penetration testing

9
PENETRATION TESTING From: Sumtrix (A Cyber Security Consultancy) By: Mayank Singh

Upload: mayank-singh

Post on 06-Aug-2015

407 views

Category:

Documents


7 download

TRANSCRIPT

Page 1: Penetration Testing

PENETRATION TESTING

From: Sumtrix (A Cyber Security Consultancy)

By: Mayank Singh

Page 2: Penetration Testing

WWW.SUMTRIX.COM Email:[email protected]

About PENETRATION TESTING

▪ A Penetration Testing, also known as a Pen Test is a legal attempt at gaining access to your protected computer systems or networks, often conducted by a third party organization. The purpose of the test is to identify security vulnerabilities and then attempt to successfully exploit them in order to gain some form of access to the network or computer system.

▪ Two of the more common types of penetration tests are black box and white box penetration testing. 

In a black box test, no prior knowledge of the corporate system is given to the third party tester. This is often the most preferred test as it is an accurate simulation of how an outsider/hacker would see the network and attempt to break into it. 

A white box test on the other hand is when the third party organisation is given full IP information, network diagrams and source code files to the software, networks and systems, in a bid to find weaknesses from any of the available information.

November 2014 Mayank SIngh

Page 3: Penetration Testing

WWW.SUMTRIX.COM Email:[email protected]

PENETRATION TESTING- SOFTWARE'S / TOOLS / UTILITIES

November 2014 Mayank SIngh

▪ Exploitation

▪ Framework

▪ Social Engineering Attack Tools

▪ SQL Injection Detection Tools

Page 4: Penetration Testing

WWW.SUMTRIX.COM Email:[email protected]

November 2014 Mayank SIngh

EXPLOITATION TOOL

Page 5: Penetration Testing

WWW.SUMTRIX.COM Email:[email protected]

Continue…

November 2014 Mayank SIngh

EXPLOITATION TOOL

Page 6: Penetration Testing

WWW.SUMTRIX.COM Email:[email protected]

▪ Metasploit

▪ Mercury

▪ OpenSCAP

▪ rsif

▪ Phemail.py

▪ Xenotix XSS Exploit Framework 

November 2014 Mayank SIngh

FRAMEWORK

Page 7: Penetration Testing

WWW.SUMTRIX.COM Email:[email protected]

• Social-Engineering Toolkit (SET)

November 2014 Mayank SIngh

SOCIAL ENGINEERING ATTACK TOOLS

Page 8: Penetration Testing

WWW.SUMTRIX.COM Email:[email protected]

▪ CAT.NET

▪ Dotdefender

▪ Microsoft Url Scan

▪ GreenSql

▪ HP Scrawlr

▪ Sqlstripes

November 2014 Mayank SIngh

SQL INJECTION DETECTION TOOLS

Page 9: Penetration Testing

WWW.SUMTRIX.COM Email:[email protected]

ThankYouBe Secure AlwaysFor more Updates:

www.sumtrix.com

www.facebook.com/sumtrix14

Email:[email protected]

November 2014 Mayank SIngh

SumtrixA Cyber Security Consultancy