Penetration Testing
Penetration Testing
Alex Akshat
Introduction
• Definition of Penetration Testing
• Who needs Penetration Testing?
• Penetration Testing Viewpoints
• Phases of Penetration Testing
- Reconnaissance and Information Gathering
- Network Enumeration and Scanning
- Vulnerability Testing and Exploitation
• Reporting
Penetration Testing
Definition of Penetration Testing:
• Reporting
Reconnaissance and Information Gathering
Purpose: To discover as much information about a target (individual or
organization) as possible without actually making network contact with
said target.
Methods:
• Organization info discovery via WHOIS
• Google search
• Website browsing
WHOIS Results for www.clemson.edu
Domain Name: CLEMSON.EDU
Registrant:
Clemson University
340 Computer Ct
Anderson, SC 29625
UNITED STATES
Administrative Contact:
Network Operations Center
Clemson University
340 Computer Court
Anderson, SC 29625
UNITED STATES
(864) 656-4634
[email protected]
Technical Contact:
Mike S. Marshall
DNS Admin
Clemson University
Clemson University
340 Computer Court
Anderson, SC 29625
UNITED STATES
(864) 247-5381
[email protected]
Name Servers:
EXTNS1.CLEMSON.EDU 130.127.255.252
EXTNS2.CLEMSON.EDU 130.127.255.253
EXTNS3.CLEMSON.EDU 192.42.3.5
Network Enumeration and Scanning
Purpose: To discover existing networks owned by a target as well as live
hosts and services running on those hosts.
Methods:
• Scanning programs that identify live hosts, open ports, services, and
other info (Nmap, autos can)
• DNS Querying
• Route analysis (traceroute)
NMAP Results
1 nmap –sS 127.0.0.1
2
3 Starting Nmap 4.01 at 2006-07-06 17:23 BST
4 Interesting ports on chaos (127.0.0.1):
5 (The 1668 ports scanned but not shown below are in state: closed)
6 PORT STATE SERVICE
7 21/tcp open ftp
8 22/tcp open ssh
9 631/tcp open ipp
10 6000/tcp open X11
11
12 Nmap finished: 1 IP address (1 host up) scanned in 0.207
13 seconds
Vulnerability Testing and Exploitation
Purpose: To check hosts for known vulnerabilities and to see if they are
exploitable, as well as to assess the potential severity of said vulnerabilities.
Methods:
• Remote vulnerability scanning (Nessus, OpenVAS)
• Active exploitation testing
• 1.Login checking and bruteforcing
• 2.Vulnerability exploitation (Metasploit, Core Impact)
• 3.0day and exploit discovery (Fuzzing, program analysis)
• 4.Post exploitation techniques to assess severity (permission levels,
backdoors, rootkits, etc)
Reporting
Purpose: To organize and document information found during the
reconnaissance, network scanning, and vulnerability testing phases of a
pentest.
Reporting
Methods:
• Documentation tools (Dradis)
• Organizes information by hosts, services, identified hazards and
risks, recommendations to fix problems