Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Penetration Testing is Stupid - BsidesSF 2013
Search
Brett Hardin
February 25, 2013
Technology
2.3k
2
Share
Penetration Testing is Stupid - BsidesSF 2013
Brett Hardin
February 25, 2013
More Decks by Brett Hardin
See All by Brett Hardin
Building Your House on Sand
bretthardin
2
1.5k
Bad Version of Builders vs. Breakers
bretthardin
1
85
Builders vs. Breakers - AppSec 2012
bretthardin
2
1.5k
Security the Wrong Way
bretthardin
2
260
BSidesSanFrancisco2011 - Misdirection: The Rise and Fall and Rise of Regulatory Compliance
bretthardin
1
240
Security? Who Cares! - Privacy is Dead
bretthardin
1
210
OWASP - Top 10
bretthardin
0
1.1k
Other Decks in Technology
See All in Technology
PdM・Eng・QAで進めるAI駆動開発の現在地/aidd-with-pdm-eng-qa
shota_kusaba
0
160
20260516_SecJAWS_Days
takuyay0ne
0
170
フロントエンドの相手が変わった - AIが加わったWebの新しいインターフェース設計
azukiazusa1
33
11k
Purview 勉強会報告 Microsoft Purview 入門しようとしてみた
masakichixo
1
230
2026-05-14 要件定義からソース管理まで!IBM Bob基礎ハンズオン
yutanonaka
0
120
(きっとたぶん)人材育成や教育のような何かの話
sejima
0
680
そのSLO 99.9%、本当に必要ですか? 〜優先度付きSLOによる責任共有の設計思想〜 / Is that 99.9% SLO really necessary? Design philosophy of shared responsibility through prioritized SLOs
vtryo
0
490
AIが盛んな時代に 技術記事を書き始めて起きた私の中での小さな変化
peintangos
0
370
マンション備え付けのネットワークとLTE回線を組み合わせた ネットワークの安定化の考案
harutiro
1
110
エンタープライズの厳格な制約を開発者に意識させない:クラウドネイティブ開発基盤設計/cloudnative-kaigi-golden-path
mhrtech
0
380
Vision Banana: Image Generators are Generalist Vision Learners
kzykmyzw
0
340
いつの間にかデータエンジニア以外の業務も増えていたけど、意外と経験が役に立ってる
zozotech
PRO
0
350
Featured
See All Featured
Ruling the World: When Life Gets Gamed
codingconduct
0
220
Art, The Web, and Tiny UX
lynnandtonic
304
21k
Primal Persuasion: How to Engage the Brain for Learning That Lasts
tmiket
0
330
How to Ace a Technical Interview
jacobian
281
24k
Ten Tips & Tricks for a 🌱 transition
stuffmc
0
110
Building an army of robots
kneath
306
46k
Fight the Zombie Pattern Library - RWD Summit 2016
marcelosomers
234
17k
Fashionably flexible responsive web design (full day workshop)
malarkey
408
66k
[RailsConf 2023 Opening Keynote] The Magic of Rails
eileencodes
31
10k
Bash Introduction
62gerente
615
210k
Save Time (by Creating Custom Rails Generators)
garrettdimon
PRO
32
3k
How People are Using Generative and Agentic AI to Supercharge Their Products, Projects, Services and Value Streams Today
helenjbeal
1
180
Transcript
Penetration Testing is stupid
Brett Hardin @miscsecurity
None
None
pentesters
Why Who Where When What PENETRATION TESTING Why Who Where
When What
Why Who Where When What PENETRATION TESTING What
Audience Participation Educated Guess?
A live test of the effectiveness of security defenses through
mimicking the actions of real-life attackers. ISACA
test security defenses
mimicking real-life attackers
MIMIC THE REAL
Gunter Ollmann of Damballa on Real Attacks
Submit CV 2000
USB Keys 2005 2000
Buy the machine 2009+ 2005 2000
Penetration tests are unique
Penetration testers are friendly
Penetration tests don’t simulate attacks
Why Who Where When What PENETRATION TESTING Who
The Average Penetration tester
performed by
Jack Nicholson
I’M A PROFESSIONAL TRUST ME.
I’LL TRY ‘PASSWORD’
I’LL TRY ‘PA55WORD’
LET ME IN. PLEASE.
YOU WILL LET ME IN.
WE’RE FRIENDS
WHY CAN’T I GET IN?
LOOK, A WAY IN.
THEY WERE SO DUMB
I’M GONNA REDRUM HIM
pentesters
The average penetration tester
The average are common
The average are necessary
The average are cheap
The average are simple to copy
The average follow methodologies
The best penetration testers
The best are rare
The best invent new attacks
The best are expensive
The best are overkill
The best mimic the real
The average mimic tools
MIMIC THE REAL
MIMIC THE REAL
Why Who Where When What PENETRATION TESTING When
ATTACKS happen when you’re asleep
ATTACKS happen when you’re on vacation
ATTACKS happen when you have no budget
ATTACKS happen when during business hours
ATTACKS happen when you are not ready
ATTACKS happen when you are ready PENTESTS
Date&Time&Resources
None
Attackers aren’t limited by resources
MIMIC THE REAL
MIMIC THE REAL
Why Who Where When What PENETRATION TESTING Where
Rules of Engagement
Internet
Web Application only
On-site
Dialup
The Wi-fi’s
‘puters
News Flash
Attackers don’t care
Limits
Attackers aren’t limited by resources previously learned
Attackers aren’t limited by resources Revision
Attackers aren’t limited
Phone
MIMIC THE REAL
Why Who Where When What PENETRATION TESTING Why
Penetration testing isn’t important
Penetration testing isn’t important to most organizations
Penetration testing doesn’t secure you
Penetration testing tests defenses
required We’ve Convinced Everyone* it’s
TANGENT ALERT
Penetration Testers love to diss vendors
Penetration Testers are vendors
BACK TO YOUR REGULARLY SCHEDULED PROGRAM
Penetration testing proves two things
Penetration testing proves vulnerability One
Penetration testing proves vulnerability adjective One
Penetration testing identifies a few* risky issues Two
Penetration testing identifies a few* risky issues * Actual Results
may vary Two
known and unknown
new exploits aren’t needed
known exploits work
low-hanging fruit
expensive & rare New Exploits
MIMIC THE REAL
When pen testing isn’t stupid
No more defensive ideas
No more low-hanging fruit
Management wants to assess security controls
check&balance
Why Who Where When What < Attackers are unique
Why Who Where When What < Different attack methods
Why Who Where When What < Unlimited by time
Why Who Where When What No Rules of Engagement <
Why Who Where When What < Doesn’t protect you
Penetration Tests don’t mimic real attacks summary
Penetration Tests don’t secure you summary
Penetration Tests test your defenses summary
Thanks.
Brett Hardin http://bretthard.in