Understanding the Penetration Test Workflow: a security test with Tramonto in an e-Government application

Daniel Dalalana Bertoglio, Luis G. B. Schüler, A. Zorzo, R. C. Lunardi
{"title":"Understanding the Penetration Test Workflow: a security test with Tramonto in an e-Government application","authors":"Daniel Dalalana Bertoglio, Luis G. B. Schüler, A. Zorzo, R. C. Lunardi","doi":"10.1109/TrustCom56396.2022.00229","DOIUrl":null,"url":null,"abstract":"Security and privacy became vital to any of the current computational systems or applications. Particularly, investigating possible security issues - to mitigate possible data leaks or tampering - is an important step in the current software development. Currently, penetration tests (pentest) are performed to detect possible system flaws and to prevent/correct eventual security issues. However pentesting (the act of performing pentest) a system can be complex and hard to control. There are many activities throughout the pentesting process and it is common to find difficulties in controlling them. At the same time, it is not easy to determine precisely what activities will be performed, since each tester can follow a specific methodology or even use their own testing model. Based on the main security assessment test methodologies, we created a framework for penetration testing that aims to improve the test workflow in terms of management, organization, standardization, and flexibility. This framework is called Tramonto. This paper presents and discusses a pentest case study performed by a security company using the Tramonto framework. To present this case, we introduce the Tramonto-App, a software that was implemented using the definitions present in the Tramonto framework. Tramonto-App was designed to assist testers in penetration tests based on features that help to organize scripts, handle the testing workflow, and generate reports. As a result, the Tramonto-App resulted in a reduced number of pentesting problems and reduced (human) effort required to perform the penetration, allowing the tester to improve the quality of the Pentest.","PeriodicalId":276379,"journal":{"name":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TrustCom56396.2022.00229","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Security and privacy became vital to any of the current computational systems or applications. Particularly, investigating possible security issues - to mitigate possible data leaks or tampering - is an important step in the current software development. Currently, penetration tests (pentest) are performed to detect possible system flaws and to prevent/correct eventual security issues. However pentesting (the act of performing pentest) a system can be complex and hard to control. There are many activities throughout the pentesting process and it is common to find difficulties in controlling them. At the same time, it is not easy to determine precisely what activities will be performed, since each tester can follow a specific methodology or even use their own testing model. Based on the main security assessment test methodologies, we created a framework for penetration testing that aims to improve the test workflow in terms of management, organization, standardization, and flexibility. This framework is called Tramonto. This paper presents and discusses a pentest case study performed by a security company using the Tramonto framework. To present this case, we introduce the Tramonto-App, a software that was implemented using the definitions present in the Tramonto framework. Tramonto-App was designed to assist testers in penetration tests based on features that help to organize scripts, handle the testing workflow, and generate reports. As a result, the Tramonto-App resulted in a reduced number of pentesting problems and reduced (human) effort required to perform the penetration, allowing the tester to improve the quality of the Pentest.
理解渗透测试工作流程:在电子政务应用程序中使用Tramonto进行安全测试
安全和隐私对当前的任何计算系统或应用程序都至关重要。特别是,调查可能的安全问题(以减轻可能的数据泄漏或篡改)是当前软件开发中的重要步骤。目前,执行渗透测试(pentest)是为了检测可能的系统缺陷,并防止/纠正最终的安全问题。然而,渗透测试(执行测试的行为)系统可能很复杂且难以控制。贯穿整个渗透测试过程的活动有很多,控制这些活动很困难。同时,精确地确定将要执行的活动是不容易的,因为每个测试人员可以遵循特定的方法,甚至使用他们自己的测试模型。基于主要的安全评估测试方法,我们为渗透测试创建了一个框架,旨在从管理、组织、标准化和灵活性方面改进测试工作流。这个框架叫做Tramonto。本文介绍并讨论了一个由一家安全公司使用Tramonto框架执行的测试案例研究。为了展示这种情况,我们介绍了Tramonto- app,这是一个使用Tramonto框架中提供的定义实现的软件。Tramonto-App旨在帮助测试人员进行基于帮助组织脚本、处理测试工作流和生成报告的特性的渗透测试。因此,Tramonto-App减少了渗透测试问题的数量,减少了执行渗透所需的(人力)工作量,从而使测试人员能够提高渗透测试的质量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信