SlideShare a Scribd company logo
1 of 17
Download to read offline
Topic: Penetration Testing for Cybersecurity Professionals
Penetration tests have become an essential way to stay
proactive in identifying and demonstrating the impact of
security weaknesses before they are discovered and
put to use by a threat actor.
I am a dedicated and experienced
cybersecurity analyst with 3 years of
industry expertise, specializing in
safeguarding digital systems and
information from malicious cyber
threats. I holds a bachelor's degree in
Networking and Cybersecurity from
ISBAT University and a diploma in
Computer Science from St. Lawrence
University Uganda, Kampala. proficient
in Cyber threat intelligence ,
Vulnerability Management, Incident
Response, Ethical Hacking, SOC and
OSINT. Currently works as a cyber
incident handler at Safetycomm
ABOUT ME
CYBER SECURITY ANALYST ,
SAFETYCOMM
CHUOL BUOK YAK
What Is Penetration Testing?
A penetration test, or pen test, is an attempt to
evaluate the security of an IT infrastructure by safely
trying to exploit vulnerabilities. These vulnerabilities
may exist in operating systems, services and
application flaws, improper configurations or risky
end-user behavior. Such assessments are also useful
in validating the efficacy of defensive mechanisms, as
well as end-user adherence to security policies.
Why is Pen Testing Important?
 Identify and Prioritize Security Risks
 Intelligently Manage Vulnerabilities
 Leverage a Proactive Security Approach
 Meet Regulatory Requirements
 Increase Confidence in Your Security Strategy
Who Performs Penetration Tests?
One of the biggest hurdles in creating a successful
cybersecurity program is finding people with the right
qualifications and experience. The cybersecurity skills
gap is well-documented issue with a qualified supply of
security professionals not keeping up with demand. This
is particularly true with pen testing. Unfortunately, there
is no shortage of threat actors and cybercrime groups.
Consequently, organizations can’t delay deploying
critical pen testing initiatives.
Five Stages of Pen Testing
How Often Should You Pen Test?
Penetration testing should be performed on a regular basis to ensure more
consistent IT and network security management. A pen-tester will reveal how
newly discovered threats or emerging vulnerabilities may potentially be assailed
by attackers. In addition to regularly scheduled analysis and assessments
required by regulatory mandates, tests should also be run whenever:
What Should You Do After a Pen Test?
t’s important to plan time for a post-mortem to disseminate, discuss, and
fully understand the findings. Additionally, relaying these results with
actionable insights to decision makers within the organization will better
emphasize the risk that these vulnerabilities pose, and the positive impact
that remediation will have on the business. With review, evaluation, and
leadership buy-in, pen test results can transform into action items for
immediate improvements and takeaways that will help shape larger
security strategies.
What is Reconnaissance?
Cyber Reconnaissance is the first step of any professional penetration
test. In this phase the goal is to gather as much information about the
target as possible. This includes technical information about it’s network
topology and systems. But it also includes information on employees and
the company itself that may be useful in the later stages of the
penetration test. The more information you gather during the
reconnaissance phase the more likely you are to succeed in the later
stages of the penetration test. There are two types of cyber
reconnaissance that you can perform active information gathering and
passive information gathering.
Difference Between Vulnerability Scans and Pen Tests?
Vulnerability scanning is a security management strategy used to identify
and report vulnerabilities in web applications, servers and firewalls. The main
goal of vulnerability scanning is to help your organization’s IT department
detect, classify and report weaknesses in your internal and external networks,
computers, IP addresses and communication equipment.
Penetration testing is a type of test conducted mostly by ethical hackers and
experienced DevOps engineers to test and determine possible security gaps
in an organization’s security architecture. Pen testing is also a form of ethical
hacking deployed to fully understand security vulnerabilities and ways to
remove them from an organization’s security environment.
Different Types of Pen Testing?
5 pen testing rules of engagement
Rules of Engagement for Pen testing
Rules of Engagement (RoE) is a document that deals with the manner in
which the penetration test is to be conducted. Some of the directives that
should be clearly spelled out in RoE before you start the penetration test
are as follows:
 The type and scope of testing
 Client contact details
 Client IT team notifications
 Sensitive data handling
 Status meeting and reports
White Box, Black Box, and Gray Box Penetration Testing
Penetration testing methods continue………..
External testing
External penetration tests target the assets of a
company that are visible on the internet, e.g., the
web application itself, the company website, and
email and domain name servers (DNS). The goal
is to gain access and extract valuable data.
Internal testing
In an internal test, a tester with access to an
application behind its firewall simulates an attack
by a malicious insider. This isn’t necessarily
simulating a rogue employee. A common starting
scenario can be an employee whose credentials
were stolen due to a phishing attack.
What Is Teaming?
Red Teams
A red team is on the offensive side. A red team is formed with the intention of identifying and
assessing vulnerabilities, testing assumptions, viewing alternate options for attack, and revealing
the limitations and security risks for that organization.
Blue Teams
The blue team is tasked with defending the organization. Blue teams are in charge of building up
an organization’s protective measures, and taking action when needed.
Purple Teams
Recently, the concept of a purple team has become more popular in teaming exercises. This is
the mindset of seeing and treating red and blue teams as symbiotic. It’s not red teams vs. blue
teams, but rather one large team focusing on the one overarching goal: improving security. The
key to becoming a purple team comes down to communication between individuals and their
teams.
Penetration Testing/Ethical Hacking Demo
Let’s Hack things now
Window Demo Linux Demo
THE END
Thank you
Q & A
chuol@safetycomm.org
0927318255

More Related Content

What's hot

Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingRaghav Bisht
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?btpsec
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Network security
Network securityNetwork security
Network securityNandini Raj
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Edureka!
 
Nmap basics
Nmap basicsNmap basics
Nmap basicsitmind4u
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanningamiable_indian
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoorsGaurav Dalvi
 
Information security management system
Information security management systemInformation security management system
Information security management systemArani Srinivasan
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsMark Arena
 
Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)ENOInstitute
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
Workshop 101 - Penetration testing & Vulnerability assessment system
Workshop 101 - Penetration testing & Vulnerability assessment systemWorkshop 101 - Penetration testing & Vulnerability assessment system
Workshop 101 - Penetration testing & Vulnerability assessment systemDan H
 

What's hot (20)

Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Network security
Network securityNetwork security
Network security
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Network security
Network security Network security
Network security
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 
Metasploit framwork
Metasploit framworkMetasploit framwork
Metasploit framwork
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanning
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
 
Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)
 
Cia security model
Cia security modelCia security model
Cia security model
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Workshop 101 - Penetration testing & Vulnerability assessment system
Workshop 101 - Penetration testing & Vulnerability assessment systemWorkshop 101 - Penetration testing & Vulnerability assessment system
Workshop 101 - Penetration testing & Vulnerability assessment system
 

Similar to Penetration Testing for Cybersecurity Professionals

Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security EnhancementDemystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancementcyberprosocial
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodFalgun Rathod
 
Pen testing and how does it help strengthen cybersecurity
Pen testing and how does it help strengthen cybersecurityPen testing and how does it help strengthen cybersecurity
Pen testing and how does it help strengthen cybersecurityTestingXperts
 
web application penetration testing.pptx
web application penetration testing.pptxweb application penetration testing.pptx
web application penetration testing.pptxFayemunoz
 
Benefit from Penetration Testing Certification
Benefit from Penetration Testing CertificationBenefit from Penetration Testing Certification
Benefit from Penetration Testing Certificationshanaadams190
 
Pen Testing Services.pptx
Pen Testing Services.pptxPen Testing Services.pptx
Pen Testing Services.pptxMaqwareCorp
 
CMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECTCMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECTHamesKellor
 
5 THREAT AND RISK ASSESSMENT APPROACHES.pptx
5 THREAT AND RISK ASSESSMENT APPROACHES.pptx5 THREAT AND RISK ASSESSMENT APPROACHES.pptx
5 THREAT AND RISK ASSESSMENT APPROACHES.pptxBluechip Gulf IT Services
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfinfosec train
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfShivamSharma909
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51martinvoelk
 
Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Jorge Orchilles
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?Rapid7
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSSprintzeal
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..Sprintzeal
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentationAlan Holyoke
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
Vulnerability Assessment and Penetration Testing: Safeguarding Digital Assets
Vulnerability Assessment and Penetration Testing: Safeguarding Digital AssetsVulnerability Assessment and Penetration Testing: Safeguarding Digital Assets
Vulnerability Assessment and Penetration Testing: Safeguarding Digital AssetsAhad
 

Similar to Penetration Testing for Cybersecurity Professionals (20)

Penetration Testing Guide
Penetration Testing GuidePenetration Testing Guide
Penetration Testing Guide
 
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security EnhancementDemystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
 
Pen testing and how does it help strengthen cybersecurity
Pen testing and how does it help strengthen cybersecurityPen testing and how does it help strengthen cybersecurity
Pen testing and how does it help strengthen cybersecurity
 
web application penetration testing.pptx
web application penetration testing.pptxweb application penetration testing.pptx
web application penetration testing.pptx
 
Backtrack manual Part1
Backtrack manual Part1Backtrack manual Part1
Backtrack manual Part1
 
Benefit from Penetration Testing Certification
Benefit from Penetration Testing CertificationBenefit from Penetration Testing Certification
Benefit from Penetration Testing Certification
 
Pen Testing Services.pptx
Pen Testing Services.pptxPen Testing Services.pptx
Pen Testing Services.pptx
 
CMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECTCMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECT
 
5 THREAT AND RISK ASSESSMENT APPROACHES.pptx
5 THREAT AND RISK ASSESSMENT APPROACHES.pptx5 THREAT AND RISK ASSESSMENT APPROACHES.pptx
5 THREAT AND RISK ASSESSMENT APPROACHES.pptx
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51
 
Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
Vulnerability Assessment and Penetration Testing: Safeguarding Digital Assets
Vulnerability Assessment and Penetration Testing: Safeguarding Digital AssetsVulnerability Assessment and Penetration Testing: Safeguarding Digital Assets
Vulnerability Assessment and Penetration Testing: Safeguarding Digital Assets
 

More from 211 Check

Prebunking and Debunking in Fact-checking
Prebunking and Debunking in Fact-checkingPrebunking and Debunking in Fact-checking
Prebunking and Debunking in Fact-checking211 Check
 
HOW TO WRITE A FACT-CHECK: Master the art of writing a fact-check
HOW TO WRITE A FACT-CHECK: Master the art of writing a fact-checkHOW TO WRITE A FACT-CHECK: Master the art of writing a fact-check
HOW TO WRITE A FACT-CHECK: Master the art of writing a fact-check211 Check
 
211 CHECK ANNUAL IMPACT REPORT 2023
211 CHECK ANNUAL IMPACT REPORT 2023211 CHECK ANNUAL IMPACT REPORT 2023
211 CHECK ANNUAL IMPACT REPORT 2023211 Check
 
Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...
Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...
Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...211 Check
 
Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...
Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...
Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...211 Check
 
Mental Health in Fact-checking and Journalism: Dealing with Stress and Trauma
Mental Health in Fact-checking and Journalism: Dealing with Stress and TraumaMental Health in Fact-checking and Journalism: Dealing with Stress and Trauma
Mental Health in Fact-checking and Journalism: Dealing with Stress and Trauma211 Check
 
Mapping, Researching and Documenting Hate Speech_Skills for Civil Society O...
Mapping, Researching and  Documenting Hate Speech_Skills for Civil Society  O...Mapping, Researching and  Documenting Hate Speech_Skills for Civil Society  O...
Mapping, Researching and Documenting Hate Speech_Skills for Civil Society O...211 Check
 
Online Research_How to get the best out of internet searches
Online Research_How to get the best out of internet searchesOnline Research_How to get the best out of internet searches
Online Research_How to get the best out of internet searches211 Check
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation211 Check
 
Artificial Intelligence (AI)_ A Friend or Enemy in Combating Disinformation ...
Artificial Intelligence (AI)_  A Friend or Enemy in Combating Disinformation ...Artificial Intelligence (AI)_  A Friend or Enemy in Combating Disinformation ...
Artificial Intelligence (AI)_ A Friend or Enemy in Combating Disinformation ...211 Check
 
Techniques and Tools for fact-checking
Techniques and Tools for fact-checkingTechniques and Tools for fact-checking
Techniques and Tools for fact-checking211 Check
 
Discarding confusion: Navigating Information Disorder in South Sudan
Discarding confusion: Navigating Information Disorder in South SudanDiscarding confusion: Navigating Information Disorder in South Sudan
Discarding confusion: Navigating Information Disorder in South Sudan211 Check
 
211 Check Profile August 2023
211 Check Profile August 2023211 Check Profile August 2023
211 Check Profile August 2023211 Check
 

More from 211 Check (13)

Prebunking and Debunking in Fact-checking
Prebunking and Debunking in Fact-checkingPrebunking and Debunking in Fact-checking
Prebunking and Debunking in Fact-checking
 
HOW TO WRITE A FACT-CHECK: Master the art of writing a fact-check
HOW TO WRITE A FACT-CHECK: Master the art of writing a fact-checkHOW TO WRITE A FACT-CHECK: Master the art of writing a fact-check
HOW TO WRITE A FACT-CHECK: Master the art of writing a fact-check
 
211 CHECK ANNUAL IMPACT REPORT 2023
211 CHECK ANNUAL IMPACT REPORT 2023211 CHECK ANNUAL IMPACT REPORT 2023
211 CHECK ANNUAL IMPACT REPORT 2023
 
Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...
Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...
Unmasking Disinformation and Misinformation in South Sudan_Understanding the ...
 
Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...
Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...
Presentation: Unmasking Dis/Misinformation in South Sudan: Understanding the ...
 
Mental Health in Fact-checking and Journalism: Dealing with Stress and Trauma
Mental Health in Fact-checking and Journalism: Dealing with Stress and TraumaMental Health in Fact-checking and Journalism: Dealing with Stress and Trauma
Mental Health in Fact-checking and Journalism: Dealing with Stress and Trauma
 
Mapping, Researching and Documenting Hate Speech_Skills for Civil Society O...
Mapping, Researching and  Documenting Hate Speech_Skills for Civil Society  O...Mapping, Researching and  Documenting Hate Speech_Skills for Civil Society  O...
Mapping, Researching and Documenting Hate Speech_Skills for Civil Society O...
 
Online Research_How to get the best out of internet searches
Online Research_How to get the best out of internet searchesOnline Research_How to get the best out of internet searches
Online Research_How to get the best out of internet searches
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation
 
Artificial Intelligence (AI)_ A Friend or Enemy in Combating Disinformation ...
Artificial Intelligence (AI)_  A Friend or Enemy in Combating Disinformation ...Artificial Intelligence (AI)_  A Friend or Enemy in Combating Disinformation ...
Artificial Intelligence (AI)_ A Friend or Enemy in Combating Disinformation ...
 
Techniques and Tools for fact-checking
Techniques and Tools for fact-checkingTechniques and Tools for fact-checking
Techniques and Tools for fact-checking
 
Discarding confusion: Navigating Information Disorder in South Sudan
Discarding confusion: Navigating Information Disorder in South SudanDiscarding confusion: Navigating Information Disorder in South Sudan
Discarding confusion: Navigating Information Disorder in South Sudan
 
211 Check Profile August 2023
211 Check Profile August 2023211 Check Profile August 2023
211 Check Profile August 2023
 

Recently uploaded

Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfMilind Agarwal
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 

Penetration Testing for Cybersecurity Professionals

  • 1. Topic: Penetration Testing for Cybersecurity Professionals Penetration tests have become an essential way to stay proactive in identifying and demonstrating the impact of security weaknesses before they are discovered and put to use by a threat actor.
  • 2. I am a dedicated and experienced cybersecurity analyst with 3 years of industry expertise, specializing in safeguarding digital systems and information from malicious cyber threats. I holds a bachelor's degree in Networking and Cybersecurity from ISBAT University and a diploma in Computer Science from St. Lawrence University Uganda, Kampala. proficient in Cyber threat intelligence , Vulnerability Management, Incident Response, Ethical Hacking, SOC and OSINT. Currently works as a cyber incident handler at Safetycomm ABOUT ME CYBER SECURITY ANALYST , SAFETYCOMM CHUOL BUOK YAK
  • 3. What Is Penetration Testing? A penetration test, or pen test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as end-user adherence to security policies.
  • 4. Why is Pen Testing Important?  Identify and Prioritize Security Risks  Intelligently Manage Vulnerabilities  Leverage a Proactive Security Approach  Meet Regulatory Requirements  Increase Confidence in Your Security Strategy
  • 5. Who Performs Penetration Tests? One of the biggest hurdles in creating a successful cybersecurity program is finding people with the right qualifications and experience. The cybersecurity skills gap is well-documented issue with a qualified supply of security professionals not keeping up with demand. This is particularly true with pen testing. Unfortunately, there is no shortage of threat actors and cybercrime groups. Consequently, organizations can’t delay deploying critical pen testing initiatives.
  • 6. Five Stages of Pen Testing
  • 7. How Often Should You Pen Test? Penetration testing should be performed on a regular basis to ensure more consistent IT and network security management. A pen-tester will reveal how newly discovered threats or emerging vulnerabilities may potentially be assailed by attackers. In addition to regularly scheduled analysis and assessments required by regulatory mandates, tests should also be run whenever:
  • 8. What Should You Do After a Pen Test? t’s important to plan time for a post-mortem to disseminate, discuss, and fully understand the findings. Additionally, relaying these results with actionable insights to decision makers within the organization will better emphasize the risk that these vulnerabilities pose, and the positive impact that remediation will have on the business. With review, evaluation, and leadership buy-in, pen test results can transform into action items for immediate improvements and takeaways that will help shape larger security strategies.
  • 9. What is Reconnaissance? Cyber Reconnaissance is the first step of any professional penetration test. In this phase the goal is to gather as much information about the target as possible. This includes technical information about it’s network topology and systems. But it also includes information on employees and the company itself that may be useful in the later stages of the penetration test. The more information you gather during the reconnaissance phase the more likely you are to succeed in the later stages of the penetration test. There are two types of cyber reconnaissance that you can perform active information gathering and passive information gathering.
  • 10. Difference Between Vulnerability Scans and Pen Tests? Vulnerability scanning is a security management strategy used to identify and report vulnerabilities in web applications, servers and firewalls. The main goal of vulnerability scanning is to help your organization’s IT department detect, classify and report weaknesses in your internal and external networks, computers, IP addresses and communication equipment. Penetration testing is a type of test conducted mostly by ethical hackers and experienced DevOps engineers to test and determine possible security gaps in an organization’s security architecture. Pen testing is also a form of ethical hacking deployed to fully understand security vulnerabilities and ways to remove them from an organization’s security environment.
  • 11. Different Types of Pen Testing?
  • 12. 5 pen testing rules of engagement Rules of Engagement for Pen testing Rules of Engagement (RoE) is a document that deals with the manner in which the penetration test is to be conducted. Some of the directives that should be clearly spelled out in RoE before you start the penetration test are as follows:  The type and scope of testing  Client contact details  Client IT team notifications  Sensitive data handling  Status meeting and reports
  • 13. White Box, Black Box, and Gray Box Penetration Testing
  • 14. Penetration testing methods continue……….. External testing External penetration tests target the assets of a company that are visible on the internet, e.g., the web application itself, the company website, and email and domain name servers (DNS). The goal is to gain access and extract valuable data. Internal testing In an internal test, a tester with access to an application behind its firewall simulates an attack by a malicious insider. This isn’t necessarily simulating a rogue employee. A common starting scenario can be an employee whose credentials were stolen due to a phishing attack.
  • 15. What Is Teaming? Red Teams A red team is on the offensive side. A red team is formed with the intention of identifying and assessing vulnerabilities, testing assumptions, viewing alternate options for attack, and revealing the limitations and security risks for that organization. Blue Teams The blue team is tasked with defending the organization. Blue teams are in charge of building up an organization’s protective measures, and taking action when needed. Purple Teams Recently, the concept of a purple team has become more popular in teaming exercises. This is the mindset of seeing and treating red and blue teams as symbiotic. It’s not red teams vs. blue teams, but rather one large team focusing on the one overarching goal: improving security. The key to becoming a purple team comes down to communication between individuals and their teams.
  • 16. Penetration Testing/Ethical Hacking Demo Let’s Hack things now Window Demo Linux Demo
  • 17. THE END Thank you Q & A chuol@safetycomm.org 0927318255

Editor's Notes

  1. 1.7.2013