We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12
Penetration Testing
• In the Ethical Hacking environment, the most
common term that often uses is "pentester." Pentesters are the penetration tester that has permission to hack a system by owner. • Penetration testing is the process of hacking a system with the permission from the owner of that system, to evaluate security, Hack Value, Target of Evaluation (TOE), attacks, exploits, zero-day vulnerability & other components such as threats, vulnerabilities, and daisy chaining. Penetration Testing Important for Penetration testing Some major advantages and need for penetration testing is to uncover the vulnerabilities in systems and security deployments in the same way an attacker gains access: - • To identify the threats and vulnerabilities to organizations assets. • To provide a comprehensive assessment of policies, procedures, design, and architecture. • To set remediation actions to secure them before they are used by a hacker to breach security. • To identify what an attacker can access to steal. • To identify what information can be theft and its use. • To test and validate the security protection & identify the need for any additional protection layer. • Modification and up-gradation of currently deployment security architecture. • To reduce the expense of IT Security by enhancing Return on Security Investment (ROSI). Types of Penetration Testing • Three types of Penetration testing are important to be differentiated because a penetration tester may have asked to perform any of them. • Black Box • The black box is a type of penetration testing in which the pentester is blind testing or double-blind testing, i.e. provided with no prior knowledge of the system or any information of the target. Black boxing is designed to demonstrate an emulated situation as an attacker in countering an attack. • Gray box • Gray box, is a type of penetration testing in which the pentester has very limited prior knowledge of the system or any information of targets such as IP addresses, Operating system or network information in very limited. Gary boxing is designed to demonstrate an emulated situation as an insider might have this information and to counter an attack as the pentester has basic, limited information regarding target. • White box • The white box is a type of penetration testing in which the pentester has complete knowledge of system and information of the target. This type of penetration is done by internal security teams or security audits teams to perform auditing. Phases of Penetration Testing • Penetration testing is a three-phase process. – Pre-Attack Phase – Attack Phase – Post-Attack Phase Phases of Penetration Testing • Security Testing Methodology There are some methodological approaches to be adopted for security or penetration testing. Industry-leading Penetration Testing Methodologies are: - • Open Web Application Security Project (OWASP) • Open Source Security Testing Methodology Manual (OSSTMM) • Information Systems Security Assessment Framework (ISAF) • EC-Council Licensed Penetration Tester (LPT) Methodology Penetration testing process
• Gathering the open-source intelligence
• Scanning and discovering • Identify the vulnerabilities • Attack phase • Risk analysis • Send report • Security Testing Methodology • There are some methodological approaches to be adopted for security or penetration testing. Industry-leading Penetration Testing Methodologies are: - • Open Web Application Security Project (OWASP) • Open Source Security Testing Methodology Manual (OSSTMM) • Information Systems Security Assessment Framework (ISAF) • EC-Council Licensed Penetration Tester (LPT) Methodology • Social Engineering • You can understand the social engineering as an art of extracting sensitive information from peoples. Social Engineers keep themselves undetected, people are unaware and careless and share their valuable information. This information is related to the type of social engineering. In Information Security aspects, Footprinting through Social engineering gathers information such as: - • Credit card information. Username & Passwords. • Security devices & Technology information. Operating System information. • Software information. Network information. • IP address & name server’s information. • Eavesdropping • Eavesdropping is a type of Social Engineering footprinting in which the Social Engineer is gathers information by listening to the conversation covertly. Listening conversations includes listening, reading or accessing any source of information without being notified. • Phishing • In the Phishing process, Emails sent to a targeted group contains email message body which looks legitimate. The recipient clicks the link mentioned in the email assuming it as a legitimate link. Once the reader clicks the link, enticed for providing information. It redirects users to the fake webpage that looks like an official website. For example, Recipient is redirected to a fake bank webpage, asking for sensitive information. Similarly, the redirected link may download any malicious script onto the recipient’s system to fetch information. • Shoulder Surfing • Shoulder Surfing is another method of gathering information by standing behind a target when he is interacting with sensitive information. By Shoulder surfing, passwords, account numbers, or other secret information can be gathered depending upon the carelessness of the target. • Dumpster Diving • Dumpster Diving is the process of looking for treasure in trash. This technique is older but still effective. It includes accessing the target's trash such as printer trash, user desk, company's trash for finding phone bills, contact information’s, financial information, source codes, and other helpful material.