Introduction To Penetration Testing
Introduction To Penetration Testing
Contents
Introduction to Penetration testing.
Penetration Testing
Vulnerability Assessment
A vulnerability is an assessment where you identify areas in the
The software is not performing attacks on the system, it simply checks the
Unused accounts
Administrative accounts
Unpatched software
Vulnerability software
Characteristics of vulnerability assessment
Passively testing security controls: you are not actually trying to hack
assessment, you are looking to identify of there are any security controls
that should be used that are not currently being used
Characteristics of vulnerability assessment
Identify common misconfigurations
is not.
Penetration Testing
Penetration testing or pentesting: involves simulating real attacks to
Using many tools and techniques, the penetration tester attempts to exploit
Exploiting vulnerabilities
Difference: Penetration Testing vs Vulnerability Assessment?
Purpose Identify, rank, and report vulnerabilities Identify ways to exploit vulnerabilities
but does not exploit them
Tools Automated manual
Difficult Administrator or inexperienced security Penetration tester (higher skill level)
level professional
Price Higher
Vulnerability Assessment:
Time longer
Penetration Testing vs Vulnerability Assessment
Vulnerability Assessment is not Penetration Testing
link.
database
2. Types of Penetration testing.
Black-box testing
Penetration Tester is performed with no knowledge of the target system
Social Engineering
4. Benefits of Penetration Testing
4. Benefits of Penetration Testing
Penetration testing lists a set of vulnerabilities.
would be able to access from within the internal structure of the network
External Penetration testing
External penetration testing is to identify vulnerabilities that are present
exploited?
How are databases to be handled? Are you allowed to add records, users,
and so on?
Determination of scope
Rules of engagement documentation:
Let your client know how any illegal data that is found during testing
would be handled.
Contact information for both your team and for the key employees of the
Intelligence Gathering
Threat Modeling
Vulnerability Analysis
Exploitation
Post Exploitation
Reporting
Payment Card Industry Data Security Standard
PCI Information Supplement: Penetration Testing Guidance March 2015
OWASP Testing Guide
Web Application Security
Excellent resource
Installing Nessus