteria is in a better spot to provide securityanalysts/penetration testers guidance thatthey need in achieving better testing coverageand providing justifications in the preliminarystages.Leveraging CC Attack PotentialCoverage in Vulnerability Test& AnalysisQuestions; How far can a security analyst/pen-tester leverage on the situation bycovering up most of the vulnerability testingresults and analysis? Most of us will saythat it depends on the analyst/pen-testerexperience, knowledge and hands-on skills.Yet, a better answer can be given by allowingCC Attack Potential to provide an interestingoutlook into the test planning, executionsand analysis processes.To simulate this justification, the followingis an example that illustrates how CCAttack Potential has been used as part ofvulnerability assessment or penetrationtesting; from the starting point to the mainevents of vulnerability analysis. A shortbrief about the example given here, whichis basically an execution of penetrationtest activities, project based, conductedupon a prototype of smartcard contactlessapplets that has the ability to store crucialinformation by segregating and enforcingaccess controls through defined randomkeys exchange procedures upon informationrequested from proprietary software desktopapplications through a smartcard reader.33Justifications of Preliminary Test Scenarios.Test TitleConfidentialityAvailability & Integrity(CIA) HypothesisTest ObjectiveObjectives DetailsTest ApproachesAttack PotentialCalculationIdentify information transacted between the card reader and sample card viacontactless channels.Examine the key transacted between the card reader and sample card cannot bebypassed in aspects of its processes.Examine the key transacted between the card reader and sample card to beconfidential, whilst maintaining the secrecy of keys that are exchanged betweenboth origins.Performing identification of keys transacted between the smartcard reader andsample card embedded inside a contactless chip.To meet CIA hypothesis, analysts shall perform tests on the key transactionprocesses by monitoring and simulating processes of key exchanges between thesmartcard reader and sample card via contactless channels.These tests are to validate the processes, in a way that it could not be bypassedand could not be compromised in the middle through a man-in-the-middle attack.Test 0 (Control): By using smartcard reader and sample card, perform basicchallenge and response to scenarios with basic commands.Test 1: Generating random keys in short intervals.Test 2: Generating random keys in long intervals.Test 3 and 4: Using USB sniffer to monitor all key exchange transactions betweenSAM and reader. This identifies the location from which key exchanges areinitiated; either from the software or the reader.Test 5: Using USB sniffer to monitor the transition communications betweenSoftware Application Desktop and reader.Elapsed Time: Less than one week (1)Expertise: Proficient (3)Knowledge of TOE: Sensitive (7)Windows of Opportunity: Unlimited Access (0)Equipment: Standard (0)Calculation and Attack Potential Level: Total: 11 (Basic)Table 1: Preliminary Justification using CC Attack Potentiale-Security | Cyber Security <strong>Malaysia</strong> | Vol: 28-(Q3/<strong>2011</strong>)© CyberSecurity <strong>Malaysia</strong> <strong>2011</strong> - All Rights Reserved

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!