SlideShare a Scribd company logo
1 of 54
Download to read offline
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
Penetrating Networks
for CompTIA PenTest+
Michael Govinda
NetCom Learning
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
AGENDA
Penetration Testing and its benefits
Pentesting Standards and Frameworks
Processes & Tools Commonly Used for Pentesting
Guidelines for Planning Pentest Engagements
Guidelines for Scoping and Negotiating Pentest Engagements
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
PENETRATION TESTING
• Vulnerability assessment: The practice of evaluating a computer, network, or application
to identify potential weaknesses.
• Penetration testing (pen testing): The practice of evaluating a computer, network, or
application to identify potential vulnerabilities, and then exploiting them to gain
unauthorized access to key systems and data and culminating in the production of
evidence and a report.
Vulnerability Assessment
Penetration Testing
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
BENEFITS OF PENTESTING
• Testing cyber-defense capabilities.
• Revealing vulnerabilities.
• Finding and plugging security holes before they can be
exploited.
• Supporting risk management.
• Enhancing QA.
• Ensuring business continuity.
• Protecting clients, partners, and others.
• Protecting organizational reputation.
• Ensuring regulatory compliance.
• Maintaining trust.
• Identifying ROI.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
PENTESTING STANDARDS AND FRAMEWORKS
Standard or
Framework
Description
CHECK framework
• Developed by UK government.
• Intended to ensure that government agencies and public entities can contract with
government-approved pen testers.
OWASP testing
framework
• Developed by Open Web Application Security Project.
• Covers all sorts of software testing, including pen testing.
OSSTMM
• Open Source Security Testing Methodology Manual
• Pronounced “awstem.“
• Security testing and analysis for better operational security.
PTES
• Penetration Testing Execution Standard
• Developed by security service practitioners.
• Basic lexicon and guidelines for pen tests.
• General standard; the PTES Technical Guide provides specifics.
NIST SP 800-115
• Technical Guide to Information Security Testing and Assessment.
• Developed by NIST.
• Practical recommendations for designing, implementing, and maintaining pen test
processes and procedures.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
PROCESSES COMMONLY USED FOR PENTESTING (SLIDE 1 OF 2)
Reconnaissance Reconnaissance
Cyber Attack PenTest
Scanning
Gaining Access
Maintaining Access
Covering Tracks
Scanning
Gaining Access
Maintaining Access
Covering Tracks
Analysis
Reporting
Planning
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
PROCESSES COMMONLY USED FOR PENTESTING (SLIDE 2 OF 2)
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Covering Tracks
Analysis
Reporting
Planning
Passive and active information gathering.
Deeper than reconnaissance, begins vulnerability assessment.
Begin exploit based on information from earlier stages.
Ensure continuing access and find new targets.
Destroy evidence of exploits.
Identify vulnerabilities, causes, and recommendations for correction.
Official communication to stakeholders.
Can include project scope, logistics, and other preliminary activities.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
TOOLS COMMONLY USED IN PENTESTING (SLIDE 1 OF 4)
Tool Type Examples
Scanning tools
• Nmap
• Nikto
• OpenVAS
• SQLmap
• Nessus
Credential testing
tools
• Hashcat
• Medusa
• THC-Hydra
• CeWL
• John the Ripper
• Cain and Abel
• Mimikatz
• Patator
• Dirbuster
• W3AF
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
TOOLS COMMONLY USED IN PENTESTING (SLIDE 2 OF 4)
Tool Type Examples
Debugging tools
• OLLYDBG
• Immunity debugger
• GDB
• WinDBG
• IDA
Software assurance
tools
• Findbugs and findsecbugs
• Peach
• AFL
• SonarQube
• YASCA
OSINT tools
• Whois
• Nslookup
• FOCA
• theHarvester
• Shodan
• Maltego
• Recon-ng
• Censys
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
TOOLS COMMONLY USED IN PENTESTING (SLIDE 3 OF 4)
Tool Type Examples
Wireless tools
• Aircrack-ng
• Kismet
• WiFite
• WiFi-Pumpkin
Web proxy tools
• OWASP ZAP
• Burp Suite
Social engineering
tools
• SET
• BeEF
Remote access
tools
• SSH
• Ncat
• Netcat
• Proxychains
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
TOOLS COMMONLY USED IN PENTESTING (SLIDE 4 OF 4)
Tool Type Examples
Networking tools
• Wireshark
• Hping
Mobile tools
• Drozer
• APKX
• APK Studio
Miscellaneous
tools
• Searchsploit
• Powersploit
• Responder
• Impacket
• Empire
• Metasploit Framework
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
COMMUNICATION AND THE PENTESTING PROCESS
• Communication path, or chain of command.
• Communication with client counterparts.
• Communication within the pen testing team.
• What information to communicate and when.
• Regular process briefings.
• Within the team.
• With the client.
• Clear identification of the reasons behind
communication actions.
• Possible adjustments to the engagement.
• Disclosure of findings.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
CONTRACT TYPES
NDA
Non-disclosure agreement A business document that stipulates the parties will not share confidential information,
knowledge, or materials with unauthorized third parties.
SOW
Statement of work A business document that defines the highest level of expectations for a contractual
arrangement.
MSA
Master service agreement An agreement that establishes precedence and guidelines for any business documents that are
executed between two parties.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
AUTHORIZATIONS
• Written authorization to conduct pen testing activities.
• Document is often a SOW addendum.
• Control liability of pen testers.
• Third-party service providers.
• Contents:
• Proper signing authority (statement and signature).
• Identification of individuals who can perform the pen
test.
• What networks, hosts, and applications can be tested.
• Time limits.
• Legal review.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
LEGAL RESTRICTIONS
• Export restrictions.
• Local and national governmental restrictions.
• Corporate or organizational policies.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
TARGET AUDIENCE TYPES
• Types of information systems being tested will affect
the target audience composition.
• Hosts
• Networks
• Web servers
• Applications
• Databases
• Combination of upper management, IT management,
IT personnel, and others.
• Technical and non-technical people.
• Is the testing team internal or external?
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
BUDGET
• Services provided must be worth the money that is
spent.
• Budget has a significant effect on the pen test’s scope.
• Service provider/pen tester:
• Minimize expenses of testing.
• Maximize revenue/compensation.
• Provide acceptable QoS to client.
• Service consumer/client:
• Minimize costs.
• Maximize volume/depth of testing.
• Maximize QoS.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
TECHNICAL CONSTRAINTS
• What is to be tested?
• What is not to be tested?
• What cannot be tested?
• Budgetary considerations.
• Examples:
• Fragile legacy server
• Third-party hosted website
• Offshore data center
Satellite Office
Headquarters
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
RULES OF ENGAGEMENT
• Rules of engagement: In pen testing, a document or section of a document that outlines
how the pen testing is to be conducted.
Component Description
Timeline
• List of tasks that make up the engagement and who performs them.
• Adjustable progress indicator.
• Often in Gantt chart format.
Test team location
• Where test team is in relation to client properties.
• Multiple locations, countries, and technologies should be considered.
Temporal restrictions Days and times individual tests can be performed.
Transparency
• What client personnel are in the know?
• What resources will be provided to the testers?
Test boundaries
• What gets tested?
• Acceptable social engineering test.
• Acceptable physical security tests.
• Restrictions on invasive attacks.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
IMPACT ANALYSIS
• What effect will the pen test have on normal business
operations?
• Potential impact:
• Target type
• Criticality
• Testing approach
• Unforeseen issues.
• Risk management is a team effort.
• Triggers, escalation procedures, and timelines.
• Prioritization of pen test results.
Low Impact High Impact
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
REMEDIATION TIMELINE
• Implementing solutions to eliminate vulnerabilities.
• What should be handled first?
• High-risk
• Low-cost
• Other
• Where does risk acceptance come into play?
Test Date 1 Week 2 Weeks 3 Weeks 1 Month 6 Months 1 Year
High Risk Low Risk
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
DISCLAIMERS
• Point-in-time assessment
• Comprehensiveness
• Others?
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
GUIDELINES FOR PLANNING PENTEST ENGAGEMENTS
• Be sure that you understand the target audience.
• Identify the resources and requirements that will govern and facilitate the
pentest engagement.
• Determine any budget restrictions that might affect the engagement.
• Document any technical constraints that will affect the engagement.
• Clearly define the rules of engagement.
• Develop impact analysis and remediation timelines.
• Identify any disclaimers that will affect the engagement.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
SCOPING
Scope: In a pen test engagement, the boundaries that describe the extent of the
engagement, including what specific systems are to be tested, to what degree the
systems should be tested, and how the pen testers should spend their time.
• Crucial step in contract negotiations.
• Scope forms the basis of the SOW.
• Defines appropriate targets and limitations.
• What happens when something outside the scope is discovered?
• Pen test team response and escalation when necessary.
In Scope
Out of Scope
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
END GOALS AND DELIVERABLES
• Identify why the testing is needed.
• Compliance or legal requirement?
• Need and desire for improving organizational security?
• End goals might be adjusted during the scoping process.
• Main deliverable is an actionable report.
• Describes tests performed, vulnerabilities identified, analysis, and mitigation
suggestions.
• Translate technical findings to potential organizational risk.
• Threat ranking: probability x impact
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
TYPES OF ASSESSMENTS
• Goal- or objective-based:
• What needs protection?
• Compliance-based:
• Industry or governmental mandate.
• Red team
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
COMPLIANCE-BASED ASSESSMENTS
• Normally assessed using audits of administrative, technical, and physical
controls.
• Takes precedence over organizational policy.
• What to look for: Clear objectives based on regulations.
• How to look: Possible rules for completing the assessment.
• Focus:
• Password policies
• Data isolation
• Key management
• Limitations:
• Network access
• Storage access
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
TYPES OF STRATEGIES
Pentest Strategy Description
Black box test
• No information is provided to the pen tester.
• Simulates an outsider attack with basic reconnaissance.
• AKA zero knowledge test, because the tester must gather information about the target and verify the scope.
• Few have knowledge of the test.
Gray box test
• Some information is provided to the pen tester.
• Simulates an internal attack with limited knowledge.
• AKA partial knowledge test, because the pen tester uses reconnaissance to gain more information about
the target.
White box test
• Comprehensive information is provided to the pen tester.
• Simulates an insider attack with full knowledge.
• Opposite of a black box test.
• Reconnaissance phase might be unnecessary.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
TYPES OF THREAT ACTORS (SLIDE 1 OF 2)
• Threat actor: An entity partially or wholly responsible for an incident that affects or
can affect an organization’s security.
• Script kiddies: Novice or inexperienced hackers with limited technical knowledge
who rely on automated tools to hack into targets.
• Hacktivists: Hackers who gain unauthorized access to and cause disruption in a
computer system in an attempt to achieve political or social change.
• APT: A threat that uses multiple attack vectors to gain unauthorized access to
sensitive resources.
• Insider threats: Present and past employees, contractors, partners, and any entities
that have access to proprietary or confidential information and whose actions result
in compromised security.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
TYPES OF THREAT ACTORS (SLIDE 2 OF 2)
Tier Description
I
Those who invest a relatively small amount of money to use off-the-shelf tools to exploit known
vulnerabilities.
II
Those who invest a relatively small amount of money to develop their own tools to exploit
known vulnerabilities.
III
Those who invest millions of dollars to discover unknown vulnerabilities that enable them to
steal personal and corporate data that they can sell to other criminal elements.
IV
Organized, highly technical, proficient, well-funded professionals who work in teams to discover
new vulnerabilities and develop new exploits.
V
Nation states that invest billions to create vulnerabilities by influencing commercial products
and services.
VI
Nation states that invest billions to carry out a combination of cyber, military, and intelligence
operations to achieve a political, military, or economic goal.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
RISK RESPONSES
Risk Response Description
Avoidance
• Action taken to ensure that risk has been completely eliminated or reduced to zero.
• Terminating the process, activity, or application that is the source of the risk.
Transference
• Responsibility for risk management moved to another entity.
• Insurance company, cloud service provider, or other outsourcing provider.
Mitigation
• Controls and countermeasures implemented to reduce the likelihood and impact of
risk.
• Goal is to reduce potential effects to within acceptable risk thresholds.
Acceptance
• Risks are identified and analyzed and deemed to be within established limits.
• No additional action required.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
TOLERANCE TO IMPACT
• Pen testing will affect performance.
• Networks
• Hosts
• Applications
• Balance the need for testing with continuity of business operations.
• Determine which business operations and assets can be tested, and which should
be left alone.
32
In Scope Out of Scope
• Network storage
• Intranet
• Product databases
• Employee email accounts
• Time-tracking app
• E-commerce servers
• Customer-facing websites
• Email servers
• R&D network
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
SCHEDULING
• Timeline to define when events should occur.
• Specify test days and hours, as well as duration.
• DDoS to take place for up to one week, but only between 12:00 and 3:00 A.M.
• Start date: 7/23/2018
• End date: 7/30/2018
• Notifications to client stakeholders.
33
List of events Date and time
restrictions
Client
stakeholder
notifications
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
SCOPE CREEP
Scope creep: The condition that occurs when a client requests additional services after a
SOW has been signed and the project scope has been documented and agreed upon.
• Any type of project, not just pen testing.
• Takes resources and effort away from the items documented in the SOW.
• Less time unless you add more testers.
• Less diligent testing is possible.
• Testing organization can be forced to take a financial loss.
• Legal protection might be affected.
• Try to get another agreement to cover the additional work.
• Extra time.
• Extra money.
• Possible reduction in costs for client.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
GUIDELINES FOR SCOPING AND NEGOTIATING PENTEST
ENGAGEMENTS (SLIDE 1 OF 2)
• Determine the types of assessments you want to conduct.
• Clearly define the end goals of the engagement.
• Determine what testing strategy you need to use.
• Determine what types of threat actors you want to emulate.
• Capabilities and intent.
• Consider recommending threat modeling.
• Clear definition of objectives and expectations.
• Identify all targets and the risk tolerance associated with each.
• Conventional and specialized systems.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
GUIDELINES FOR SCOPING AND NEGOTIATING PENTEST
ENGAGEMENTS (SLIDE 2 OF 2)
• Account for existing controls and scenarios.
• Org policies and security exceptions.
• Whitelists and/or blacklists.
• Certificate and public key pinning.
• NAC devices and controls.
• Premerger or supply chain security testing.
• Create, maintain, and adhere to a comprehensive schedule.
• Avoid scope creep.
• Use disclaimer language to protect the test team.
• Use a scoping checklist.
• Identify each deliverable.
• Documents
• Meetings
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
TEAM PREPARATION (SLIDE 1 OF 2)
• Prepare the client.
• Gather technical points of contact.
• Inform key IT personnel.
• Verify the existence of current, verified backups of all critical systems.
• Verify client personnel are aware of possible risks and will work with the pen test team to
restore crashed or compromised systems.
• Warn against stopgap security measures implemented before testing begins.
37
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
TEAM PREPARATION (SLIDE 2 OF 2)
• Prepare the pentest team.
• Clarify scope and limitations.
• Verify testers know the objectives and deliverables.
• Verify testers have contact information and escalation procedures available.
• Have testers document all actions and outcomes in a central repository.
• Verify testers have documented authorization for pen test activities.
• Verify the project lead is managing the engagement schedule properly.
• Verify testers know to report accidents or errors immediately.
38
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
DATA COLLECTION AND DOCUMENTATION (SLIDE 1 OF 2)
• Follow a plan that maps pen tests to identified objectives.
• Verify all tests contribute to the client organization’s goals.
• Document everything, including mistakes and accidents.
• Keep documentation clear, concise, and objective.
• Use a central repository to store test data.
• Collect as much data as you can.
• Upload test results and data in their original format.
39
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
DATA COLLECTION AND DOCUMENTATION (SLIDE 2 OF 2)
• Record the steps taken to collect data.
• Verify enough data is collected to analyze.
• Keep original copies of all data.
• If prior or current hacking activity is discovered, note that in your findings.
• Ongoing activity should be flagged for escalation.
• If problems outside the engagement scope are discovered, document them and
forward to your supervisor.
• Only pursue them if explicitly told to do so.
40
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
CONTINGENCY PLANNING
• Pentest team uses hacking tools.
• Problems will arise during testing.
• Targeted systems or collateral damage.
• Testing adds a stress load to systems, which can crash if they are already unstable.
• Current, verified backups a must.
• Established contingency plan helps restore services relatively quickly.
• Reboot systems.
• Reload VM snapshots.
41
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
ESCALATION PATH FOR COMMUNICATIONS
• Alleviates the need for pen testers to make risky or possibly damaging decisions
without input from other stakeholders.
• A clear chain of command provides the starting point for escalating issues.
• Team members report issues only to those who are above them in the chain of
command.
• Encourage the client organization to appoint a point person who is the counterpart
of the pen test project supervisor.
• Always have a supervisor on duty.
• Train team members:
• Check in with the lead, especially at the start and end of a specific task.
• Notify the lead when anomalies are discovered.
• Notify the lead if out-of-scope issues arise.
• Refrain from action on out-of-scope issues until authorized to act.
42
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
GO LIVE
• The actual “green light” to start the testing.
• Date and time for Go Live is usually kept secret.
• In some cases, information gathering might start before Go Live date.
• Passive reconnaissance
• OSINT
43
Point in time
for the test to
begin.
Go Live date and
time might be
secret.
Information
gathering might
start first.
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
RECORDED WEBINAR VIDEO
To watch the recorded webinar video for live demos, please access the link:
http://tiny.cc/3ogdpz
| |
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
ABOUT NETCOM LEARNING
NetCom Learningis an award-winning
global leader in managedlearning
services, training and talentdevelopment.
Founded : 1998
Headquarters : NewYorkCity
Delivery Capability : Worldwide
CEO : RussellSarder
100K+
Professionals
trained
| |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
12K+
Corporate
clients
3500
IT,Business&
Soft Skillscourses
96%
Of customers
recommend usto others
8.6/9
Instructor
evaluations
20+
Leadingvendors
recognitions
Microsoft’s
Worldwidetraining
partner of the year
80%
Trainedofthe
Fortune100
Top20
ITTraining
Company
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
RECOMMENDED COURSES
NetCom Learning offers a comprehensive portfolio for Security Courses
COMPTIA
» COMPTIA SECURITY+ CERTIFICATION PREP (EXAM SY0-501) –Class Scheduled onJune 08
»COMPTIAPENTEST+CERTIFICATIONPREP(EXAMPT0-001)–Class Scheduled onJune 08
» COMPTIA CYBERSECURITY ANALYST (CYSA+) CERTIFICATION PREP (EXAM CS0-001) –Class Scheduled onJune 29
»COMPTIA ADVANCED SECURITY PRACTITIONER (CASP+) CERTIFICATION PREP (EXAM CAS-003) – Class Scheduled onJuly 20
| |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
CISSP
» CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP) –Class Scheduled onJune 22
MILE2
» MILE2 CERTIFIED PENETRATION TESTING ENGINEER (C)PTE) - SPECIALIZED –Class Scheduled onJune 15
»MILE2CERTIFIEDINCIDENTHANDLINGENGINEER(C)IHE)-SPECIALIZED–Class Scheduled onJune 15
» MILE2 CERTIFIED INFORMATION SYSTEMS SECURITY OFFICER (C)ISSO) - FOUNDATIONAL –Class Scheduled onJune 22
»MILE2 CERTIFIED VULNERABILITY ASSESSOR (C)VA) - FUNDAMENTAL – Class Scheduled onJuly 13
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
RECOMMENDED MARKETING ASSETS
| |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
You can also access the below Marketing Assets
» Free On-Demand Training- Red Team VS Blue Team LIVE Cybersecurity Battle | CySA+ & PenTest+ Skills
» Free On-Demand Training- Getting Started With CompTIA PenTest+
» Blog - 5 Reasons Why Penetration Testing Is Imperative for Your Organization
» Blog - CySA+ v/s PenTest+: Which CompTIA Security Skill Will You Need to Learn First
» Blog - CompTIA Security+ Certification For Enterprise Network Security: Advantages
» Blog - Understanding CISSP Certification Domains
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
UPCOMING WEBINARS
• The Future of IT Service Management (ITSM) with ITIL® 4
• Analytics in the Cloud with Tableau on AWS
• Gain the Cloud Advantage: Level-up Your (or Your Teams') Skills with Microsoft Azure
Role-Based Certifications
• Secrets to Become a Network Engineer in a Programmable Age
• Adobe Illustrator Fundamentals - Walkthrough of the Latest Features and Best Practices
• Present Your Data Effectively With Microsoft Excel and PowerPoint
• Prevent Unauthorized Access to Your Systems and Applications with Security Automation
& More
| |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
PROMOTIONS
Save up to 60% on our Virtual Instructor-Led Training courses!
Get the most out of our Virtual Instructor-Led Training (vILT) deals and upskill at special discounts on individual
courses. With vILT, make your learning flexible, convenient, and immersive. View Offer
| |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
PROMOTIONS
Buy More to Save More!
Now fulfill all your training needs without disturbing your business funds. Choose from the bundle of our Learning
Saving Pass (LSP) pre-pay plans and get up to 100% value back on your investment. Unlock Now
| |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
PROMOTIONS
Worry-Free Training with Price Match Guarantee
Our Price Match Guarantee ensures that we'll match the offers of any other authorized training provider if you
succeed at finding anyone offering the same publicly scheduled class within 30 days of our schedule at a lower
regular price. Learn More
| |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
FOLLOWUS ON
LinkedIn Twitter YouTube
| |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
Instagram
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
BUILDING AN INNOVATIVE LEARNING ORG.
A BOOK FROM RUSSELL SARDER,
CEO AT NETCOM LEARNING
A framework to build a smarter
workforce, adapt to change and
drive growth.
DOWNLOADe-book
| |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
Thankyou
© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||| |© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||

More Related Content

Similar to Penetrating Networks for CompTIA Pentest+

Defense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdfDefense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdfTuan Yang
 
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdfWhat is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdfTuan Yang
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramEnergySec
 
PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...
PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...
PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...Karan Menon
 
Best Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdfBest Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdfTuan Yang
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDEryk Budi Pratama
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
Cyber review-guide
Cyber review-guideCyber review-guide
Cyber review-guideaqazad
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comPawan Sharma
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingNetsparker
 
Cloud and challenges isacakenya
Cloud and challenges   isacakenyaCloud and challenges   isacakenya
Cloud and challenges isacakenyaTonny Omwansa
 
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital ExperienceGetting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital ExperienceThousandEyes
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxikirkton
 
Operational testing with employee performance tracking for compliance
Operational testing with employee performance tracking for compliance Operational testing with employee performance tracking for compliance
Operational testing with employee performance tracking for compliance CloudMoyo
 
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...MicheleNati
 
Digital Technologies for Manufacturing Innovation: Industry 4.0
Digital Technologies for Manufacturing Innovation: Industry 4.0Digital Technologies for Manufacturing Innovation: Industry 4.0
Digital Technologies for Manufacturing Innovation: Industry 4.0Digital Catapult
 

Similar to Penetrating Networks for CompTIA Pentest+ (20)

Defense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdfDefense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdf
 
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdfWhat is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 
PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...
PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...
PLM 2018 - Is Openness really free? A critical analysis of switching costs fo...
 
Best Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdfBest Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdf
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Rakesh Resume
Rakesh ResumeRakesh Resume
Rakesh Resume
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Cyber review-guide
Cyber review-guideCyber review-guide
Cyber review-guide
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Cloud and challenges isacakenya
Cloud and challenges   isacakenyaCloud and challenges   isacakenya
Cloud and challenges isacakenya
 
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital ExperienceGetting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
 
IT support
IT supportIT support
IT support
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Operational testing with employee performance tracking for compliance
Operational testing with employee performance tracking for compliance Operational testing with employee performance tracking for compliance
Operational testing with employee performance tracking for compliance
 
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
Michele Nati - Digital Catapult viewpoint on Industrie 4.0 - Digital Technolo...
 
Digital Technologies for Manufacturing Innovation: Industry 4.0
Digital Technologies for Manufacturing Innovation: Industry 4.0Digital Technologies for Manufacturing Innovation: Industry 4.0
Digital Technologies for Manufacturing Innovation: Industry 4.0
 

More from NetCom Learning

CompTIA Course Catalog - NetCom Learning
CompTIA Course Catalog - NetCom LearningCompTIA Course Catalog - NetCom Learning
CompTIA Course Catalog - NetCom LearningNetCom Learning
 
What is comp tia a blog 21 oct
What is comp tia a blog   21 octWhat is comp tia a blog   21 oct
What is comp tia a blog 21 octNetCom Learning
 
Revit software - the best tool for an architect
Revit software - the best tool for an architectRevit software - the best tool for an architect
Revit software - the best tool for an architectNetCom Learning
 
Introduction to adobe experience manager
Introduction to adobe experience managerIntroduction to adobe experience manager
Introduction to adobe experience managerNetCom Learning
 
EC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogEC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogNetCom Learning
 
The Highest-Paying AutoCAD Careers & Job Roles - NetCom Learning
The Highest-Paying AutoCAD Careers & Job Roles - NetCom LearningThe Highest-Paying AutoCAD Careers & Job Roles - NetCom Learning
The Highest-Paying AutoCAD Careers & Job Roles - NetCom LearningNetCom Learning
 
LEADING HEALTHCARE PROVIDER MODERNIZES ITS ENTIRE CUSTOMER SERVICE DEPARTMENT...
LEADING HEALTHCARE PROVIDER MODERNIZES ITS ENTIRE CUSTOMER SERVICE DEPARTMENT...LEADING HEALTHCARE PROVIDER MODERNIZES ITS ENTIRE CUSTOMER SERVICE DEPARTMENT...
LEADING HEALTHCARE PROVIDER MODERNIZES ITS ENTIRE CUSTOMER SERVICE DEPARTMENT...NetCom Learning
 
AWS the ultimate cloud solution guide
AWS the ultimate cloud solution guideAWS the ultimate cloud solution guide
AWS the ultimate cloud solution guideNetCom Learning
 
Microsoft role-based-certification-roadmap
Microsoft role-based-certification-roadmapMicrosoft role-based-certification-roadmap
Microsoft role-based-certification-roadmapNetCom Learning
 
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
 Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape... Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...NetCom Learning
 
Getting started with new microsoft azure apps & infrastructure certification ...
Getting started with new microsoft azure apps & infrastructure certification ...Getting started with new microsoft azure apps & infrastructure certification ...
Getting started with new microsoft azure apps & infrastructure certification ...NetCom Learning
 
DevOps: Using Metrics and QA Practices That Matters
DevOps: Using Metrics and QA Practices That MattersDevOps: Using Metrics and QA Practices That Matters
DevOps: Using Metrics and QA Practices That MattersNetCom Learning
 

More from NetCom Learning (12)

CompTIA Course Catalog - NetCom Learning
CompTIA Course Catalog - NetCom LearningCompTIA Course Catalog - NetCom Learning
CompTIA Course Catalog - NetCom Learning
 
What is comp tia a blog 21 oct
What is comp tia a blog   21 octWhat is comp tia a blog   21 oct
What is comp tia a blog 21 oct
 
Revit software - the best tool for an architect
Revit software - the best tool for an architectRevit software - the best tool for an architect
Revit software - the best tool for an architect
 
Introduction to adobe experience manager
Introduction to adobe experience managerIntroduction to adobe experience manager
Introduction to adobe experience manager
 
EC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogEC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course Catalog
 
The Highest-Paying AutoCAD Careers & Job Roles - NetCom Learning
The Highest-Paying AutoCAD Careers & Job Roles - NetCom LearningThe Highest-Paying AutoCAD Careers & Job Roles - NetCom Learning
The Highest-Paying AutoCAD Careers & Job Roles - NetCom Learning
 
LEADING HEALTHCARE PROVIDER MODERNIZES ITS ENTIRE CUSTOMER SERVICE DEPARTMENT...
LEADING HEALTHCARE PROVIDER MODERNIZES ITS ENTIRE CUSTOMER SERVICE DEPARTMENT...LEADING HEALTHCARE PROVIDER MODERNIZES ITS ENTIRE CUSTOMER SERVICE DEPARTMENT...
LEADING HEALTHCARE PROVIDER MODERNIZES ITS ENTIRE CUSTOMER SERVICE DEPARTMENT...
 
AWS the ultimate cloud solution guide
AWS the ultimate cloud solution guideAWS the ultimate cloud solution guide
AWS the ultimate cloud solution guide
 
Microsoft role-based-certification-roadmap
Microsoft role-based-certification-roadmapMicrosoft role-based-certification-roadmap
Microsoft role-based-certification-roadmap
 
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
 Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape... Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
 
Getting started with new microsoft azure apps & infrastructure certification ...
Getting started with new microsoft azure apps & infrastructure certification ...Getting started with new microsoft azure apps & infrastructure certification ...
Getting started with new microsoft azure apps & infrastructure certification ...
 
DevOps: Using Metrics and QA Practices That Matters
DevOps: Using Metrics and QA Practices That MattersDevOps: Using Metrics and QA Practices That Matters
DevOps: Using Metrics and QA Practices That Matters
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 

Penetrating Networks for CompTIA Pentest+

  • 1. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| Penetrating Networks for CompTIA PenTest+ Michael Govinda NetCom Learning
  • 2. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| AGENDA Penetration Testing and its benefits Pentesting Standards and Frameworks Processes & Tools Commonly Used for Pentesting Guidelines for Planning Pentest Engagements Guidelines for Scoping and Negotiating Pentest Engagements
  • 3. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| PENETRATION TESTING • Vulnerability assessment: The practice of evaluating a computer, network, or application to identify potential weaknesses. • Penetration testing (pen testing): The practice of evaluating a computer, network, or application to identify potential vulnerabilities, and then exploiting them to gain unauthorized access to key systems and data and culminating in the production of evidence and a report. Vulnerability Assessment Penetration Testing
  • 4. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| BENEFITS OF PENTESTING • Testing cyber-defense capabilities. • Revealing vulnerabilities. • Finding and plugging security holes before they can be exploited. • Supporting risk management. • Enhancing QA. • Ensuring business continuity. • Protecting clients, partners, and others. • Protecting organizational reputation. • Ensuring regulatory compliance. • Maintaining trust. • Identifying ROI.
  • 5. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| PENTESTING STANDARDS AND FRAMEWORKS Standard or Framework Description CHECK framework • Developed by UK government. • Intended to ensure that government agencies and public entities can contract with government-approved pen testers. OWASP testing framework • Developed by Open Web Application Security Project. • Covers all sorts of software testing, including pen testing. OSSTMM • Open Source Security Testing Methodology Manual • Pronounced “awstem.“ • Security testing and analysis for better operational security. PTES • Penetration Testing Execution Standard • Developed by security service practitioners. • Basic lexicon and guidelines for pen tests. • General standard; the PTES Technical Guide provides specifics. NIST SP 800-115 • Technical Guide to Information Security Testing and Assessment. • Developed by NIST. • Practical recommendations for designing, implementing, and maintaining pen test processes and procedures.
  • 6. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| PROCESSES COMMONLY USED FOR PENTESTING (SLIDE 1 OF 2) Reconnaissance Reconnaissance Cyber Attack PenTest Scanning Gaining Access Maintaining Access Covering Tracks Scanning Gaining Access Maintaining Access Covering Tracks Analysis Reporting Planning
  • 7. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| PROCESSES COMMONLY USED FOR PENTESTING (SLIDE 2 OF 2) Reconnaissance Scanning Gaining Access Maintaining Access Covering Tracks Analysis Reporting Planning Passive and active information gathering. Deeper than reconnaissance, begins vulnerability assessment. Begin exploit based on information from earlier stages. Ensure continuing access and find new targets. Destroy evidence of exploits. Identify vulnerabilities, causes, and recommendations for correction. Official communication to stakeholders. Can include project scope, logistics, and other preliminary activities.
  • 8. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| TOOLS COMMONLY USED IN PENTESTING (SLIDE 1 OF 4) Tool Type Examples Scanning tools • Nmap • Nikto • OpenVAS • SQLmap • Nessus Credential testing tools • Hashcat • Medusa • THC-Hydra • CeWL • John the Ripper • Cain and Abel • Mimikatz • Patator • Dirbuster • W3AF
  • 9. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| TOOLS COMMONLY USED IN PENTESTING (SLIDE 2 OF 4) Tool Type Examples Debugging tools • OLLYDBG • Immunity debugger • GDB • WinDBG • IDA Software assurance tools • Findbugs and findsecbugs • Peach • AFL • SonarQube • YASCA OSINT tools • Whois • Nslookup • FOCA • theHarvester • Shodan • Maltego • Recon-ng • Censys
  • 10. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| TOOLS COMMONLY USED IN PENTESTING (SLIDE 3 OF 4) Tool Type Examples Wireless tools • Aircrack-ng • Kismet • WiFite • WiFi-Pumpkin Web proxy tools • OWASP ZAP • Burp Suite Social engineering tools • SET • BeEF Remote access tools • SSH • Ncat • Netcat • Proxychains
  • 11. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| TOOLS COMMONLY USED IN PENTESTING (SLIDE 4 OF 4) Tool Type Examples Networking tools • Wireshark • Hping Mobile tools • Drozer • APKX • APK Studio Miscellaneous tools • Searchsploit • Powersploit • Responder • Impacket • Empire • Metasploit Framework
  • 12. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| COMMUNICATION AND THE PENTESTING PROCESS • Communication path, or chain of command. • Communication with client counterparts. • Communication within the pen testing team. • What information to communicate and when. • Regular process briefings. • Within the team. • With the client. • Clear identification of the reasons behind communication actions. • Possible adjustments to the engagement. • Disclosure of findings.
  • 13. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| CONTRACT TYPES NDA Non-disclosure agreement A business document that stipulates the parties will not share confidential information, knowledge, or materials with unauthorized third parties. SOW Statement of work A business document that defines the highest level of expectations for a contractual arrangement. MSA Master service agreement An agreement that establishes precedence and guidelines for any business documents that are executed between two parties.
  • 14. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| AUTHORIZATIONS • Written authorization to conduct pen testing activities. • Document is often a SOW addendum. • Control liability of pen testers. • Third-party service providers. • Contents: • Proper signing authority (statement and signature). • Identification of individuals who can perform the pen test. • What networks, hosts, and applications can be tested. • Time limits. • Legal review.
  • 15. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| LEGAL RESTRICTIONS • Export restrictions. • Local and national governmental restrictions. • Corporate or organizational policies.
  • 16. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| TARGET AUDIENCE TYPES • Types of information systems being tested will affect the target audience composition. • Hosts • Networks • Web servers • Applications • Databases • Combination of upper management, IT management, IT personnel, and others. • Technical and non-technical people. • Is the testing team internal or external?
  • 17. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| BUDGET • Services provided must be worth the money that is spent. • Budget has a significant effect on the pen test’s scope. • Service provider/pen tester: • Minimize expenses of testing. • Maximize revenue/compensation. • Provide acceptable QoS to client. • Service consumer/client: • Minimize costs. • Maximize volume/depth of testing. • Maximize QoS.
  • 18. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| TECHNICAL CONSTRAINTS • What is to be tested? • What is not to be tested? • What cannot be tested? • Budgetary considerations. • Examples: • Fragile legacy server • Third-party hosted website • Offshore data center Satellite Office Headquarters
  • 19. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| RULES OF ENGAGEMENT • Rules of engagement: In pen testing, a document or section of a document that outlines how the pen testing is to be conducted. Component Description Timeline • List of tasks that make up the engagement and who performs them. • Adjustable progress indicator. • Often in Gantt chart format. Test team location • Where test team is in relation to client properties. • Multiple locations, countries, and technologies should be considered. Temporal restrictions Days and times individual tests can be performed. Transparency • What client personnel are in the know? • What resources will be provided to the testers? Test boundaries • What gets tested? • Acceptable social engineering test. • Acceptable physical security tests. • Restrictions on invasive attacks.
  • 20. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| IMPACT ANALYSIS • What effect will the pen test have on normal business operations? • Potential impact: • Target type • Criticality • Testing approach • Unforeseen issues. • Risk management is a team effort. • Triggers, escalation procedures, and timelines. • Prioritization of pen test results. Low Impact High Impact
  • 21. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| REMEDIATION TIMELINE • Implementing solutions to eliminate vulnerabilities. • What should be handled first? • High-risk • Low-cost • Other • Where does risk acceptance come into play? Test Date 1 Week 2 Weeks 3 Weeks 1 Month 6 Months 1 Year High Risk Low Risk
  • 22. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| DISCLAIMERS • Point-in-time assessment • Comprehensiveness • Others?
  • 23. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| GUIDELINES FOR PLANNING PENTEST ENGAGEMENTS • Be sure that you understand the target audience. • Identify the resources and requirements that will govern and facilitate the pentest engagement. • Determine any budget restrictions that might affect the engagement. • Document any technical constraints that will affect the engagement. • Clearly define the rules of engagement. • Develop impact analysis and remediation timelines. • Identify any disclaimers that will affect the engagement.
  • 24. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| SCOPING Scope: In a pen test engagement, the boundaries that describe the extent of the engagement, including what specific systems are to be tested, to what degree the systems should be tested, and how the pen testers should spend their time. • Crucial step in contract negotiations. • Scope forms the basis of the SOW. • Defines appropriate targets and limitations. • What happens when something outside the scope is discovered? • Pen test team response and escalation when necessary. In Scope Out of Scope
  • 25. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| END GOALS AND DELIVERABLES • Identify why the testing is needed. • Compliance or legal requirement? • Need and desire for improving organizational security? • End goals might be adjusted during the scoping process. • Main deliverable is an actionable report. • Describes tests performed, vulnerabilities identified, analysis, and mitigation suggestions. • Translate technical findings to potential organizational risk. • Threat ranking: probability x impact
  • 26. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| TYPES OF ASSESSMENTS • Goal- or objective-based: • What needs protection? • Compliance-based: • Industry or governmental mandate. • Red team
  • 27. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| COMPLIANCE-BASED ASSESSMENTS • Normally assessed using audits of administrative, technical, and physical controls. • Takes precedence over organizational policy. • What to look for: Clear objectives based on regulations. • How to look: Possible rules for completing the assessment. • Focus: • Password policies • Data isolation • Key management • Limitations: • Network access • Storage access
  • 28. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| TYPES OF STRATEGIES Pentest Strategy Description Black box test • No information is provided to the pen tester. • Simulates an outsider attack with basic reconnaissance. • AKA zero knowledge test, because the tester must gather information about the target and verify the scope. • Few have knowledge of the test. Gray box test • Some information is provided to the pen tester. • Simulates an internal attack with limited knowledge. • AKA partial knowledge test, because the pen tester uses reconnaissance to gain more information about the target. White box test • Comprehensive information is provided to the pen tester. • Simulates an insider attack with full knowledge. • Opposite of a black box test. • Reconnaissance phase might be unnecessary.
  • 29. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| TYPES OF THREAT ACTORS (SLIDE 1 OF 2) • Threat actor: An entity partially or wholly responsible for an incident that affects or can affect an organization’s security. • Script kiddies: Novice or inexperienced hackers with limited technical knowledge who rely on automated tools to hack into targets. • Hacktivists: Hackers who gain unauthorized access to and cause disruption in a computer system in an attempt to achieve political or social change. • APT: A threat that uses multiple attack vectors to gain unauthorized access to sensitive resources. • Insider threats: Present and past employees, contractors, partners, and any entities that have access to proprietary or confidential information and whose actions result in compromised security.
  • 30. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| TYPES OF THREAT ACTORS (SLIDE 2 OF 2) Tier Description I Those who invest a relatively small amount of money to use off-the-shelf tools to exploit known vulnerabilities. II Those who invest a relatively small amount of money to develop their own tools to exploit known vulnerabilities. III Those who invest millions of dollars to discover unknown vulnerabilities that enable them to steal personal and corporate data that they can sell to other criminal elements. IV Organized, highly technical, proficient, well-funded professionals who work in teams to discover new vulnerabilities and develop new exploits. V Nation states that invest billions to create vulnerabilities by influencing commercial products and services. VI Nation states that invest billions to carry out a combination of cyber, military, and intelligence operations to achieve a political, military, or economic goal.
  • 31. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| RISK RESPONSES Risk Response Description Avoidance • Action taken to ensure that risk has been completely eliminated or reduced to zero. • Terminating the process, activity, or application that is the source of the risk. Transference • Responsibility for risk management moved to another entity. • Insurance company, cloud service provider, or other outsourcing provider. Mitigation • Controls and countermeasures implemented to reduce the likelihood and impact of risk. • Goal is to reduce potential effects to within acceptable risk thresholds. Acceptance • Risks are identified and analyzed and deemed to be within established limits. • No additional action required.
  • 32. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| TOLERANCE TO IMPACT • Pen testing will affect performance. • Networks • Hosts • Applications • Balance the need for testing with continuity of business operations. • Determine which business operations and assets can be tested, and which should be left alone. 32 In Scope Out of Scope • Network storage • Intranet • Product databases • Employee email accounts • Time-tracking app • E-commerce servers • Customer-facing websites • Email servers • R&D network
  • 33. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| SCHEDULING • Timeline to define when events should occur. • Specify test days and hours, as well as duration. • DDoS to take place for up to one week, but only between 12:00 and 3:00 A.M. • Start date: 7/23/2018 • End date: 7/30/2018 • Notifications to client stakeholders. 33 List of events Date and time restrictions Client stakeholder notifications
  • 34. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| SCOPE CREEP Scope creep: The condition that occurs when a client requests additional services after a SOW has been signed and the project scope has been documented and agreed upon. • Any type of project, not just pen testing. • Takes resources and effort away from the items documented in the SOW. • Less time unless you add more testers. • Less diligent testing is possible. • Testing organization can be forced to take a financial loss. • Legal protection might be affected. • Try to get another agreement to cover the additional work. • Extra time. • Extra money. • Possible reduction in costs for client.
  • 35. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| GUIDELINES FOR SCOPING AND NEGOTIATING PENTEST ENGAGEMENTS (SLIDE 1 OF 2) • Determine the types of assessments you want to conduct. • Clearly define the end goals of the engagement. • Determine what testing strategy you need to use. • Determine what types of threat actors you want to emulate. • Capabilities and intent. • Consider recommending threat modeling. • Clear definition of objectives and expectations. • Identify all targets and the risk tolerance associated with each. • Conventional and specialized systems.
  • 36. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| GUIDELINES FOR SCOPING AND NEGOTIATING PENTEST ENGAGEMENTS (SLIDE 2 OF 2) • Account for existing controls and scenarios. • Org policies and security exceptions. • Whitelists and/or blacklists. • Certificate and public key pinning. • NAC devices and controls. • Premerger or supply chain security testing. • Create, maintain, and adhere to a comprehensive schedule. • Avoid scope creep. • Use disclaimer language to protect the test team. • Use a scoping checklist. • Identify each deliverable. • Documents • Meetings
  • 37. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| TEAM PREPARATION (SLIDE 1 OF 2) • Prepare the client. • Gather technical points of contact. • Inform key IT personnel. • Verify the existence of current, verified backups of all critical systems. • Verify client personnel are aware of possible risks and will work with the pen test team to restore crashed or compromised systems. • Warn against stopgap security measures implemented before testing begins. 37
  • 38. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| TEAM PREPARATION (SLIDE 2 OF 2) • Prepare the pentest team. • Clarify scope and limitations. • Verify testers know the objectives and deliverables. • Verify testers have contact information and escalation procedures available. • Have testers document all actions and outcomes in a central repository. • Verify testers have documented authorization for pen test activities. • Verify the project lead is managing the engagement schedule properly. • Verify testers know to report accidents or errors immediately. 38
  • 39. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| DATA COLLECTION AND DOCUMENTATION (SLIDE 1 OF 2) • Follow a plan that maps pen tests to identified objectives. • Verify all tests contribute to the client organization’s goals. • Document everything, including mistakes and accidents. • Keep documentation clear, concise, and objective. • Use a central repository to store test data. • Collect as much data as you can. • Upload test results and data in their original format. 39
  • 40. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| DATA COLLECTION AND DOCUMENTATION (SLIDE 2 OF 2) • Record the steps taken to collect data. • Verify enough data is collected to analyze. • Keep original copies of all data. • If prior or current hacking activity is discovered, note that in your findings. • Ongoing activity should be flagged for escalation. • If problems outside the engagement scope are discovered, document them and forward to your supervisor. • Only pursue them if explicitly told to do so. 40
  • 41. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| CONTINGENCY PLANNING • Pentest team uses hacking tools. • Problems will arise during testing. • Targeted systems or collateral damage. • Testing adds a stress load to systems, which can crash if they are already unstable. • Current, verified backups a must. • Established contingency plan helps restore services relatively quickly. • Reboot systems. • Reload VM snapshots. 41
  • 42. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| ESCALATION PATH FOR COMMUNICATIONS • Alleviates the need for pen testers to make risky or possibly damaging decisions without input from other stakeholders. • A clear chain of command provides the starting point for escalating issues. • Team members report issues only to those who are above them in the chain of command. • Encourage the client organization to appoint a point person who is the counterpart of the pen test project supervisor. • Always have a supervisor on duty. • Train team members: • Check in with the lead, especially at the start and end of a specific task. • Notify the lead when anomalies are discovered. • Notify the lead if out-of-scope issues arise. • Refrain from action on out-of-scope issues until authorized to act. 42
  • 43. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| GO LIVE • The actual “green light” to start the testing. • Date and time for Go Live is usually kept secret. • In some cases, information gathering might start before Go Live date. • Passive reconnaissance • OSINT 43 Point in time for the test to begin. Go Live date and time might be secret. Information gathering might start first.
  • 44. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| RECORDED WEBINAR VIDEO To watch the recorded webinar video for live demos, please access the link: http://tiny.cc/3ogdpz | |
  • 45. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| ABOUT NETCOM LEARNING NetCom Learningis an award-winning global leader in managedlearning services, training and talentdevelopment. Founded : 1998 Headquarters : NewYorkCity Delivery Capability : Worldwide CEO : RussellSarder 100K+ Professionals trained | |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 12K+ Corporate clients 3500 IT,Business& Soft Skillscourses 96% Of customers recommend usto others 8.6/9 Instructor evaluations 20+ Leadingvendors recognitions Microsoft’s Worldwidetraining partner of the year 80% Trainedofthe Fortune100 Top20 ITTraining Company © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
  • 46. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| RECOMMENDED COURSES NetCom Learning offers a comprehensive portfolio for Security Courses COMPTIA » COMPTIA SECURITY+ CERTIFICATION PREP (EXAM SY0-501) –Class Scheduled onJune 08 »COMPTIAPENTEST+CERTIFICATIONPREP(EXAMPT0-001)–Class Scheduled onJune 08 » COMPTIA CYBERSECURITY ANALYST (CYSA+) CERTIFICATION PREP (EXAM CS0-001) –Class Scheduled onJune 29 »COMPTIA ADVANCED SECURITY PRACTITIONER (CASP+) CERTIFICATION PREP (EXAM CAS-003) – Class Scheduled onJuly 20 | |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| CISSP » CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP) –Class Scheduled onJune 22 MILE2 » MILE2 CERTIFIED PENETRATION TESTING ENGINEER (C)PTE) - SPECIALIZED –Class Scheduled onJune 15 »MILE2CERTIFIEDINCIDENTHANDLINGENGINEER(C)IHE)-SPECIALIZED–Class Scheduled onJune 15 » MILE2 CERTIFIED INFORMATION SYSTEMS SECURITY OFFICER (C)ISSO) - FOUNDATIONAL –Class Scheduled onJune 22 »MILE2 CERTIFIED VULNERABILITY ASSESSOR (C)VA) - FUNDAMENTAL – Class Scheduled onJuly 13
  • 47. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| RECOMMENDED MARKETING ASSETS | |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| You can also access the below Marketing Assets » Free On-Demand Training- Red Team VS Blue Team LIVE Cybersecurity Battle | CySA+ & PenTest+ Skills » Free On-Demand Training- Getting Started With CompTIA PenTest+ » Blog - 5 Reasons Why Penetration Testing Is Imperative for Your Organization » Blog - CySA+ v/s PenTest+: Which CompTIA Security Skill Will You Need to Learn First » Blog - CompTIA Security+ Certification For Enterprise Network Security: Advantages » Blog - Understanding CISSP Certification Domains
  • 48. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| UPCOMING WEBINARS • The Future of IT Service Management (ITSM) with ITIL® 4 • Analytics in the Cloud with Tableau on AWS • Gain the Cloud Advantage: Level-up Your (or Your Teams') Skills with Microsoft Azure Role-Based Certifications • Secrets to Become a Network Engineer in a Programmable Age • Adobe Illustrator Fundamentals - Walkthrough of the Latest Features and Best Practices • Present Your Data Effectively With Microsoft Excel and PowerPoint • Prevent Unauthorized Access to Your Systems and Applications with Security Automation & More | |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
  • 49. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| PROMOTIONS Save up to 60% on our Virtual Instructor-Led Training courses! Get the most out of our Virtual Instructor-Led Training (vILT) deals and upskill at special discounts on individual courses. With vILT, make your learning flexible, convenient, and immersive. View Offer | |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
  • 50. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| PROMOTIONS Buy More to Save More! Now fulfill all your training needs without disturbing your business funds. Choose from the bundle of our Learning Saving Pass (LSP) pre-pay plans and get up to 100% value back on your investment. Unlock Now | |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
  • 51. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| PROMOTIONS Worry-Free Training with Price Match Guarantee Our Price Match Guarantee ensures that we'll match the offers of any other authorized training provider if you succeed at finding anyone offering the same publicly scheduled class within 30 days of our schedule at a lower regular price. Learn More | |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
  • 52. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| FOLLOWUS ON LinkedIn Twitter YouTube | |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 Instagram © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
  • 53. © 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266|| BUILDING AN INNOVATIVE LEARNING ORG. A BOOK FROM RUSSELL SARDER, CEO AT NETCOM LEARNING A framework to build a smarter workforce, adapt to change and drive growth. DOWNLOADe-book | |© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||
  • 54. Thankyou © 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||| |© 1998-2020 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266||