0% found this document useful (0 votes)
104 views

Penetration Testing

Ethical Hacking

Uploaded by

Ranveer Dogra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views

Penetration Testing

Ethical Hacking

Uploaded by

Ranveer Dogra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Penetration Testing

• In the Ethical Hacking environment, the most


common term that often uses is "pentester."
Pentesters are the penetration tester that has
permission to hack a system by owner.
• Penetration testing is the process of hacking a
system with the permission from the owner of
that system, to evaluate security, Hack Value,
Target of Evaluation (TOE), attacks, exploits,
zero-day vulnerability & other components
such as threats, vulnerabilities, and daisy
chaining.
Penetration Testing
Important for Penetration testing
Some major advantages and need for penetration testing is to
uncover the vulnerabilities in systems and security
deployments in the same way an attacker gains access: -
• To identify the threats and vulnerabilities to organizations
assets.
• To provide a comprehensive assessment of policies,
procedures, design, and architecture.
• To set remediation actions to secure them before they are
used by a hacker to breach security.
• To identify what an attacker can access to steal.
• To identify what information can be theft and its use.
• To test and validate the security protection & identify the
need for any additional protection layer.
• Modification and up-gradation of currently deployment
security architecture.
• To reduce the expense of IT Security by enhancing Return on
Security Investment (ROSI).
Types of Penetration Testing
• Three types of Penetration testing are important to be differentiated
because a penetration tester may have asked to perform any of them.
• Black Box
• The black box is a type of penetration testing in which the pentester is
blind testing or double-blind testing, i.e. provided with no prior knowledge
of the system or any information of the target. Black boxing is designed to
demonstrate an emulated situation as an attacker in countering an attack.
• Gray box
• Gray box, is a type of penetration testing in which the pentester has very
limited prior knowledge of the system or any information of targets such
as IP addresses, Operating system or network information in very limited.
Gary boxing is designed to demonstrate an emulated situation as an
insider might have this information and to counter an attack as the
pentester has basic, limited information regarding target.
• White box
• The white box is a type of penetration testing in which the pentester has
complete knowledge of system and information of the target. This type of
penetration is done by internal security teams or security audits teams to
perform auditing.
Phases of Penetration Testing
• Penetration testing is a three-phase process.
– Pre-Attack Phase
– Attack Phase
– Post-Attack Phase
Phases of Penetration Testing
• Security Testing Methodology
There are some methodological approaches to be
adopted for security or penetration testing.
Industry-leading Penetration Testing
Methodologies are: -
• Open Web Application Security Project (OWASP)
• Open Source Security Testing Methodology
Manual (OSSTMM)
• Information Systems Security Assessment
Framework (ISAF)
• EC-Council Licensed Penetration Tester (LPT)
Methodology
Penetration testing process

• Gathering the open-source intelligence


• Scanning and discovering
• Identify the vulnerabilities
• Attack phase
• Risk analysis
• Send report
• Security Testing Methodology
• There are some methodological approaches to be
adopted for security or penetration testing.
Industry-leading Penetration Testing
Methodologies are: -
• Open Web Application Security Project (OWASP)
• Open Source Security Testing Methodology
Manual (OSSTMM)
• Information Systems Security Assessment
Framework (ISAF)
• EC-Council Licensed Penetration Tester (LPT)
Methodology
• Social Engineering
• You can understand the social engineering as an art of
extracting sensitive information from peoples. Social
Engineers keep themselves undetected, people are
unaware and careless and share their valuable
information. This information is related to the type of
social engineering. In Information Security aspects,
Footprinting through Social engineering gathers
information such as: -

Credit card information. Username & Passwords.
• Security devices & Technology information. Operating
System information.
• Software information. Network information.
• IP address & name server’s information.
• Eavesdropping
• Eavesdropping is a type of Social Engineering footprinting in
which the Social Engineer is gathers information by listening
to the conversation covertly. Listening conversations
includes listening, reading or accessing any source of
information without being notified.
• Phishing
• In the Phishing process, Emails sent to a targeted group
contains email message body which looks legitimate. The
recipient clicks the link mentioned in the email assuming it
as a legitimate link. Once the reader clicks the link, enticed
for providing information. It redirects users to the fake
webpage that looks like an official website. For example,
Recipient is redirected to a fake bank webpage, asking for
sensitive information. Similarly, the redirected link may
download any malicious script onto the recipient’s system
to fetch information.
• Shoulder Surfing
• Shoulder Surfing is another method of gathering
information by standing behind a target when he is
interacting with sensitive information. By Shoulder
surfing, passwords, account numbers, or other secret
information can be gathered depending upon the
carelessness of the target.
• Dumpster Diving
• Dumpster Diving is the process of looking for treasure
in trash. This technique is older but still effective. It
includes accessing the target's trash such as printer
trash, user desk, company's trash for finding phone
bills, contact information’s, financial information,
source codes, and other helpful material.

You might also like