KONARK INSTITUTE OF SCIENCE & TECHNOLOGY Prepared  By : Sambit Priyambad Rout Branch:Computer Science & Engineering 7 th  ...
<ul><li>It is a process of gaining access to systems,network and resources without prior knowledge of username password an...
<ul><li>Securing the  networks </li></ul><ul><li>Protecting business secrets </li></ul><ul><li>Some cases of network intru...
Penetration Testing vs. Vulnerability Assessment
Types of Penetration Testing ?
Scope of Penetration Testing ?
<ul><li>Wireless Networks </li></ul><ul><li>DMZ environments </li></ul><ul><li>Internet Data Centers (IDC) </li></ul><ul><...
<ul><li>1.Network Information Gathering </li></ul><ul><li>2. Ports Scanning  and Automated Vulnerability Scanning </li></u...
<ul><li>Domain Registration and Mail ID </li></ul>Network Information Gathering Whois.com
<ul><li>IP ranges </li></ul>Network Information Gathering
<ul><li>OS Types </li></ul>Network Information Gathering
<ul><li>Applications Running </li></ul>Network Information Gathering
<ul><li>Scan for Open ,Closed  </li></ul><ul><li>and Filtered ports and </li></ul><ul><li>identify services </li></ul><ul>...
<ul><li>Vulnerabilities discovered  </li></ul><ul><li>during AVS are exploited </li></ul><ul><li>  either by use of automa...
<ul><li>Password Cracking techniques: </li></ul><ul><li>Brute Force Attack </li></ul><ul><li>Hybrid Attack </li></ul><ul><...
Post Attack Scenario… <ul><li>Creates a new user account with administrator </li></ul><ul><li>privilege </li></ul><ul><li>...
<ul><li>How it is done? </li></ul><ul><li>Phone Phreaking in 1980’s </li></ul><ul><li>Founder of social engineering Kevin ...
Reporting and Documentation… <ul><li>A briefing of the penetration test,details of  the techniques used </li></ul><ul><li>...
<ul><li>Enumeration ,Fingerprinting and Scanning:  Traceroute,Nmap,whois lookup,nslookup, </li></ul><ul><li>Ports Scanning...
<ul><li>www.sans.org </li></ul><ul><li>www.insecure.org </li></ul><ul><li>Wikipedia </li></ul><ul><li>www.hackingspirits.c...
QUERIES ?
Thank You !! SAMBIT PRIYAMBAD ROUT CSE,7 th  semester 0601214088 [email_address]
Upcoming SlideShare
Loading in...5
×

Demystifying Penetration Testing by Sambit Priyambad Rout

786

Published on

Steps involved in scanning the vulnerabilities on a computer system.better known as pentesting

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
786
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
55
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Add the images of each step with animation they flow by.
  • Add the images of each step with animation they flow by.
  • Add the images of each step with animation they flow by.
  • Add the images of each step with animation they flow by.
  • Demystifying Penetration Testing by Sambit Priyambad Rout

    1. 1. KONARK INSTITUTE OF SCIENCE & TECHNOLOGY Prepared By : Sambit Priyambad Rout Branch:Computer Science & Engineering 7 th semester Registration No:0601214088 Email:sambit.on@gmail.com seminar on DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING CYBERCON 2009
    2. 2. <ul><li>It is a process of gaining access to systems,network and resources without prior knowledge of username password and other normal means. </li></ul><ul><li>Penetration Testers are different from attackers as they perform on demand hacking of systems and have necessary legal permissions from the organizations. </li></ul><ul><li>Used for internal and external security assessment of an organization . </li></ul>What is Pen-Testing ?
    3. 3. <ul><li>Securing the networks </li></ul><ul><li>Protecting business secrets </li></ul><ul><li>Some cases of network intrusion: </li></ul><ul><li>DRDO hack 1998,MILWORM </li></ul><ul><li>LHC hack 2008,GST </li></ul><ul><li>Nokia, Fujitsu, Motorola, and Sun Microsystems,NYT 1980-95,Kevin Mitnick </li></ul>Why Pen-Testing ?
    4. 4. Penetration Testing vs. Vulnerability Assessment
    5. 5. Types of Penetration Testing ?
    6. 6. Scope of Penetration Testing ?
    7. 7. <ul><li>Wireless Networks </li></ul><ul><li>DMZ environments </li></ul><ul><li>Internet Data Centers (IDC) </li></ul><ul><li>VPN Termination points </li></ul><ul><li>Remote Access points </li></ul><ul><li>Dial -In </li></ul>Possible Environments for Pen-Testing ?
    8. 8. <ul><li>1.Network Information Gathering </li></ul><ul><li>2. Ports Scanning and Automated Vulnerability Scanning </li></ul><ul><li>3. Network Attack & Penetration </li></ul><ul><li>4.Local Information Gathering </li></ul><ul><li>5.Privilege Escalation , Maintaining Access and covering Tracks </li></ul><ul><li>6.Social Engineering </li></ul><ul><li>7.Report and Documentation of facts with PoC’s </li></ul>Pen-Testing Approach…
    9. 9. <ul><li>Domain Registration and Mail ID </li></ul>Network Information Gathering Whois.com
    10. 10. <ul><li>IP ranges </li></ul>Network Information Gathering
    11. 11. <ul><li>OS Types </li></ul>Network Information Gathering
    12. 12. <ul><li>Applications Running </li></ul>Network Information Gathering
    13. 13. <ul><li>Scan for Open ,Closed </li></ul><ul><li>and Filtered ports and </li></ul><ul><li>identify services </li></ul><ul><li>Scan for vulnerabilities </li></ul><ul><li>for known applications </li></ul><ul><li> running on that port. </li></ul>Port Scanning and AVS…
    14. 14. <ul><li>Vulnerabilities discovered </li></ul><ul><li>during AVS are exploited </li></ul><ul><li> either by use of automated </li></ul><ul><li>tools or manually. </li></ul><ul><li>Gaining Access </li></ul><ul><li>Metasploit ,CORE Impact </li></ul><ul><li>and SAINTexploit </li></ul><ul><li>SQL Injection </li></ul><ul><li>Buffer Overflow attacks </li></ul>Exploiting Known Vulnerabilities…
    15. 15. <ul><li>Password Cracking techniques: </li></ul><ul><li>Brute Force Attack </li></ul><ul><li>Hybrid Attack </li></ul><ul><li>Dictionary Attack </li></ul>Password Cracking
    16. 16. Post Attack Scenario… <ul><li>Creates a new user account with administrator </li></ul><ul><li>privilege </li></ul><ul><li>After the system has been compromised the </li></ul><ul><li>attacker tries to maintain access to the system </li></ul><ul><li>Installs trojans ,worms ,backdoors </li></ul><ul><li>After exploring the system ,the attacker deletes </li></ul><ul><li>the user account </li></ul><ul><li>Cleans up the tracks by use of timestamp tools </li></ul>
    17. 17. <ul><li>How it is done? </li></ul><ul><li>Phone Phreaking in 1980’s </li></ul><ul><li>Founder of social engineering Kevin Mitinick – FBI’s most wanted computer criminal </li></ul><ul><li>Motorola source code stolen </li></ul><ul><li>Inhouse training of staffs </li></ul>Social Engineering
    18. 18. Reporting and Documentation… <ul><li>A briefing of the penetration test,details of the techniques used </li></ul><ul><li>Classify the vulnerabilities as high,low or medium risk </li></ul><ul><li>PoC </li></ul><ul><li>Remedies for the vulnerability </li></ul><ul><li>Suggest best practices </li></ul><ul><li>A summary of the overall testing process </li></ul>
    19. 19. <ul><li>Enumeration ,Fingerprinting and Scanning: Traceroute,Nmap,whois lookup,nslookup, </li></ul><ul><li>Ports Scanning and Automated Vulnerability Scanning: Nmap,GFI Languard,Nessus,Personal Security Inspector 1.5 </li></ul><ul><li>Exploiting Services for Known Vulnerabilities: Metasploit 3.2,CORE Impact,SAINTexploit </li></ul><ul><li>Password Cracking: Brutus,MungaBunga,Elcomsoft,John The Ripper </li></ul><ul><li>Post Attack: BackOrifice,LCP 5.0 </li></ul><ul><li>Exploits Used: Open Source and freeware exploits </li></ul><ul><li>Toolkits: BackTrack 4,Knoppix-STD </li></ul>List of Tools…
    20. 20. <ul><li>www.sans.org </li></ul><ul><li>www.insecure.org </li></ul><ul><li>Wikipedia </li></ul><ul><li>www.hackingspirits.com </li></ul><ul><li>www.remote-exploit.org </li></ul><ul><li>www.milw0rm.com </li></ul><ul><li>www.governmentsecurity.org </li></ul><ul><li>www.astalavista.net </li></ul>Bibliography
    21. 21. QUERIES ?
    22. 22. Thank You !! SAMBIT PRIYAMBAD ROUT CSE,7 th semester 0601214088 [email_address]
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×