Why can’t I just use an automated service like http://www.trust-guard.com ?
One reason to reconsider only using Trust-guard is that it is not QSA certified from the PCI Security Standards council:
https://www.pcisecuritystandards.org/approved_companies_providers/qsa_companies.php
As a pentester (penetration tester) we use a QSA certified tool to verify vulnerability assessments on your resources. (such as Nessus) we have also used Qualys. We only use these advanced tools which are manual in nature.
Unfortunately the pentest is manual in nature and it requires an independent entity to test your network. It is also not wise to depend on internal assessments with Nessus and Qualys only.
The PCI compliance standard requires an independent review of your network – there is something to be said to look at an attack on your network by a red team attacker (not a blue team defense thinking).
Red team = Certified Ethical Hacker – independent attack from outside
Blue team = your IT department working at keeping bad guys out.
That is the basic reality of the pentest and pentester it requires a differnet mode of thinking.
Look at the following controversy:
http://threatpost.com/lack-of-csprng-threatens-wordpress-sites/111016
WordPress seems to have an internal vulnerability due to a bug. And the internal developers(blue team) did not find it, and they are not discussing this sophisticated attack vector
“The issue lies in the fact that WordPress doesn’t contain a cryptographically secure pseudorandom number generator. A researcher named Scott Arciszewski made the WordPress maintainers aware of the problem nearly eight months ago and said that he has had very little response.”
This is an example of the Attackers(red team) using the latest techniques to attack the very fundamentals of a piece of software.
The blue team has no interest in checking this method, and as it was developed a long time ago it is off the radar now. But as criminal developers as well as regular crypto researchers get more sophisticated in their attacks the blue team is not equipped to handle this mode of thinking.
A red team is required to think outside of the standard (out of box).
Although fundamentally testing a network is different from finding a “bug” in software, there are similarities in the thinking required to test a network.
and the next page(11.3.1) is important:
Notice the 11.3.2 testing Procedure:
11.3.2.b Verify that the test was performed by a qualified internal resource or qualified external third party, and if applicable, organizational independence of the tester exists (not required to be a QSA or ASV).
from 11 3
It is preferable to have an organizational independent tester attacking your site.
Contact us to test your resources
1 thought on “Why is Pentesting Needed?”