14

I asked two pen testers what exactly it is that they do.

One of them has told me that all he ever does is try to find exploits in the software in order to gain access to internal servers and nothing more.

The other said that it is trying to find a hole in policies/social engineer the company in order to gain access to internal computers.

So does it deal with trying to gain access through company software and install malicious software yourself or by getting the people in the company to install the malicious software for you.

I did not know of existence of pen testers until this website was made, but now that I do I was interested in the field, however I can't know if I want to become a pen tester until I know what exactly it is that they do. So far as I understand is that it is pen tester's job to gain access to the company's computers. But does it involve reading byte codes and such to try to get in or does it involve exploiting people in company to get in?

Also where might I learn some principles to look into pen testing career?

I saw this answer, but it was not detailed enough for my liking.

Quillion
  • 1,134
  • 5
  • 16
  • 25
  • 1
    http://www.youtube.com/watch?v=n71RE6Pk9NI‎ is my favorite video about "pen testing." It's actually about testing pens, presented tongue-in-cheek at the NOTACON hacker conference. – mskfisher Nov 25 '13 at 20:39

3 Answers3

14

A penetration tester's job is to demonstrate and document a flaw in security.

In a normal situation, a pen tester will perform reconnaissance to find some vulnerabilities, exploit those vulnerabilities to gain access, then possibly extract some small piece of data of value to prove that the system is not secure.

The piece of data is often a part of the sales pitch for the company looking to fix their problems. It's one thing to see a vulnerability and ask the boss for $10,000 to upgrade the firewalls. It's a different thing to say to the boss "look at these results, the tester was able to get at our credit card numbers, which is a million dollar liability lawsuit waiting to happen! Please give me $10,000 to upgrade the firewalls."

Note that this doesn't say which vulnerability the tester will exploit, and the tester might be free to try anything from a social engineering attack to a WiFi sniffer to a physical break-in.

However, pen testers generally must work within limits or boundaries. Often this is at the request of the clients: "Please demonstrate that you can or can't get inside our network, but we don't want you to send any phishing emails to our employees." And the security company may have a policy of never installing certain types of malware. (There's little reason for a pen-tester to install a botnet client or to hide his tracks behind a rootkit, for example, unless he's demonstrating the need to scan for botnets and rootkits.)

Some clients will place many limits on the tests, such as "just test the security of my application server." These clients may be under the impression that a hacker will be thwarted by the magical firewalls they bought that will protect the app server from every conceivable form of external attack. Or it could be that they have a different team focused on firewall defenses, and a third team working on social engineering awareness campaigns. The client may also ask that the pen tester not exfiltrate the valuable data - knowledge of the holes themselves is enough for them.

Either way, the pen tester must carefully stay within the limits given, even when the tester can identify a more effective avenue of exploitation. The pen tester is usually only reluctantly given a position of trust, because they're often viewed as "criminal hackers". By carefully documenting and exposing every flaw they exploited, they gain trust through professionalism. If a tester sees a flaw he is not authorized to explore, he should point it out, but not explore it unless he first obtains permission.

Also note the goal of the pen tester is not to "install malicious software". The goal is to demonstrate the adequacy of the security guarding information of value (credit cards, trade secrets, marketing plans, server administration, etc.) Malware is just one technique used by hackers.

For starters, I would recommend you read, practice, and learn what you can at home and on line. Check out the Certified Ethical Hacker books and training available. Try to attend local, regional, or national security conferences and events. You may have local "white-hat" groups like OWASP that have meetings you can attend and people you can meet. You may also have a more "gray-hat" DEFCON chapter nearby, again, these would be people you could learn from. These are all people who might be able to help you get into the business, if they see an aptitude or skill in you.

John Deters
  • 33,650
  • 3
  • 57
  • 110
4

As has been said, a pen tester is only somebody who tries to penetrate security defences of one sort or another. People specialise in all sorts of stuff, and it's the specialism that leads to your confusion.

It's worth noting that quite often, a client will impose limits on a pen-tester's scope of practice. They may hire someone to test their network, their physical security, or even just their reception staff's reaction to suspicious characters; so quite often the difference between two jobs is what the client wants doing.

It's such a potentially broad field, that to give a more specific answer isn't really possible, people do pen testing at all different types of security system, from firewalls and networks, to the physical security measure of military facilities.

Owen
  • 1,066
  • 5
  • 9
2

It's a broad field. The name describes it exactly though - to test for the possibility of penetration where none should exist.

So, to take your first example, if someone is hired to run a "pen test" against a file server, he might indeed spend all his time checking to see if there are any unpatched SAMBA exploits that can be used.

To take your second example, a company may want an overview of vulnerable areas in staff awareness, internal security, and policies/procedures. So then the pen tester would try a range of common techniques - phishing or spear phishing emails, USB drives with malware left in parking lots, tailgating into buildings, calling the receptionist pretending to be IT staff...

So pen testing does involve both aspects that you asked about - the very technical side, and the human side, and everything in between.

I would suggest that to get started, you should try and get an entry-level position in IT security, and never stop learning.

scuzzy-delta
  • 9,303
  • 3
  • 33
  • 54