SlideShare a Scribd company logo
1 of 3
Download to read offline
OSSTMM (Open Source Security Testing Methodology Manual)
What is OSSTMM?
The abbreviation of OSSTMM is Open Source Security Testing Methodology Manual. It was
developed by the Pete Herzog and distributed by the Institute for Security and Open
Methodologies (ISECOM). It is a document for improving the quality of enterprise security as
well as the methodology and strategy of testers. It includes various information gathering
templates.
It is one of the International Standard for Internet Security and Testing. It is an open source,
standardized methodology where anyone adds, cut, open anything from anywhere on the
Internet and also make complaint about the vulnerabilities. This type of methodology depends
on the scientific methods where operational and financially security measures. Basically,
OSSTMM is a set of rules and regulations for the Penetration Testing, Ethical Hacking, and
Information Security Analysis which involves tools for testing. It also includes automated
vulnerability testing tools. Here, standard sets in testing methodology either manually or
automatic where operational security requirements conformed. The result of testing creates
the discipline which it acts as a central point in the whole security tests which regards the size
of the network, type of the system or the Internet applications. It is used in the various sectors
such as Financial Institutions, Navy and Air force, Security Market’s Players (Vendors,
Freelancers, Consultation companies, etc.), Telecommunication and Financial Operators and
many more.
Domains Covers in OSSTMM:
 Information Security: The security is the major term in the computer system and network.
Many computer systems have secured with access limitations. It is very important how to
protect the important assets (system, network, applications, data, etc.) from the attackers.
This is the major area in the field of OSSTMM because this deals with important keys.
 Process Security: The process security deals under the operation control in which if any
threats exists or in running process, then it protects the assets rather than influencing from
the third-party. It includes Non-repudiation, Confidentiality, Integrity, Privacy and Alarm.
 Internet Technology Security: It is used for protecting the Smart Meters. It includes Network
Surveying, Port Scanning, Services Identification, System Identification, Vulnerability
Research and Verification, Internet Application Testing, Router Testing, Trusted Systems
Testing, Firewall Testing, Intrusion Detection System Testing, Containment Measures Testing,
Password Cracking, Denial of Service Testing, Security Policy Review.
 Communication Security: It emphasis on the communication infrastructure which includes
Posture Review, PBX Review, Voicemail Testing, Fax Testing, Modern Survey, Remote Access
Control Testing, VoIP Testing, X.25 Packet Switched Networks Testing.
 Wireless Security: It describes what wireless technologies used by the organization. It
involves Electromagnetic Radiation Testing, 802.11 Wireless Network Testing, Bluetooth
Testing, Wireless Input device Testing, Wireless Handheld Testing, Wireless Surveillance
Device testing, Cordless Communication Testing, Wireless transaction Device testing, RFID
Testing, Infrared Testing, Privacy Review. It also regulates rules and guidelines. For example,
if company adopts Bluetooth Technology, then first thing requires that organization have
Wireless Technology or not.
 Physical Security: It determines the access controls of target. It monitors the controls in
place of compromising the attacks. It also determines how to defeat them.
OSSTMM Test Phases:
There are 7 test phases which are as follows:
1. Discovery: It analyzes and acquires the existing system testimonials.
2. Enumeration Verification: It tests the Operating System, configuration and services with
the system document.
3. Vulnerability Research and Verification: It done and analyzes by the Penetration
testing.
4. Integrating Testing: Check the Integrity of all the results.
5. Security Mapping: It maps the measured security of the results of systems and services.
6. Risk Assessment Value: If any loopholes found, then classifies the risk and measures the
risk assessment value (RAV).
7. Reporting: Maps the results and recommend it.
Point Process of OSSTMM:
There are three types of interactions in the OSSTMM: Porosity, Four Point Process (FPP), and
Echo Process.
Porosity means you need to know
how to protect yourself or attack on
the target, while FPP means need to
know in deep by monitoring and
watching the activities. Echo Process is
a very basic form of analysis in which
discovering and learning things by
interacting directly to it. It requires
access interaction on the target level
and monitoring the reactions. It is a
cause-and –effect type of verification.
The point process performs in four
ways, that’s why it is known as Four
Point Process (FPP). Induction:
Determine the target from its
environment, how it behaves in that
environment, if the target is not
influenced by its environment, and then
what happen. Inquest: What signals does
the target give off? Investigate the tracks
or indicators of the signals because in
general the system or process leaves the
signature of interactions with its
environment. Interaction: What happen
when poking takes place? It calls for echo
tests include expected and unexpected
interactions with the target to trigger
responses. Intervention: How far it
bends before it breaks? The target needs interrupting resources to understand the extremes
under which it can continue operating.
The classes are the official label which is used in the security industry, government and military
fields. Basically, classes define the area of study, investigation and operation. The Channels are
the way to interact with the assets. There are three types of classes which is useful for hackers
to attack on it i.e. Physical Security (PHYSSEC), Spectrum Security (SPECSEC) and
Communication Security (COMSEC), it further divided into five channels. PHYSSEC contains two
channels: Human and Physical Channel, SPECSEC contains one channel: Wireless Channel and
SPECSEC contain two channels i.e. Telecommunications and Data Network Channels.
OSSTMM Compliance:
The compliance is not to specify the
operational security requirement, also
specifies the use of OSSTMM testing time
on the periodic basis to fulfill the control
requirement drafted as a result trust
assessment which scopes the minimum
number of control requirement to achieve
the complaint, not requires secure state.
The documentation includes business
processes, narratives, trust assessment, risk
assessments, signed off design tests,
operational audits, attestations, etc. With
the help of OSSTMM, the result is
understandable and verifies the level of quality. It is designed to allow the analyst to view and
understand the safety and security. By this type of Methodologies, any compliance has the
production of the evidence of governance within the business process of security.
BY Falgun Rathod | Cyber Security Consultant
Official Link: http://www.isecom.org/

More Related Content

What's hot

Intro to Security in SDLC
Intro to Security in SDLCIntro to Security in SDLC
Intro to Security in SDLCTjylen Veselyj
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 
Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Donald E. Hester
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
OWASP-Web-Security-testing-4.2
OWASP-Web-Security-testing-4.2OWASP-Web-Security-testing-4.2
OWASP-Web-Security-testing-4.2Massimo Talia
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1Denise Tawwab
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
INCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONSylvain Martinez
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...Raffael Marty
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) Priyanka Aash
 
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Denise Tawwab
 

What's hot (20)

Intro to Security in SDLC
Intro to Security in SDLCIntro to Security in SDLC
Intro to Security in SDLC
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
OWASP-Web-Security-testing-4.2
OWASP-Web-Security-testing-4.2OWASP-Web-Security-testing-4.2
OWASP-Web-Security-testing-4.2
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
INCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATION
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
 

Similar to OSSTMM Guide to Open Source Security Testing Methodology Manual

Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security EnhancementDemystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancementcyberprosocial
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
Security testing
Security testingSecurity testing
Security testingbaskar p
 
PRACTICAL APPROACH FOR SECURING WINDOWS ENVIRONMENT: ATTACK VECTORS AND COUNT...
PRACTICAL APPROACH FOR SECURING WINDOWS ENVIRONMENT: ATTACK VECTORS AND COUNT...PRACTICAL APPROACH FOR SECURING WINDOWS ENVIRONMENT: ATTACK VECTORS AND COUNT...
PRACTICAL APPROACH FOR SECURING WINDOWS ENVIRONMENT: ATTACK VECTORS AND COUNT...IJNSA Journal
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentationAlan Holyoke
 
penetration testing.pptx
penetration testing.pptxpenetration testing.pptx
penetration testing.pptxwilnawilliams3
 
penetration testing.pptx
penetration testing.pptxpenetration testing.pptx
penetration testing.pptxwilnawilliams3
 
Learn more about the Penetration Services
Learn more about the Penetration ServicesLearn more about the Penetration Services
Learn more about the Penetration Serviceswilnawilliams3
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Phases of Penetration Testing
Phases of Penetration TestingPhases of Penetration Testing
Phases of Penetration TestingKiwiQA
 
The Art of Penetration Testing in Cybersecurity.
The Art of Penetration Testing in Cybersecurity.The Art of Penetration Testing in Cybersecurity.
The Art of Penetration Testing in Cybersecurity.Expeed Software
 
Best Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docxBest Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docxAfour tech
 
pentration testing.pdf
pentration testing.pdfpentration testing.pdf
pentration testing.pdfRamya Nellutla
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing ExplainedRand W. Hirt
 
What are the 5 Stages of Penetration.pdf
What are the 5 Stages of Penetration.pdfWhat are the 5 Stages of Penetration.pdf
What are the 5 Stages of Penetration.pdfBytecode Security
 
Security testing vikesh kumar
Security testing vikesh kumarSecurity testing vikesh kumar
Security testing vikesh kumarVikesh Kumar
 
Software security testing
Software security testingSoftware security testing
Software security testingnehabsairam
 

Similar to OSSTMM Guide to Open Source Security Testing Methodology Manual (20)

Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security EnhancementDemystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
Backtrack manual Part1
Backtrack manual Part1Backtrack manual Part1
Backtrack manual Part1
 
Security testing
Security testingSecurity testing
Security testing
 
PRACTICAL APPROACH FOR SECURING WINDOWS ENVIRONMENT: ATTACK VECTORS AND COUNT...
PRACTICAL APPROACH FOR SECURING WINDOWS ENVIRONMENT: ATTACK VECTORS AND COUNT...PRACTICAL APPROACH FOR SECURING WINDOWS ENVIRONMENT: ATTACK VECTORS AND COUNT...
PRACTICAL APPROACH FOR SECURING WINDOWS ENVIRONMENT: ATTACK VECTORS AND COUNT...
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
SDET UNIT 5.pptx
SDET UNIT 5.pptxSDET UNIT 5.pptx
SDET UNIT 5.pptx
 
penetration testing.pptx
penetration testing.pptxpenetration testing.pptx
penetration testing.pptx
 
penetration testing.pptx
penetration testing.pptxpenetration testing.pptx
penetration testing.pptx
 
Learn more about the Penetration Services
Learn more about the Penetration ServicesLearn more about the Penetration Services
Learn more about the Penetration Services
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
J1803067477
J1803067477J1803067477
J1803067477
 
Phases of Penetration Testing
Phases of Penetration TestingPhases of Penetration Testing
Phases of Penetration Testing
 
The Art of Penetration Testing in Cybersecurity.
The Art of Penetration Testing in Cybersecurity.The Art of Penetration Testing in Cybersecurity.
The Art of Penetration Testing in Cybersecurity.
 
Best Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docxBest Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docx
 
pentration testing.pdf
pentration testing.pdfpentration testing.pdf
pentration testing.pdf
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
What are the 5 Stages of Penetration.pdf
What are the 5 Stages of Penetration.pdfWhat are the 5 Stages of Penetration.pdf
What are the 5 Stages of Penetration.pdf
 
Security testing vikesh kumar
Security testing vikesh kumarSecurity testing vikesh kumar
Security testing vikesh kumar
 
Software security testing
Software security testingSoftware security testing
Software security testing
 

More from Falgun Rathod

Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedFalgun Rathod
 
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...Falgun Rathod
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod
 
Penetration Testing, Auditing & Standards Issue : 02_2012-1
Penetration Testing, Auditing & Standards Issue : 02_2012-1Penetration Testing, Auditing & Standards Issue : 02_2012-1
Penetration Testing, Auditing & Standards Issue : 02_2012-1Falgun Rathod
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodFalgun Rathod
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 

More from Falgun Rathod (6)

Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
 
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 
Penetration Testing, Auditing & Standards Issue : 02_2012-1
Penetration Testing, Auditing & Standards Issue : 02_2012-1Penetration Testing, Auditing & Standards Issue : 02_2012-1
Penetration Testing, Auditing & Standards Issue : 02_2012-1
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

OSSTMM Guide to Open Source Security Testing Methodology Manual

  • 1. OSSTMM (Open Source Security Testing Methodology Manual) What is OSSTMM? The abbreviation of OSSTMM is Open Source Security Testing Methodology Manual. It was developed by the Pete Herzog and distributed by the Institute for Security and Open Methodologies (ISECOM). It is a document for improving the quality of enterprise security as well as the methodology and strategy of testers. It includes various information gathering templates. It is one of the International Standard for Internet Security and Testing. It is an open source, standardized methodology where anyone adds, cut, open anything from anywhere on the Internet and also make complaint about the vulnerabilities. This type of methodology depends on the scientific methods where operational and financially security measures. Basically, OSSTMM is a set of rules and regulations for the Penetration Testing, Ethical Hacking, and Information Security Analysis which involves tools for testing. It also includes automated vulnerability testing tools. Here, standard sets in testing methodology either manually or automatic where operational security requirements conformed. The result of testing creates the discipline which it acts as a central point in the whole security tests which regards the size of the network, type of the system or the Internet applications. It is used in the various sectors such as Financial Institutions, Navy and Air force, Security Market’s Players (Vendors, Freelancers, Consultation companies, etc.), Telecommunication and Financial Operators and many more. Domains Covers in OSSTMM:  Information Security: The security is the major term in the computer system and network. Many computer systems have secured with access limitations. It is very important how to protect the important assets (system, network, applications, data, etc.) from the attackers. This is the major area in the field of OSSTMM because this deals with important keys.  Process Security: The process security deals under the operation control in which if any threats exists or in running process, then it protects the assets rather than influencing from the third-party. It includes Non-repudiation, Confidentiality, Integrity, Privacy and Alarm.  Internet Technology Security: It is used for protecting the Smart Meters. It includes Network Surveying, Port Scanning, Services Identification, System Identification, Vulnerability Research and Verification, Internet Application Testing, Router Testing, Trusted Systems Testing, Firewall Testing, Intrusion Detection System Testing, Containment Measures Testing, Password Cracking, Denial of Service Testing, Security Policy Review.  Communication Security: It emphasis on the communication infrastructure which includes Posture Review, PBX Review, Voicemail Testing, Fax Testing, Modern Survey, Remote Access Control Testing, VoIP Testing, X.25 Packet Switched Networks Testing.  Wireless Security: It describes what wireless technologies used by the organization. It involves Electromagnetic Radiation Testing, 802.11 Wireless Network Testing, Bluetooth
  • 2. Testing, Wireless Input device Testing, Wireless Handheld Testing, Wireless Surveillance Device testing, Cordless Communication Testing, Wireless transaction Device testing, RFID Testing, Infrared Testing, Privacy Review. It also regulates rules and guidelines. For example, if company adopts Bluetooth Technology, then first thing requires that organization have Wireless Technology or not.  Physical Security: It determines the access controls of target. It monitors the controls in place of compromising the attacks. It also determines how to defeat them. OSSTMM Test Phases: There are 7 test phases which are as follows: 1. Discovery: It analyzes and acquires the existing system testimonials. 2. Enumeration Verification: It tests the Operating System, configuration and services with the system document. 3. Vulnerability Research and Verification: It done and analyzes by the Penetration testing. 4. Integrating Testing: Check the Integrity of all the results. 5. Security Mapping: It maps the measured security of the results of systems and services. 6. Risk Assessment Value: If any loopholes found, then classifies the risk and measures the risk assessment value (RAV). 7. Reporting: Maps the results and recommend it. Point Process of OSSTMM: There are three types of interactions in the OSSTMM: Porosity, Four Point Process (FPP), and Echo Process. Porosity means you need to know how to protect yourself or attack on the target, while FPP means need to know in deep by monitoring and watching the activities. Echo Process is a very basic form of analysis in which discovering and learning things by interacting directly to it. It requires access interaction on the target level and monitoring the reactions. It is a cause-and –effect type of verification. The point process performs in four ways, that’s why it is known as Four Point Process (FPP). Induction: Determine the target from its environment, how it behaves in that environment, if the target is not
  • 3. influenced by its environment, and then what happen. Inquest: What signals does the target give off? Investigate the tracks or indicators of the signals because in general the system or process leaves the signature of interactions with its environment. Interaction: What happen when poking takes place? It calls for echo tests include expected and unexpected interactions with the target to trigger responses. Intervention: How far it bends before it breaks? The target needs interrupting resources to understand the extremes under which it can continue operating. The classes are the official label which is used in the security industry, government and military fields. Basically, classes define the area of study, investigation and operation. The Channels are the way to interact with the assets. There are three types of classes which is useful for hackers to attack on it i.e. Physical Security (PHYSSEC), Spectrum Security (SPECSEC) and Communication Security (COMSEC), it further divided into five channels. PHYSSEC contains two channels: Human and Physical Channel, SPECSEC contains one channel: Wireless Channel and SPECSEC contain two channels i.e. Telecommunications and Data Network Channels. OSSTMM Compliance: The compliance is not to specify the operational security requirement, also specifies the use of OSSTMM testing time on the periodic basis to fulfill the control requirement drafted as a result trust assessment which scopes the minimum number of control requirement to achieve the complaint, not requires secure state. The documentation includes business processes, narratives, trust assessment, risk assessments, signed off design tests, operational audits, attestations, etc. With the help of OSSTMM, the result is understandable and verifies the level of quality. It is designed to allow the analyst to view and understand the safety and security. By this type of Methodologies, any compliance has the production of the evidence of governance within the business process of security. BY Falgun Rathod | Cyber Security Consultant Official Link: http://www.isecom.org/