Security Testing for entities hosted in cloud

For the applications that are getting migrated to cloud / planned to be hosted in the cloud will need additional security considerations. Failure to ensure proper security protection when using cloud services may potentially result in higher costs and loss to business. Organizations must consider security controls for different services viz. Infrastructures as a service(Iaas), Software as a service (SaaS) or Platform as a service. Which applications should be moved to cloud?     ·         Low to Medium Risk What are the key security risks while hosting in cloud?     ·         Isolation Failure – Multi tenancy is a key thing in cloud. Failure in controls that separate the storage, memory, identity and access control and routing between tenants is a huge risk.     ·         Authentication and Authorization     ·...

Keeping logs of your console commands during pentesting

While it is very important to keep the screenshots and the results of your tools logged and recorded correctly, consistently and extensively, it is equally important to keep your console logs. This is very helpful when you are done with your penetration test and recall later during the results analysis / report writing that - what was the result of 'that' command I ran???

It is very commonly missed out by most pentesters - at least the beginners.

While there are many ways in which you can do this:

1] copy paste the console logs and save it in your fav text editor
2] use a systematic approach

I am sure method [1] is known to all :)

Let's learn method [2] - Use script

yes there is in inbuilt tool / script in linux that you can make use of:

script

usage: script filename.log

This will start a process and it will keep logging the console output to this file. Once you are done just 'exit'

Not to mention that care must be taken that you do not exit this process in between your penetration testing duration.

Here is a short demo:



Have fun!!! and make sure you log your console logs :)

Comments

Popular posts from this blog

Change the default SSH keys in Kali Linux ......One important step post installation