Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Intro to Network Vapt

This presentation details introduction to Network VAPT which was delivered at Null Pune chapter

  • Login to see the comments

  • Be the first to like this

Intro to Network Vapt

  2. 2. Vulnerability Assessment • Process in which computers and networks are scanned in order to identify the presence of vulnerabilities associated with them. • They do not differentiate the flaws that can be exploited and those that cannot • It provides enterprises with a more comprehensive application evaluation • It alerts companies about the weaknesses in their systems
  3. 3. Penetration Testing • It is the practice of testing a computer, network or web application to exploit vulnerabilities. • It may be performed automatically or manually • Main objective is to determine security weaknesses • It is also used to test organization's security policy
  4. 4. Types of Penetration Testing • White Box Testing – Performing test from within the network • Black Box Testing – Performing test from an external network • Gray Box Testing – Performing test from an external network with the knowledge of internal network
  5. 5. Areas of Penetration Testing • Network Pentesting • Web Application Pentesting • Android/iOS Pentesting
  6. 6. Process of Network VAPT • Information Gathering & Scanning • Vulnerability Detection • Gaining Network Access • Privilege Escalation • Making a report