Module 01 Introduction to Penetration Testing
Module 01 Introduction to Penetration Testing
Lecture 1
- Identifying Personnel for Assistance - Social Engineering Penetration Testing Using Telephone
Attack Vector
- Handling Legal Issues in Penetration Testing
Engagement - Social Engineering Penetration Testing Using Physical
Attack Vector
- Handling Scope Creeping During Pen Testing
- Reporting and Countermeasures/Recommendations
Contents
5: Network Penetration Testing Methodology - External and
7- Midterm Exam
Internal
- External:
8: Network Penetration Testing Methodology - Perimeter
- Port Scanning
Devices
- OS and Service Fingerprinting
- Assessing Firewall Security Implementation
- Vulnerability Research
- Assessing IDS Security Implementation
- Exploit Verification
- Assessing Security of Routers
- Internal:
- Assessing Security of Switches
- Footprinting
- Midterm Exam
- Network Scanning
- OS and Service Fingerprinting
9: Web Application Penetration Testing Methodology
- Enumeration
- Discover Web Application Default Content
- Vulnerability Assessment
- Discover Web Application Hidden Content
- Conduct Web Vulnerability Scanning
6: Network Penetration Testing Methodology - Internal
- Test for SQL Injection Vulnerabilities
(continued)
- Test for XSS Vulnerabilities
- OS Exploitation
- Test for Parameter Tampering
- Other Internal Network Exploitation Techniques
- Automating Internal Network Penetration Test Effort
- Post Exploitation Advanced Tips and Techniques
Contents
10: Web Application Penetration Testing Methodology
12-Report Writing and Post Testing Actions
(continued)
- Tests for Security Misconfiguration Vulnerabilities Penetration Testing Report: An Overview
- Test for Client-Side Attack Phases of Report Development
- Tests for Broken Authentication and Authorization Report Components
Vulnerabilities Penetration Testing Report Analysis
- Tests for Broken Session Management Vulnerabilities Penetration Testing Report Delivery
- Test for Web Services Security Post-Testing Actions for Organizations
- Test for Business Logic Flaws
- Test for Web Server Vulnerabilities
- Test for Thick Clients Vulnerabilities
• What it is ???
What is Information System (IS)?
1. Availability: Information is readily accessible and usable when needed by authorized individuals.
Think "being there when you need it."
2. Accuracy: Information is free from errors and correctly reflects the real-world state. Think "getting
it right."
3. Authenticity: Information is genuine and its source is verifiable. Think "knowing it's the real deal."
4. Confidentiality: Information is only disclosed to authorized individuals and kept secret from
unauthorized ones. Think "keeping secrets safe."
5. Integrity: Information is complete and hasn't been improperly altered or destroyed. Think
"keeping it whole and untainted."
6. Utility: Information is useful and relevant to the purpose for which it is intended. Think "serving its
intended purpose."
7. Possession: An individual or entity has legitimate control over the information. Think "rightful
ownership and control."
•While a breach of confidentiality always results in a breach of possession, the reverse is not true.
Introduction to Penetration Testing
• What is Penetration Testing?
• Definition :A penetration test or pen test is a test evaluating the strengths of
all security controls on the computer system. Penetration tests evaluate
procedural and operational controls as well as technological controls.
• "Penetration testing is a simulated cyberattack against a computer system, network, or
web application to find security vulnerabilities."
• "It's not about breaking things; it's about finding weaknesses and recommending
solutions."
• Goals: Find security gaps, assess potential damage, and suggest fixes.
• Example : "Imagine a website that allows users to log in. A penetration tester
might try to bypass the login process using different techniques to see if there
are any vulnerabilities that a hacker could exploit."
Who needs Penetration Testing
• Banks/Financial Institutions, Government Organizations, Online Vendors, or any
organization processing and storing private information
Methods:
• Organization info discovery via WHOIS
• Google search
• Website browsing
• Google Dorks
• Shodan (for internet-connected devices)
• TheHarvester (email and subdomain enumeration)
WHOIS Results for www.clemson.edu
Domain Name: CLEMSON.EDU Technical Contact:
Registrant: Mike S. Marshall
Clemson University DNS Admin
340 Computer Ct Clemson University
Anderson, SC 29625 Clemson University
340 Computer Court
UNITED STATES Anderson, SC 29625
Administrative Contact: UNITED STATES
Network Operations Center (864) 247-5381
Clemson University [email protected]
340 Computer Court Name Servers:
EXTNS1.CLEMSON.EDU 130.127.255.252
Anderson, SC 29625 EXTNS2.CLEMSON.EDU 130.127.255.253
UNITED STATES EXTNS3.CLEMSON.EDU 192.42.3.5
(864) 656-4634
[email protected]
Network Enumeration and Scanning
Purpose: To discover existing networks owned by a target as well as live
hosts and services running on those hosts.
Methods:
• Scanning programs that identify live hosts, open ports, services, and
other info (Nmap, autoscan)
• DNS Querying (nslookup)
• Route analysis (traceroute)
Network Enumeration and Scanning
• Nmap: A powerful open-source tool for network discovery and security
auditing.
• AutoScan: A network scanner with a graphical interface that allows for
easy identification of hosts and services.
• Automatic network discovery.
• Service detection and OS fingerprinting.
• DNS Querying
• Query DNS servers to resolve domain names to IP addresses.
• nslookup: A network administration command-line tool used for querying the
Domain Name System (DNS) to obtain domain name or IP address mapping.
• Route Analysis (Traceroute)
• Identify the path data packets take from one network to another.
• traceroute: A network diagnostic tool that traces the route packets take to a
destination.
NMap Results
The command nmap -sS 127.0.0.1 performs a TCP SYN scan on
the local machine (127.0.0.1). Here is a typical output you
might expect:
Starting Nmap 7.80 ( https://nmap.org ) at 2024-11-05 03:59
Arabian Standard Time
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000026s latency).
Not shown: 999 closed ports
PORT STATE SERVICE
22/tcp open ssh
Methods:
• Remote vulnerability scanning (Nessus, OpenVAS)
• Active exploitation testing
➢ Login checking and bruteforcing
➢ Vulnerability exploitation (Metasploit, Core
Impact)
➢ Zero-day and exploit discovery (Fuzzing,
program analysis)
➢ Post exploitation techniques to assess severity
➢ (permission levels, backdoors, rootkits, etc)
Reporting
Purpose: To organize and document information
found during the reconnaissance, network
scanning, and vulnerability testing phases of a
pentest.
Methods:
• Documentation tools (Dradis )
• pen-source documentation framework designed for
security assessments and penetration testing.
• It helps streamline the reporting and collaboration
process by allowing you to combine the output of
different security scanning tools, manual findings,
and notes into a single, consistent report
Organizes information by hosts, services,
identified hazards and risks, recommendations
to fix problems
• Examples/Tools:
• Nmap: Network mapping.
• Angry IP Scanner: Network range
scanning
• OpenVAS: Vulnerability scanning.
• Qualys: Security assessment.
• CCTV Analysis: Reviewing camera
footage.
• Physical Penetration Testing:
Testing physical access controls.
• Metasploit: Exploit testing.
• Burp Suite: Web vulnerability
identification.
Ethical and Effective Penetration Testing
• Legal and Ethical Considerations: Always get written permission
before testing. Imagine testing a neighbor's house security without
their consent – that's illegal!
• Scope Definition: Clearly define what will be tested. You wouldn't
want a tester checking your car security if you hired them to test your
house.
• Communication: Keep the client informed.
• Reporting and Remediation: Provide detailed reports and help fix the
issues. The security expert shouldn't just point out the open window;
they should also recommend getting a better lock.
• Confidentiality: Keep test results secret.
Penetration Testing: A Critical Security Measure
• Penetration testing is essential for proactive security. It's like getting
regular health checkups to prevent serious illness.
• Regular tests find and fix vulnerabilities before attackers can exploit
them.
• The LPT methodology helps organizations improve their security
posture.
Questions ???