Top Banner
PENETRATION TESTING From: Sumtrix (A Cyber Security Consultancy) By: Mayank Singh
9
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Penetration Testing

PENETRATION TESTING

From: Sumtrix (A Cyber Security Consultancy)

By: Mayank Singh

Page 2: Penetration Testing

WWW.SUMTRIX.COM Email:[email protected]

About PENETRATION TESTING

▪ A Penetration Testing, also known as a Pen Test is a legal attempt at gaining access to your protected computer systems or networks, often conducted by a third party organization. The purpose of the test is to identify security vulnerabilities and then attempt to successfully exploit them in order to gain some form of access to the network or computer system.

▪ Two of the more common types of penetration tests are black box and white box penetration testing. 

In a black box test, no prior knowledge of the corporate system is given to the third party tester. This is often the most preferred test as it is an accurate simulation of how an outsider/hacker would see the network and attempt to break into it. 

A white box test on the other hand is when the third party organisation is given full IP information, network diagrams and source code files to the software, networks and systems, in a bid to find weaknesses from any of the available information.

November 2014 Mayank SIngh

Page 3: Penetration Testing

WWW.SUMTRIX.COM Email:[email protected]

PENETRATION TESTING- SOFTWARE'S / TOOLS / UTILITIES

November 2014 Mayank SIngh

▪ Exploitation

▪ Framework

▪ Social Engineering Attack Tools

▪ SQL Injection Detection Tools

Page 4: Penetration Testing

WWW.SUMTRIX.COM Email:[email protected]

November 2014 Mayank SIngh

EXPLOITATION TOOL

Page 5: Penetration Testing

WWW.SUMTRIX.COM Email:[email protected]

Continue…

November 2014 Mayank SIngh

EXPLOITATION TOOL

Page 6: Penetration Testing

WWW.SUMTRIX.COM Email:[email protected]

▪ Metasploit

▪ Mercury

▪ OpenSCAP

▪ rsif

▪ Phemail.py

▪ Xenotix XSS Exploit Framework 

November 2014 Mayank SIngh

FRAMEWORK

Page 7: Penetration Testing

WWW.SUMTRIX.COM Email:[email protected]

• Social-Engineering Toolkit (SET)

November 2014 Mayank SIngh

SOCIAL ENGINEERING ATTACK TOOLS

Page 8: Penetration Testing

WWW.SUMTRIX.COM Email:[email protected]

▪ CAT.NET

▪ Dotdefender

▪ Microsoft Url Scan

▪ GreenSql

▪ HP Scrawlr

▪ Sqlstripes

November 2014 Mayank SIngh

SQL INJECTION DETECTION TOOLS

Page 9: Penetration Testing

WWW.SUMTRIX.COM Email:[email protected]

ThankYouBe Secure AlwaysFor more Updates:

www.sumtrix.com

www.facebook.com/sumtrix14

Email:[email protected]

November 2014 Mayank SIngh

SumtrixA Cyber Security Consultancy