SlideShare a Scribd company logo
What is Penetration testing ?
A vulnerability scanner runs from the end point of the
person inspecting the attack, to the surface in question. The software
compares details about the target attack surface to a database of
information about known security holes in services and ports, anomalies
in packet construction, and potential paths to exploitable programs or
scripts. The scanner software attempts to exploit each vulnerability that
Importance of penetration test :
 Security Audit
 A security audit just checks whether the organization is
following a set of standard security policies and procedures
 Vulnerability Assessment
A vulnerability assessment focuses on discovering the
vulnerabilities in the information system but provides no
indication if the vulnerabilities can be exploited or the amount
of damage that may result from the successful exploitation of
Penetration Testing
Penetration testing is a methodological approach to security
assessment that encompasses the security audit and
vulnerability assessment and demonstrates if the vulnerabilities
in system can be successfully exploited by attackers
Vulnerability Assesment
 A vulnerability assessment focuses on discovering the vulnerabilities in the
information system but provides no indication if the vulnerabilities can be
exploited or the amount of damage that may result from the successful
exploitation of the vulnerability
Vulnerability scanning vs. penetration testing
 Vulnerability scanning and penetration testing are often confused, but in fact
the two security procedures are quite different and are used for different
purposes.
 At the most basic level, vulnerability scanning aims to identify any systems
that are subject to known vulnerabilities, while a penetration test aims to
identify weaknesses in specific system configurations and organizational
processes and practices that can be exploited to compromise security.
Vulnerability management process
 This vulnerability management process involves:
 Identification of vulnerabilities
 Evaluation of the risk posed by any vulnerabilities identified
 Treatment of any identified vulnerabilities
 Reporting on vulnerabilities and how they have been handled
How it works
 A vulnerability scanner runs from the end point of the person inspecting the
attack, to the surface in question. The software compares details about the
target attack surface to a database of information about known security holes
in services and ports, anomalies in packet construction, and potential paths to
exploitable programs or scripts. The scanner software attempts to exploit each
vulnerability that is discovered.
Types of Penetration testing
 Interbal and external
 Blackbox, Whitebox, Greybox
 Announced, Unannounced,
 Passive, Active scans
 Automated , Manual
Methodology
Planning
Foot printing
Exploiting
Reporting
Application Penetration Testing
 Application Penetration Testing is an "ethical attack" intended to reveal the
effectiveness of an application's security controls by highlighting risks posed by actual
exploitable vulnerabilities. Pure Hacking offers a number of application penetration
testing services including:
 Web Application Penetration Testing
 Web Services Penetration Testing
 Mobile Application Penetration Testing
 Secure Code Review
Reporting structure
From top Management
 Title page
 Executive summary
For technical workers
 Title page
 Executive summary
 Test team Details
 Summary of vulnerabilities
 References
 Glossary
Content
 Executive Summary
 Scope of work
 Project objectives
 Assumption
 Timeline
 Summary of findings
 Summary of recommendation
 Methodology
Content (contd..)
 Planning
 Exploitation
 Reporting
 Detail Findings
 Detailed systems information
 Windows server information
 References
 Appendix
Conclusion
 This presentation is meant to share the importance of penetration testing on materials
which is one of the non-destructive methods found in common.
 The impact of vulnerability assessment and its needs are broadly elaborated through
this presentation.
 The types and the methodology involved in the penetration testing are elaborated.
 In final the reporting structure of penetration testing are also deeply discussed through
this presentation.
References :
 https://www.offensive-security.com/reports/sample-penetration-testing-report.pdf
 https://partneredsolutionsit.com/importance-of-vulnerability-scans/
Books :
 Penetration testing :Ahands on introduction to hacking by Georgia Weidman, published by
John wiley & sond Inc
 Penetration Testing for dummies by Robert shimonski , No starch press, San Francisco
Ad

More Related Content

Similar to Penetration testing -A systeamtic approch (20)

Web Application Penetration Testing - Types, Steps & Benefits.pdf
Web Application Penetration Testing - Types, Steps & Benefits.pdfWeb Application Penetration Testing - Types, Steps & Benefits.pdf
Web Application Penetration Testing - Types, Steps & Benefits.pdf
DataSpace Academy
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
Alan Holyoke
 
penetration testing.pptx
penetration testing.pptxpenetration testing.pptx
penetration testing.pptx
wilnawilliams3
 
penetration testing.pptx
penetration testing.pptxpenetration testing.pptx
penetration testing.pptx
wilnawilliams3
 
Learn more about the Penetration Services
Learn more about the Penetration ServicesLearn more about the Penetration Services
Learn more about the Penetration Services
wilnawilliams3
 
Black Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docx
Black Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docxBlack Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docx
Black Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docx
yogitathakurrr3
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools used
Zoe Gilbert
 
Which Security Testing Technique is Best for Testing Applications.pdf
Which Security Testing Technique is Best for Testing Applications.pdfWhich Security Testing Technique is Best for Testing Applications.pdf
Which Security Testing Technique is Best for Testing Applications.pdf
Alpha BOLD
 
Application Security Testing
Application Security TestingApplication Security Testing
Application Security Testing
Anju21552
 
Phases of Penetration Testing
Phases of Penetration TestingPhases of Penetration Testing
Phases of Penetration Testing
KiwiQA
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdf
AmeliaJonas2
 
Ch09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability AssessmentsCh09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability Assessments
Information Technology
 
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security EnhancementDemystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
CyberPro Magazine
 
Exploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity TestingExploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity Testing
jatniwalafizza786
 
The Fundamentals of Penetration Testing.pptx (1).pdf
The Fundamentals of Penetration Testing.pptx (1).pdfThe Fundamentals of Penetration Testing.pptx (1).pdf
The Fundamentals of Penetration Testing.pptx (1).pdf
apurvar399
 
Digitdefence-PPT-Web Application Penetration Testing.pdf
Digitdefence-PPT-Web Application Penetration Testing.pdfDigitdefence-PPT-Web Application Penetration Testing.pdf
Digitdefence-PPT-Web Application Penetration Testing.pdf
apurvar399
 
Introduction Vulnerability assessment and penetration testing.pptx
Introduction Vulnerability assessment and penetration testing.pptxIntroduction Vulnerability assessment and penetration testing.pptx
Introduction Vulnerability assessment and penetration testing.pptx
sami889399
 
(VAPT) Vulnerability Assessment And Penetration Testing
(VAPT) Vulnerability Assessment And Penetration Testing(VAPT) Vulnerability Assessment And Penetration Testing
(VAPT) Vulnerability Assessment And Penetration Testing
Bluechip Gulf IT Services
 
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET Journal
 
Penetration Testing Services_ Comprehensive Guide 2024.pdf
Penetration Testing Services_ Comprehensive Guide 2024.pdfPenetration Testing Services_ Comprehensive Guide 2024.pdf
Penetration Testing Services_ Comprehensive Guide 2024.pdf
qualysectechnology98
 
Web Application Penetration Testing - Types, Steps & Benefits.pdf
Web Application Penetration Testing - Types, Steps & Benefits.pdfWeb Application Penetration Testing - Types, Steps & Benefits.pdf
Web Application Penetration Testing - Types, Steps & Benefits.pdf
DataSpace Academy
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
Alan Holyoke
 
penetration testing.pptx
penetration testing.pptxpenetration testing.pptx
penetration testing.pptx
wilnawilliams3
 
penetration testing.pptx
penetration testing.pptxpenetration testing.pptx
penetration testing.pptx
wilnawilliams3
 
Learn more about the Penetration Services
Learn more about the Penetration ServicesLearn more about the Penetration Services
Learn more about the Penetration Services
wilnawilliams3
 
Black Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docx
Black Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docxBlack Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docx
Black Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docx
yogitathakurrr3
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools used
Zoe Gilbert
 
Which Security Testing Technique is Best for Testing Applications.pdf
Which Security Testing Technique is Best for Testing Applications.pdfWhich Security Testing Technique is Best for Testing Applications.pdf
Which Security Testing Technique is Best for Testing Applications.pdf
Alpha BOLD
 
Application Security Testing
Application Security TestingApplication Security Testing
Application Security Testing
Anju21552
 
Phases of Penetration Testing
Phases of Penetration TestingPhases of Penetration Testing
Phases of Penetration Testing
KiwiQA
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdf
AmeliaJonas2
 
Ch09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability AssessmentsCh09 Performing Vulnerability Assessments
Ch09 Performing Vulnerability Assessments
Information Technology
 
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security EnhancementDemystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
CyberPro Magazine
 
Exploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity TestingExploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity Testing
jatniwalafizza786
 
The Fundamentals of Penetration Testing.pptx (1).pdf
The Fundamentals of Penetration Testing.pptx (1).pdfThe Fundamentals of Penetration Testing.pptx (1).pdf
The Fundamentals of Penetration Testing.pptx (1).pdf
apurvar399
 
Digitdefence-PPT-Web Application Penetration Testing.pdf
Digitdefence-PPT-Web Application Penetration Testing.pdfDigitdefence-PPT-Web Application Penetration Testing.pdf
Digitdefence-PPT-Web Application Penetration Testing.pdf
apurvar399
 
Introduction Vulnerability assessment and penetration testing.pptx
Introduction Vulnerability assessment and penetration testing.pptxIntroduction Vulnerability assessment and penetration testing.pptx
Introduction Vulnerability assessment and penetration testing.pptx
sami889399
 
(VAPT) Vulnerability Assessment And Penetration Testing
(VAPT) Vulnerability Assessment And Penetration Testing(VAPT) Vulnerability Assessment And Penetration Testing
(VAPT) Vulnerability Assessment And Penetration Testing
Bluechip Gulf IT Services
 
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET Journal
 
Penetration Testing Services_ Comprehensive Guide 2024.pdf
Penetration Testing Services_ Comprehensive Guide 2024.pdfPenetration Testing Services_ Comprehensive Guide 2024.pdf
Penetration Testing Services_ Comprehensive Guide 2024.pdf
qualysectechnology98
 

Recently uploaded (20)

pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACYUNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
DR.PRISCILLA MARY J
 
Political History of Pala dynasty Pala Rulers NEP.pptx
Political History of Pala dynasty Pala Rulers NEP.pptxPolitical History of Pala dynasty Pala Rulers NEP.pptx
Political History of Pala dynasty Pala Rulers NEP.pptx
Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
 
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
LDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini UpdatesLDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini Updates
LDM Mia eStudios
 
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Celine George
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Operations Management (Dr. Abdulfatah Salem).pdf
Operations Management (Dr. Abdulfatah Salem).pdfOperations Management (Dr. Abdulfatah Salem).pdf
Operations Management (Dr. Abdulfatah Salem).pdf
Arab Academy for Science, Technology and Maritime Transport
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Library Association of Ireland
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 5-3-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-3-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACYUNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
UNIT 3 NATIONAL HEALTH PROGRAMMEE. SOCIAL AND PREVENTIVE PHARMACY
DR.PRISCILLA MARY J
 
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
LDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini UpdatesLDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini Updates
LDM Mia eStudios
 
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...Multi-currency in odoo accounting and Update exchange rates automatically in ...
Multi-currency in odoo accounting and Update exchange rates automatically in ...
Celine George
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
Geography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjectsGeography Sem II Unit 1C Correlation of Geography with other school subjects
Geography Sem II Unit 1C Correlation of Geography with other school subjects
ProfDrShaikhImran
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Michelle Rumley & Mairéad Mooney, Boole Library, University College Cork. Tra...
Library Association of Ireland
 
Handling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptxHandling Multiple Choice Responses: Fortune Effiong.pptx
Handling Multiple Choice Responses: Fortune Effiong.pptx
AuthorAIDNationalRes
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Ad

Penetration testing -A systeamtic approch

  • 1. What is Penetration testing ? A vulnerability scanner runs from the end point of the person inspecting the attack, to the surface in question. The software compares details about the target attack surface to a database of information about known security holes in services and ports, anomalies in packet construction, and potential paths to exploitable programs or scripts. The scanner software attempts to exploit each vulnerability that
  • 2. Importance of penetration test :  Security Audit  A security audit just checks whether the organization is following a set of standard security policies and procedures  Vulnerability Assessment A vulnerability assessment focuses on discovering the vulnerabilities in the information system but provides no indication if the vulnerabilities can be exploited or the amount of damage that may result from the successful exploitation of
  • 3. Penetration Testing Penetration testing is a methodological approach to security assessment that encompasses the security audit and vulnerability assessment and demonstrates if the vulnerabilities in system can be successfully exploited by attackers
  • 4. Vulnerability Assesment  A vulnerability assessment focuses on discovering the vulnerabilities in the information system but provides no indication if the vulnerabilities can be exploited or the amount of damage that may result from the successful exploitation of the vulnerability
  • 5. Vulnerability scanning vs. penetration testing  Vulnerability scanning and penetration testing are often confused, but in fact the two security procedures are quite different and are used for different purposes.  At the most basic level, vulnerability scanning aims to identify any systems that are subject to known vulnerabilities, while a penetration test aims to identify weaknesses in specific system configurations and organizational processes and practices that can be exploited to compromise security.
  • 6. Vulnerability management process  This vulnerability management process involves:  Identification of vulnerabilities  Evaluation of the risk posed by any vulnerabilities identified  Treatment of any identified vulnerabilities  Reporting on vulnerabilities and how they have been handled
  • 7. How it works  A vulnerability scanner runs from the end point of the person inspecting the attack, to the surface in question. The software compares details about the target attack surface to a database of information about known security holes in services and ports, anomalies in packet construction, and potential paths to exploitable programs or scripts. The scanner software attempts to exploit each vulnerability that is discovered.
  • 8. Types of Penetration testing  Interbal and external  Blackbox, Whitebox, Greybox  Announced, Unannounced,  Passive, Active scans  Automated , Manual
  • 10. Application Penetration Testing  Application Penetration Testing is an "ethical attack" intended to reveal the effectiveness of an application's security controls by highlighting risks posed by actual exploitable vulnerabilities. Pure Hacking offers a number of application penetration testing services including:  Web Application Penetration Testing  Web Services Penetration Testing  Mobile Application Penetration Testing  Secure Code Review
  • 11. Reporting structure From top Management  Title page  Executive summary For technical workers  Title page  Executive summary  Test team Details  Summary of vulnerabilities  References  Glossary
  • 12. Content  Executive Summary  Scope of work  Project objectives  Assumption  Timeline  Summary of findings  Summary of recommendation  Methodology
  • 13. Content (contd..)  Planning  Exploitation  Reporting  Detail Findings  Detailed systems information  Windows server information  References  Appendix
  • 14. Conclusion  This presentation is meant to share the importance of penetration testing on materials which is one of the non-destructive methods found in common.  The impact of vulnerability assessment and its needs are broadly elaborated through this presentation.  The types and the methodology involved in the penetration testing are elaborated.  In final the reporting structure of penetration testing are also deeply discussed through this presentation.
  • 15. References :  https://www.offensive-security.com/reports/sample-penetration-testing-report.pdf  https://partneredsolutionsit.com/importance-of-vulnerability-scans/ Books :  Penetration testing :Ahands on introduction to hacking by Georgia Weidman, published by John wiley & sond Inc  Penetration Testing for dummies by Robert shimonski , No starch press, San Francisco