All language subtitles for 002 Defining the Scope (OBJ 1.2)

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese Download
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,360 --> 00:00:02,430 Instructor: Once the basic planning has been conducted, 2 00:00:02,430 --> 00:00:04,590 it's time for us to begin defining the scope 3 00:00:04,590 --> 00:00:06,510 of the upcoming engagement. 4 00:00:06,510 --> 00:00:08,189 Defining the scope starts broadly 5 00:00:08,189 --> 00:00:09,540 and then gets more detailed 6 00:00:09,540 --> 00:00:12,000 as we go throughout the scoping process. 7 00:00:12,000 --> 00:00:14,970 By properly scoping the engagement, everyone can understand 8 00:00:14,970 --> 00:00:16,860 what to expect during the assessment, 9 00:00:16,860 --> 00:00:19,080 what specific attributes will be included, 10 00:00:19,080 --> 00:00:20,910 and which will be excluded. 11 00:00:20,910 --> 00:00:23,850 This ensures a cost effective penetration test as well 12 00:00:23,850 --> 00:00:25,650 because the team will have a clear idea 13 00:00:25,650 --> 00:00:28,740 of what they should be focusing on during the engagement. 14 00:00:28,740 --> 00:00:29,610 To do this, 15 00:00:29,610 --> 00:00:32,100 the engagement's objectives need to first be well understood 16 00:00:32,100 --> 00:00:34,650 by both the client and the penetration tester, 17 00:00:34,650 --> 00:00:36,510 as it's gonna help define the overall scope 18 00:00:36,510 --> 00:00:37,710 of the assessment. 19 00:00:37,710 --> 00:00:39,990 Once the objectives and goals are understood, 20 00:00:39,990 --> 00:00:41,640 then the penetration tester can work 21 00:00:41,640 --> 00:00:43,740 with the client to determine which networks, 22 00:00:43,740 --> 00:00:46,560 cloud services, and applications are gonna be considered 23 00:00:46,560 --> 00:00:48,390 in scope of the engagement. 24 00:00:48,390 --> 00:00:51,450 First, we have the organization's networks to consider. 25 00:00:51,450 --> 00:00:53,670 These days, networks are difficult to define 26 00:00:53,670 --> 00:00:55,577 because of the rise of deperimeterization 27 00:00:55,577 --> 00:00:57,930 and the migration into the cloud. 28 00:00:57,930 --> 00:01:00,930 In the good old days, networks were much easier to define 29 00:01:00,930 --> 00:01:02,836 because most of the organization's resources 30 00:01:02,836 --> 00:01:05,940 sat behind their edge routers and their firewalls. 31 00:01:05,940 --> 00:01:08,107 So you could easily draw a line in the sand and say, 32 00:01:08,107 --> 00:01:10,620 "This is in scope, and this is out of scope." 33 00:01:10,620 --> 00:01:13,770 Unfortunately, the rise of wireless local area networks, 34 00:01:13,770 --> 00:01:16,440 VPN connections, and the migration into the cloud 35 00:01:16,440 --> 00:01:19,440 has really blurred the lines for us as penetration testers. 36 00:01:19,440 --> 00:01:22,110 So it's really important to take the time to discuss upfront 37 00:01:22,110 --> 00:01:24,690 with your client their exact architecture, 38 00:01:24,690 --> 00:01:27,390 if you're gonna be conducting a known environment test. 39 00:01:27,390 --> 00:01:29,970 Or at the very least, you should have some guidelines 40 00:01:29,970 --> 00:01:32,850 about what is and is not gonna be part of the engagement 41 00:01:32,850 --> 00:01:35,400 if you're doing an unknown environment test. 42 00:01:35,400 --> 00:01:37,380 Now, speaking of the migration to the cloud, 43 00:01:37,380 --> 00:01:38,550 you also need to determine 44 00:01:38,550 --> 00:01:40,723 if the company's cloud assets are gonna be considered 45 00:01:40,723 --> 00:01:43,410 in scope for the engagement as well. 46 00:01:43,410 --> 00:01:45,960 After all, just because you've migrated a server 47 00:01:45,960 --> 00:01:47,430 or service into the cloud, 48 00:01:47,430 --> 00:01:49,980 doesn't mean it's automatically well-protected. 49 00:01:49,980 --> 00:01:52,974 Instead, organizations are now asking penetration testers 50 00:01:52,974 --> 00:01:55,380 to test not only their local networks 51 00:01:55,380 --> 00:01:57,930 but also their cloud-based infrastructures and services 52 00:01:57,930 --> 00:01:59,940 to ensure they're in compliance. 53 00:01:59,940 --> 00:02:02,670 Cloud services are usually divide into categories, 54 00:02:02,670 --> 00:02:04,170 like software as a service, 55 00:02:04,170 --> 00:02:07,290 infrastructure as a service, and platform as a service. 56 00:02:07,290 --> 00:02:09,060 Now, under software as a service, 57 00:02:09,060 --> 00:02:10,380 the service provider is gonna provide 58 00:02:10,380 --> 00:02:13,170 the client organization with a complete solution. 59 00:02:13,170 --> 00:02:15,570 This includes the hardware, the operating system, 60 00:02:15,570 --> 00:02:17,220 and the software applications 61 00:02:17,220 --> 00:02:19,620 that are needed for the services to be delivered. 62 00:02:19,620 --> 00:02:21,508 For example, your target organization 63 00:02:21,508 --> 00:02:24,960 might be using Office 365 from Microsoft. 64 00:02:24,960 --> 00:02:27,390 This is a software as a service solution, 65 00:02:27,390 --> 00:02:30,030 and it allows the end users to access their email, 66 00:02:30,030 --> 00:02:31,986 Word documents, and PowerPoint presentations 67 00:02:31,986 --> 00:02:34,590 directly within their web browsers. 68 00:02:34,590 --> 00:02:36,690 Sometimes, though, an organization wants 69 00:02:36,690 --> 00:02:39,000 to build their entire infrastructure in the cloud, 70 00:02:39,000 --> 00:02:42,510 and for this, they're gonna use infrastructure as a service. 71 00:02:42,510 --> 00:02:45,360 This allows them to get the hardware, the operating system, 72 00:02:45,360 --> 00:02:47,100 and the backend server software 73 00:02:47,100 --> 00:02:49,500 all from the service provider and make it the benefit 74 00:02:49,500 --> 00:02:52,140 of dynamic allocation of additional resources, 75 00:02:52,140 --> 00:02:55,260 known as elasticity, whenever they need without the headache 76 00:02:55,260 --> 00:02:57,720 of a long term commitment or buying all that hardware 77 00:02:57,720 --> 00:02:59,940 and operating systems upfront. 78 00:02:59,940 --> 00:03:02,340 For example, an organization might contract 79 00:03:02,340 --> 00:03:04,080 for a new cloud-based web server 80 00:03:04,080 --> 00:03:05,910 toast their company's website on. 81 00:03:05,910 --> 00:03:07,650 The server might be built and hosted 82 00:03:07,650 --> 00:03:10,020 by the cloud service provider and come pre-installed 83 00:03:10,020 --> 00:03:12,990 with something like Linux and an Apache web server. 84 00:03:12,990 --> 00:03:14,520 Now, their web developers 85 00:03:14,520 --> 00:03:16,620 or programmers can create a custom application 86 00:03:16,620 --> 00:03:19,067 for their customers and run it through this web server 87 00:03:19,067 --> 00:03:20,190 without having to worry 88 00:03:20,190 --> 00:03:23,160 about the underlying operating system at hardware. 89 00:03:23,160 --> 00:03:24,870 The final type of service we have 90 00:03:24,870 --> 00:03:26,970 is known as platform as a service. 91 00:03:26,970 --> 00:03:29,460 Under this model, the third party cloud provider 92 00:03:29,460 --> 00:03:31,800 gives the organization the hardware and software 93 00:03:31,800 --> 00:03:34,620 that's needed for a specific service to operate. 94 00:03:34,620 --> 00:03:36,368 For example, let's say your organization 95 00:03:36,368 --> 00:03:38,970 wants to develop a new app for an iPhone, 96 00:03:38,970 --> 00:03:40,729 but they don't own a Mac OS X system 97 00:03:40,729 --> 00:03:42,450 to be able to compile it. 98 00:03:42,450 --> 00:03:44,670 Well, they might lease a development platform 99 00:03:44,670 --> 00:03:46,980 provided by a third party, and that's gonna allow them 100 00:03:46,980 --> 00:03:48,780 to perform this service for them. 101 00:03:48,780 --> 00:03:52,140 This would be considered a platform as a service model. 102 00:03:52,140 --> 00:03:54,510 Now, in summary, when you think about these models, 103 00:03:54,510 --> 00:03:56,520 remember that infrastructure as a service 104 00:03:56,520 --> 00:03:58,470 provides the organization with everything they need 105 00:03:58,470 --> 00:04:01,833 to run a given server, something like power, space, 106 00:04:01,833 --> 00:04:05,460 cooling, networking, firewalls, physical servers, 107 00:04:05,460 --> 00:04:07,200 and a virtualization layer. 108 00:04:07,200 --> 00:04:09,720 With platform as a service, the operating system 109 00:04:09,720 --> 00:04:12,540 and infrastructure is already added into that list as well 110 00:04:12,540 --> 00:04:15,870 as all the things you got with infrastructure as a service. 111 00:04:15,870 --> 00:04:18,209 This might include things like an Apache web server, 112 00:04:18,209 --> 00:04:20,610 MySQL database, programming languages, 113 00:04:20,610 --> 00:04:24,030 or even some custom-built software to help you make things. 114 00:04:24,030 --> 00:04:26,640 Now, the third layer is software as a service, 115 00:04:26,640 --> 00:04:28,800 and this is a hosted application that's add 116 00:04:28,800 --> 00:04:32,070 to the top of the infrastructure and platform portions. 117 00:04:32,070 --> 00:04:34,050 As you can see, software as a service 118 00:04:34,050 --> 00:04:35,760 is much closer to your end user 119 00:04:35,760 --> 00:04:39,150 than either platform or infrastructure as a service. 120 00:04:39,150 --> 00:04:40,290 Now, if the organization 121 00:04:40,290 --> 00:04:42,150 is using infrastructure as a service, 122 00:04:42,150 --> 00:04:43,410 that means they're also gonna have a lot 123 00:04:43,410 --> 00:04:45,300 of virtual machines that are operating out 124 00:04:45,300 --> 00:04:46,950 in the cloud that you may need to consider 125 00:04:46,950 --> 00:04:48,930 as part of your engagement scope. 126 00:04:48,930 --> 00:04:50,640 On the other hand, if they're using something 127 00:04:50,640 --> 00:04:53,122 like platform as a service, then the target organization 128 00:04:53,122 --> 00:04:55,500 may have created their own web applications 129 00:04:55,500 --> 00:04:58,110 and associate application programming interfaces, 130 00:04:58,110 --> 00:05:01,170 known as an API, and those might be in scope. 131 00:05:01,170 --> 00:05:03,000 Now, an application programming interface 132 00:05:03,000 --> 00:05:04,551 is a type of software intermediary 133 00:05:04,551 --> 00:05:07,620 that allows two applications to talk to each other. 134 00:05:07,620 --> 00:05:10,560 For example, every time you use an app like Facebook, 135 00:05:10,560 --> 00:05:11,700 send an instant message, 136 00:05:11,700 --> 00:05:13,500 or check the weather on your smartphone, 137 00:05:13,500 --> 00:05:16,380 you're actually using an API behind the scenes. 138 00:05:16,380 --> 00:05:19,350 For this reason, it's really important to identify any web 139 00:05:19,350 --> 00:05:21,600 or mobile applications that may become part 140 00:05:21,600 --> 00:05:23,340 of the scope of your engagement. 141 00:05:23,340 --> 00:05:25,650 If your team is asked to conduct a penetration test 142 00:05:25,650 --> 00:05:28,110 against the company's web or mobile application, 143 00:05:28,110 --> 00:05:29,010 you should clarify 144 00:05:29,010 --> 00:05:31,560 and define some basic guidelines upfront. 145 00:05:31,560 --> 00:05:33,450 For example, can you ask the client 146 00:05:33,450 --> 00:05:34,770 to provide a discrete volume 147 00:05:34,770 --> 00:05:36,390 of the total number of web pages 148 00:05:36,390 --> 00:05:38,700 that you're gonna be expected to test or analyze? 149 00:05:38,700 --> 00:05:40,860 Or maybe they're gonna give you a percentage. 150 00:05:40,860 --> 00:05:42,780 Let's say you were hired by Facebook. 151 00:05:42,780 --> 00:05:44,760 You would be unable to test their entire website 152 00:05:44,760 --> 00:05:48,210 for every possible page combination, so instead, 153 00:05:48,210 --> 00:05:50,040 they may state that you need to conduct an assessment 154 00:05:50,040 --> 00:05:53,010 on at least 1% of their total pages. 155 00:05:53,010 --> 00:05:55,230 If you're conducting application testing, 156 00:05:55,230 --> 00:05:57,000 you should also ask for the various roles 157 00:05:57,000 --> 00:05:58,860 that are used by that application 158 00:05:58,860 --> 00:06:00,150 and then ask what permission levels 159 00:06:00,150 --> 00:06:01,800 are assigned to each role. 160 00:06:01,800 --> 00:06:03,300 This will allow you to run the assessment 161 00:06:03,300 --> 00:06:05,610 against the application as a regular end user, 162 00:06:05,610 --> 00:06:08,520 a privileged user, or an administrative, or root user 163 00:06:08,520 --> 00:06:09,821 to test the effects of what each type 164 00:06:09,821 --> 00:06:13,110 of user can do against that given application. 165 00:06:13,110 --> 00:06:15,144 Personally, I find it best to gather information 166 00:06:15,144 --> 00:06:17,610 on which applications are gonna be tested, 167 00:06:17,610 --> 00:06:19,590 what platforms are gonna be used on, 168 00:06:19,590 --> 00:06:20,940 and what specific scenarios 169 00:06:20,940 --> 00:06:22,710 the organization is worried about 170 00:06:22,710 --> 00:06:25,140 when you're defining the scope for the engagement. 171 00:06:25,140 --> 00:06:27,720 For example, do they want us to test their web app, 172 00:06:27,720 --> 00:06:29,490 their Android app, or their iPhone app, 173 00:06:29,490 --> 00:06:31,200 or all three of those? 174 00:06:31,200 --> 00:06:32,127 This is important to understand 175 00:06:32,127 --> 00:06:34,579 because doing all three will drastically increase 176 00:06:34,579 --> 00:06:36,750 the scope of the assessment. 177 00:06:36,750 --> 00:06:38,680 The bottom line is that you need to properly identify 178 00:06:38,680 --> 00:06:41,880 what is hosted locally on the organization's network, 179 00:06:41,880 --> 00:06:44,490 what's being hosted in the cloud, and what's being hosted 180 00:06:44,490 --> 00:06:47,310 or processed by a web or mobile application. 181 00:06:47,310 --> 00:06:49,440 Once you identify that, you can then work 182 00:06:49,440 --> 00:06:51,360 on defining a target list with that client 183 00:06:51,360 --> 00:06:53,820 to clearly dictate what assets are in scope 184 00:06:53,820 --> 00:06:54,990 and which ones are out of scope 185 00:06:54,990 --> 00:06:57,369 for your particular engagement. 186 00:06:57,369 --> 00:06:59,779 (light upbeat music) 14530

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.