Demystifying Penetration Testing by Sambit Priyambad Rout
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Demystifying Penetration Testing by Sambit Priyambad Rout

  • 1,289 views
Uploaded on

Steps involved in scanning the vulnerabilities on a computer system.better known as pentesting

Steps involved in scanning the vulnerabilities on a computer system.better known as pentesting

More in: Education , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,289
On Slideshare
1,289
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
45
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Add the images of each step with animation they flow by.
  • Add the images of each step with animation they flow by.
  • Add the images of each step with animation they flow by.
  • Add the images of each step with animation they flow by.

Transcript

  • 1. KONARK INSTITUTE OF SCIENCE & TECHNOLOGY Prepared By : Sambit Priyambad Rout Branch:Computer Science & Engineering 7 th semester Registration No:0601214088 Email:sambit.on@gmail.com seminar on DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING CYBERCON 2009
  • 2.
    • It is a process of gaining access to systems,network and resources without prior knowledge of username password and other normal means.
    • Penetration Testers are different from attackers as they perform on demand hacking of systems and have necessary legal permissions from the organizations.
    • Used for internal and external security assessment of an organization .
    What is Pen-Testing ?
  • 3.
    • Securing the networks
    • Protecting business secrets
    • Some cases of network intrusion:
    • DRDO hack 1998,MILWORM
    • LHC hack 2008,GST
    • Nokia, Fujitsu, Motorola, and Sun Microsystems,NYT 1980-95,Kevin Mitnick
    Why Pen-Testing ?
  • 4. Penetration Testing vs. Vulnerability Assessment
  • 5. Types of Penetration Testing ?
  • 6. Scope of Penetration Testing ?
  • 7.
    • Wireless Networks
    • DMZ environments
    • Internet Data Centers (IDC)
    • VPN Termination points
    • Remote Access points
    • Dial -In
    Possible Environments for Pen-Testing ?
  • 8.
    • 1.Network Information Gathering
    • 2. Ports Scanning and Automated Vulnerability Scanning
    • 3. Network Attack & Penetration
    • 4.Local Information Gathering
    • 5.Privilege Escalation , Maintaining Access and covering Tracks
    • 6.Social Engineering
    • 7.Report and Documentation of facts with PoC’s
    Pen-Testing Approach…
  • 9.
    • Domain Registration and Mail ID
    Network Information Gathering Whois.com
  • 10.
    • IP ranges
    Network Information Gathering
  • 11.
    • OS Types
    Network Information Gathering
  • 12.
    • Applications Running
    Network Information Gathering
  • 13.
    • Scan for Open ,Closed
    • and Filtered ports and
    • identify services
    • Scan for vulnerabilities
    • for known applications
    • running on that port.
    Port Scanning and AVS…
  • 14.
    • Vulnerabilities discovered
    • during AVS are exploited
    • either by use of automated
    • tools or manually.
    • Gaining Access
    • Metasploit ,CORE Impact
    • and SAINTexploit
    • SQL Injection
    • Buffer Overflow attacks
    Exploiting Known Vulnerabilities…
  • 15.
    • Password Cracking techniques:
    • Brute Force Attack
    • Hybrid Attack
    • Dictionary Attack
    Password Cracking
  • 16. Post Attack Scenario…
    • Creates a new user account with administrator
    • privilege
    • After the system has been compromised the
    • attacker tries to maintain access to the system
    • Installs trojans ,worms ,backdoors
    • After exploring the system ,the attacker deletes
    • the user account
    • Cleans up the tracks by use of timestamp tools
  • 17.
    • How it is done?
    • Phone Phreaking in 1980’s
    • Founder of social engineering Kevin Mitinick – FBI’s most wanted computer criminal
    • Motorola source code stolen
    • Inhouse training of staffs
    Social Engineering
  • 18. Reporting and Documentation…
    • A briefing of the penetration test,details of the techniques used
    • Classify the vulnerabilities as high,low or medium risk
    • PoC
    • Remedies for the vulnerability
    • Suggest best practices
    • A summary of the overall testing process
  • 19.
    • Enumeration ,Fingerprinting and Scanning: Traceroute,Nmap,whois lookup,nslookup,
    • Ports Scanning and Automated Vulnerability Scanning: Nmap,GFI Languard,Nessus,Personal Security Inspector 1.5
    • Exploiting Services for Known Vulnerabilities: Metasploit 3.2,CORE Impact,SAINTexploit
    • Password Cracking: Brutus,MungaBunga,Elcomsoft,John The Ripper
    • Post Attack: BackOrifice,LCP 5.0
    • Exploits Used: Open Source and freeware exploits
    • Toolkits: BackTrack 4,Knoppix-STD
    List of Tools…
  • 20.
    • www.sans.org
    • www.insecure.org
    • Wikipedia
    • www.hackingspirits.com
    • www.remote-exploit.org
    • www.milw0rm.com
    • www.governmentsecurity.org
    • www.astalavista.net
    Bibliography
  • 21. QUERIES ?
  • 22. Thank You !! SAMBIT PRIYAMBAD ROUT CSE,7 th semester 0601214088 [email_address]