Penetration - Testing Tutorial
Penetration - Testing Tutorial
Penetration - Testing Tutorial
Tutorial 1
Pen-Test
- Legal attempt to break into a company’s network to find its weakest link
- Tester only reports findings, does not solve problems
Security test
- More than an attempt to break in; also includes analyzing company’s
security policy and procedures
- Tester offers solutions to secure or protect the network
(i) Hacker
(ii) Cracker
Lab Activity 1:
Objective: To examine the SANS list of the most common network exploits.
Description: As fast as IT security professionals attempt to correct network
vulnerabilities, someone creates new exploits. Network security professionals must
keep up to date on those exploits. In this activity, you examine some of the current
exploits used to attack networks. Do not worry – you won’t have to memorize your
Lab Activity 2:
Objective: To install and set-up a virtual machine (Win Server 2000, XP SP3, 7,
Kali).