SlideShare a Scribd company logo
1 of 19
Penetration Testing
What is Penetration Testing?
 AKA “Pentesting”
 An attack on a computer system with the
intention of finding security weaknesses.
 Performed by sysadmins or trusted agents.
How is this different from
hacking?
 “Black-hat hackers” violate computer
security for maliciousness or personal gain.
 “White-hat hackers” break security for non-
malicious purposes, usually when performing
authorized security tests.
 “Grey-hat hackers” rationalize that they are
acting moral when they are not. e.g.:
 Breaking into systems for fun, then emailing the
sysadmin to tell them about the security hole.
What are the goals of
Pentesting?
 Discover network or application vulnerabilities.
 Determine feasibility of particular set of attack
vectors.
 Assess the magnitude of business&
operational impacts of a successful attack.
 Test capability of network defenses.
Successful attacks against gov’t
computers, as reported to CERT*
*US-Computer Emergency Response Team
Attempted attacks
 Pentagon: 10,000,000 attempts each day
 Nat’l Nuclear Security Agency: 10,000,000/day
 From the same document...
 Michigan: 120,000 attacher per day
 U.K. 120,000 attacks per day
 Utah: 20,000,000 attacks each day
 Multiple definitions of attack & attempt?
 Do not blindly believe any numbers you read.
5 Phases of a network attack
1. Reconnaissance
2. Scanning
3. Penetration
4. Covering Tracks
5. Maintaining Access
Pentesting generally
focuses on Steps 1-3
Reconnaissance
Collecting data on the target passively.
Multiple interpretations:
1. sending no electrons to the target network, or
2. only sending electrons through means that are normally
authorized, such as reading the public website.
Common means:
 Google
 whois
Reconnaissance
 nslookup www.usna.edu
 IP address
 Server name
 http://www.whois.net, search for usna.edu
 Physical address
 Name of sysadmins (people with root access)
 Names/IP of DNS servers
Reconnaissance
 nslookup www.usna.edu
 IP address
 Server name
 http://www.whois.net, search for usna.edu
 Physical address
 Name of sysadmins (people with root access)
 Names/IP of DNS servers
Reconnaissance
 Google for URL prefixes (different servers)
site:usna.edu
site:usna.edu –www.usna.edu
site:usna.edu –www.usna.edu –libguides.usna.edu
...
 Run nslookup to find name/IP of each server
nslookup libguides.usna.edu
nslookup aisweb.usna.edu
Reconnaissance
URL IP Server Name
www.usna.edu 136.160.88.139 webster-new.dmz.usna.edu
libguides.usna.edu 174.132.16.38 libguides.com
aisweb.usna.edu 136.160.88.133 aeisenhower.dmz.usna.edu
library.usna.edu 136.160.88.140 library.usna.edu
lists.usna.edu 136.160.89.10 lists.usna.edu
…
Exercise: In 10 minutes, find out as much as you can about the USMA net
Scanning
 Collecting data on the target by sending packets at
it.
 Find existence of hosts at IP addresses.
 Find open ports on hosts.
 Detemine versions of services on hosts.
 Determine OS of host.
 Tends to be “noisy” (lots of packets)
 May be construed as an attack. Never do this
without written permission.
Scanning
 nmap is the #1 scanning tool
 “Network Mapper”
1. Host Discovery
nmap –sn 10.10.1.0/24 # Determine which IPs are online
Exercise: what messages does nmap send for this command?
arp, TCP SYN to ports 80, 443, 53
nmap –sL 10.10.1.0/24 # List IPs only
Exercise: what messages does nmap send for this command?
None
Scanning
1. Host Discovery (cont) – using extra ports in
scan:
nmap –sn –PS22-25 10.10.1.0/24 # TCP SYN Ping
Exercise: what mechanism does nmap use for this command?
arp, TCP to ports 22-25
Scanning
2. Enumerate Open Ports:
# List of ports & protocols by usage
less /usr/share/nmap/nmap-service
# Selects only the 5 top ports from this file
nmap –-top-ports 5 10.10.1.10
nmap 10.10.1.10 # TCP SYN Scan (default, same as –sS)
# SYN only, never sends ACK or reset.
# Stealthy, since not logged, but can consume target’s
resources.
Scanning
2. Enumerate Open Ports (cont):
nmap –sT 10.10.1.10 # TCP Connect Scan
# SYN/SYN-ACK/ACK-Reset
# Gets logged, less likely to crash target server.
nmap –sA 10.10.1.10 # TCP ACK Scan
# Send ACK to a host we are not talking to.
# Host may reply by sending a Reset to indicate there is no
connection.
Scanning
3. Version detection:
nmap –sV 10.10.1.10 # Enables service versioning
4. OS detection:
nmap –O 10.10.1.10 # Enables OS detection
nmap –O –-osscan-guess 10.10.1.10
nmap –O –-fuzzy 10.10.1.10
Pentest admin
 Signed agreement.
 “Get out of jail free card.”
 Never send any electrons to the target network without
one
 Scope – range if IPs, type of tests, etc.
 Damage control
 Indemnification
 In-house vs. Outsourced
 Trust?
 Can a sysadmin reasonably pentest their own network?

More Related Content

Similar to 5969401.ppt

modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
tehkotak4
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain Essay
Karen Oliver
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
leminhvuong
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
leminhvuong
 

Similar to 5969401.ppt (20)

Hacking
HackingHacking
Hacking
 
Backtrack Manual Part3
Backtrack Manual Part3Backtrack Manual Part3
Backtrack Manual Part3
 
How hackers attack networks
How hackers attack networksHow hackers attack networks
How hackers attack networks
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain Essay
 
NMAP1.ppt
NMAP1.pptNMAP1.ppt
NMAP1.ppt
 
Network And Application Layer Attacks
Network And Application Layer AttacksNetwork And Application Layer Attacks
Network And Application Layer Attacks
 
Hacking In Detail
Hacking In DetailHacking In Detail
Hacking In Detail
 
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
(SACON) Sudarshan Pisupati & Sahir Hidayatullah - active deception sacon
 
01204427-scanner.ppt
01204427-scanner.ppt01204427-scanner.ppt
01204427-scanner.ppt
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
 
Anton Chuvakin on Discovering That Your Linux Box is Hacked
Anton Chuvakin on Discovering That Your Linux Box is HackedAnton Chuvakin on Discovering That Your Linux Box is Hacked
Anton Chuvakin on Discovering That Your Linux Box is Hacked
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentation
 
Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
 
Penetration Testing Boot CAMP
Penetration Testing Boot CAMPPenetration Testing Boot CAMP
Penetration Testing Boot CAMP
 
BackTrack 4 R2 - SFISSA Presentation
BackTrack 4 R2 - SFISSA PresentationBackTrack 4 R2 - SFISSA Presentation
BackTrack 4 R2 - SFISSA Presentation
 
lecture5.pptx
lecture5.pptxlecture5.pptx
lecture5.pptx
 
Namp
Namp Namp
Namp
 

Recently uploaded

Obat Aborsi Surabaya 0851\7696\3835 Jual Obat Cytotec Di Surabaya
Obat Aborsi Surabaya 0851\7696\3835 Jual Obat Cytotec Di SurabayaObat Aborsi Surabaya 0851\7696\3835 Jual Obat Cytotec Di Surabaya
Obat Aborsi Surabaya 0851\7696\3835 Jual Obat Cytotec Di Surabaya
Obat Aborsi Jakarta Wa 085176963835 Apotek Jual Obat Cytotec Di Jakarta
 
Powerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metricsPowerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metrics
CaitlinCummins3
 
Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...
DUBAI (+971)581248768 BUY ABORTION PILLS IN ABU dhabi...Qatar
 
00971508021841 حبوب الإجهاض في دبي | أبوظبي | الشارقة | السطوة |❇ ❈ ((![© ر
00971508021841 حبوب الإجهاض في دبي | أبوظبي | الشارقة | السطوة |❇ ❈ ((![©  ر00971508021841 حبوب الإجهاض في دبي | أبوظبي | الشارقة | السطوة |❇ ❈ ((![©  ر
00971508021841 حبوب الإجهاض في دبي | أبوظبي | الشارقة | السطوة |❇ ❈ ((![© ر
nafizanafzal
 
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg PfizerJual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Pusat Herbal Resmi BPOM
 
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
ogawka
 
Presentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelledPresentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelled
CaitlinCummins3
 
obat aborsi jakarta wa 081336238223 jual obat aborsi cytotec asli di jakarta9...
obat aborsi jakarta wa 081336238223 jual obat aborsi cytotec asli di jakarta9...obat aborsi jakarta wa 081336238223 jual obat aborsi cytotec asli di jakarta9...
obat aborsi jakarta wa 081336238223 jual obat aborsi cytotec asli di jakarta9...
yulianti213969
 

Recently uploaded (20)

Most Visionary Leaders in Cloud Revolution, Shaping Tech’s Next Era - 2024 (2...
Most Visionary Leaders in Cloud Revolution, Shaping Tech’s Next Era - 2024 (2...Most Visionary Leaders in Cloud Revolution, Shaping Tech’s Next Era - 2024 (2...
Most Visionary Leaders in Cloud Revolution, Shaping Tech’s Next Era - 2024 (2...
 
Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...
Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...
Understanding Financial Accounting 3rd Canadian Edition by Christopher D. Bur...
 
Obat Aborsi Surabaya 0851\7696\3835 Jual Obat Cytotec Di Surabaya
Obat Aborsi Surabaya 0851\7696\3835 Jual Obat Cytotec Di SurabayaObat Aborsi Surabaya 0851\7696\3835 Jual Obat Cytotec Di Surabaya
Obat Aborsi Surabaya 0851\7696\3835 Jual Obat Cytotec Di Surabaya
 
Elevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesElevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO Services
 
Powerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metricsPowerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metrics
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...
 
00971508021841 حبوب الإجهاض في دبي | أبوظبي | الشارقة | السطوة |❇ ❈ ((![© ر
00971508021841 حبوب الإجهاض في دبي | أبوظبي | الشارقة | السطوة |❇ ❈ ((![©  ر00971508021841 حبوب الإجهاض في دبي | أبوظبي | الشارقة | السطوة |❇ ❈ ((![©  ر
00971508021841 حبوب الإجهاض في دبي | أبوظبي | الشارقة | السطوة |❇ ❈ ((![© ر
 
Sex service available my WhatsApp number 7374088497
Sex service available my WhatsApp number 7374088497Sex service available my WhatsApp number 7374088497
Sex service available my WhatsApp number 7374088497
 
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg PfizerJual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
 
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(SUT毕业证书)斯威本科技大学毕业证成绩单本科硕士学位证留信学历认证
 
Moradia Isolada com Logradouro; Detached house with patio in Penacova
Moradia Isolada com Logradouro; Detached house with patio in PenacovaMoradia Isolada com Logradouro; Detached house with patio in Penacova
Moradia Isolada com Logradouro; Detached house with patio in Penacova
 
Navigating Tax Season with Confidence Streamlines CPA Firms
Navigating Tax Season with Confidence Streamlines CPA FirmsNavigating Tax Season with Confidence Streamlines CPA Firms
Navigating Tax Season with Confidence Streamlines CPA Firms
 
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdfThe Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
 
Presentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelledPresentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelled
 
Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...
Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...
Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...
 
Toyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsToyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & Transformations
 
Should Law Firms Outsource their Bookkeeping
Should Law Firms Outsource their BookkeepingShould Law Firms Outsource their Bookkeeping
Should Law Firms Outsource their Bookkeeping
 
obat aborsi jakarta wa 081336238223 jual obat aborsi cytotec asli di jakarta9...
obat aborsi jakarta wa 081336238223 jual obat aborsi cytotec asli di jakarta9...obat aborsi jakarta wa 081336238223 jual obat aborsi cytotec asli di jakarta9...
obat aborsi jakarta wa 081336238223 jual obat aborsi cytotec asli di jakarta9...
 
SCI9-Q4-MOD8.1.pdfjttstwjwetw55k5wwtwrjw
SCI9-Q4-MOD8.1.pdfjttstwjwetw55k5wwtwrjwSCI9-Q4-MOD8.1.pdfjttstwjwetw55k5wwtwrjw
SCI9-Q4-MOD8.1.pdfjttstwjwetw55k5wwtwrjw
 

5969401.ppt

  • 2. What is Penetration Testing?  AKA “Pentesting”  An attack on a computer system with the intention of finding security weaknesses.  Performed by sysadmins or trusted agents.
  • 3. How is this different from hacking?  “Black-hat hackers” violate computer security for maliciousness or personal gain.  “White-hat hackers” break security for non- malicious purposes, usually when performing authorized security tests.  “Grey-hat hackers” rationalize that they are acting moral when they are not. e.g.:  Breaking into systems for fun, then emailing the sysadmin to tell them about the security hole.
  • 4. What are the goals of Pentesting?  Discover network or application vulnerabilities.  Determine feasibility of particular set of attack vectors.  Assess the magnitude of business& operational impacts of a successful attack.  Test capability of network defenses.
  • 5. Successful attacks against gov’t computers, as reported to CERT* *US-Computer Emergency Response Team
  • 6. Attempted attacks  Pentagon: 10,000,000 attempts each day  Nat’l Nuclear Security Agency: 10,000,000/day  From the same document...  Michigan: 120,000 attacher per day  U.K. 120,000 attacks per day  Utah: 20,000,000 attacks each day  Multiple definitions of attack & attempt?  Do not blindly believe any numbers you read.
  • 7. 5 Phases of a network attack 1. Reconnaissance 2. Scanning 3. Penetration 4. Covering Tracks 5. Maintaining Access Pentesting generally focuses on Steps 1-3
  • 8. Reconnaissance Collecting data on the target passively. Multiple interpretations: 1. sending no electrons to the target network, or 2. only sending electrons through means that are normally authorized, such as reading the public website. Common means:  Google  whois
  • 9. Reconnaissance  nslookup www.usna.edu  IP address  Server name  http://www.whois.net, search for usna.edu  Physical address  Name of sysadmins (people with root access)  Names/IP of DNS servers
  • 10. Reconnaissance  nslookup www.usna.edu  IP address  Server name  http://www.whois.net, search for usna.edu  Physical address  Name of sysadmins (people with root access)  Names/IP of DNS servers
  • 11. Reconnaissance  Google for URL prefixes (different servers) site:usna.edu site:usna.edu –www.usna.edu site:usna.edu –www.usna.edu –libguides.usna.edu ...  Run nslookup to find name/IP of each server nslookup libguides.usna.edu nslookup aisweb.usna.edu
  • 12. Reconnaissance URL IP Server Name www.usna.edu 136.160.88.139 webster-new.dmz.usna.edu libguides.usna.edu 174.132.16.38 libguides.com aisweb.usna.edu 136.160.88.133 aeisenhower.dmz.usna.edu library.usna.edu 136.160.88.140 library.usna.edu lists.usna.edu 136.160.89.10 lists.usna.edu … Exercise: In 10 minutes, find out as much as you can about the USMA net
  • 13. Scanning  Collecting data on the target by sending packets at it.  Find existence of hosts at IP addresses.  Find open ports on hosts.  Detemine versions of services on hosts.  Determine OS of host.  Tends to be “noisy” (lots of packets)  May be construed as an attack. Never do this without written permission.
  • 14. Scanning  nmap is the #1 scanning tool  “Network Mapper” 1. Host Discovery nmap –sn 10.10.1.0/24 # Determine which IPs are online Exercise: what messages does nmap send for this command? arp, TCP SYN to ports 80, 443, 53 nmap –sL 10.10.1.0/24 # List IPs only Exercise: what messages does nmap send for this command? None
  • 15. Scanning 1. Host Discovery (cont) – using extra ports in scan: nmap –sn –PS22-25 10.10.1.0/24 # TCP SYN Ping Exercise: what mechanism does nmap use for this command? arp, TCP to ports 22-25
  • 16. Scanning 2. Enumerate Open Ports: # List of ports & protocols by usage less /usr/share/nmap/nmap-service # Selects only the 5 top ports from this file nmap –-top-ports 5 10.10.1.10 nmap 10.10.1.10 # TCP SYN Scan (default, same as –sS) # SYN only, never sends ACK or reset. # Stealthy, since not logged, but can consume target’s resources.
  • 17. Scanning 2. Enumerate Open Ports (cont): nmap –sT 10.10.1.10 # TCP Connect Scan # SYN/SYN-ACK/ACK-Reset # Gets logged, less likely to crash target server. nmap –sA 10.10.1.10 # TCP ACK Scan # Send ACK to a host we are not talking to. # Host may reply by sending a Reset to indicate there is no connection.
  • 18. Scanning 3. Version detection: nmap –sV 10.10.1.10 # Enables service versioning 4. OS detection: nmap –O 10.10.1.10 # Enables OS detection nmap –O –-osscan-guess 10.10.1.10 nmap –O –-fuzzy 10.10.1.10
  • 19. Pentest admin  Signed agreement.  “Get out of jail free card.”  Never send any electrons to the target network without one  Scope – range if IPs, type of tests, etc.  Damage control  Indemnification  In-house vs. Outsourced  Trust?  Can a sysadmin reasonably pentest their own network?