SlideShare a Scribd company logo
1 of 20
Download to read offline
Introduction to
Penetration Testing
Obika Gellineau
KPMG
Trinidad and Tobago
Agenda
● What is a Penetration Test?
● Importance of Pentesting
● Types of Pentesting
● Pentesting Methodology
● Pentesting Tools
● Demo
What is a
Penetration Test?
What is a Penetration Test (or Pentest)?
“Security testing in which evaluators mimic real-world
attacks in an attempt to identify ways to circumvent the
security features of an application, system, or network.”
- NIST SP 800-115
What is a Penetration Test?
A penetration test:
● Identifies vulnerabilities in systems and networks
● Is a good security practice
● Should be done prior to an system / application going “live”
● Builds confidence and trust in the security measures utilized
Importance of
Pentesting
Importance of Pentesting - Overview
Penetration
Testing
Security
Vulnerabilities
★ Understanding
threats to IT
systems and networks
★ Reducing attack
surfaces
★ Improves security
monitoring
★ Secures software
development and
architecture
practices
★ Broken Access
Control
★ Data Leakage
★ Misconfigurations
★ Unpatched systems
and applications
★ Injection
★ Software and Data
Integrity Failures
★ Security Logging
Failures
★ Forgery requests
Types of Pentesting
Types of Pentesting
1) Black Box
2) White Box
3) Grey Box
Types of Pentesting - Black Box
● No information is given to
the ethical hacker.
● Only publicly available
information about the
company is utilized.
● Testing is external to the
company’s network.
Advantages:
● Low-cost
● Real-world scenario
● Disclosure of information
found on the dark web
Disadvantages:
● Testing is not “in-depth”
● Internal testing not done
Types of Pentesting - White Box
● Information on the
company’s network and/or
systems are provided.
● Testing is usually internal
to the company’s network.
Advantages:
● Minimal effort on hacking
approach and execution
● Minimal research required
on company and its systems
Disadvantages:
● High-cost
● Very labour intensive
depending on the number of
systems and scale of
network
Types of Pentesting - Grey Box
● Mixture of black box and
white box testing.
● Information is provided on
some or all of the
company’s systems and
networks.
● Testing is external and
internal to the company’s
network.
Advantages:
● Minimal research required
for company and its systems
● Attack approaches come from
both sides of the network
Disadvantages:
● Relatively high cost
● Effort can be high
Pentesting
Methodology
Pentesting Methodology - Overview
Reconnaissance
Obtaining information about
the target
Privilege Escalation
Attacking the system to gain
administrator access
Scanning and Fingerprinting
Identifying systems,
services and vulnerabilities
Maintaining Access
Leveraging a vulnerability to
maintain access on the
target’s system
Gaining Access
Attacking the target’s
system through an identified
vulnerability to gain access
Penetration
Testing
Methodology
Pentesting Methodology - Project Approach
Start
Determine Scope
(Rules of engagement)
Conduct
Penetration Test
Clear Tracks Report
End
Pentesting Tools
Pentesting Tools
Privilege Escalation
05
● Credential Cracking - Mimikatz, Hydra, etc.
● Kernel Exploits - CVE Database, NVD, etc.
● Automated Exploits - Metasploit, Cobalt Strike, etc.
Maintaining Access
04 ● Reverse Shells - ncat, socat, MSFVenom, etc.
● Local Enumeration Tools - LinEnum, LinPEAS, etc.
Gaining Access
03
● Public Exploits - ExploitDB, Seachsploit, etc.
● Brute forcing - Hashcat, Hydra, etc.
● Automated Exploits - Metasploit, sqlmap, etc.
Scanning and Fingerprinting
02
● Port Scanners - nmap, zenmap, hping3, etc.
● Vulnerability Scanners - Nessus, OpenVAS, etc.
● Web Proxies - OpenZAP, Burp Suite
Reconnaissance
01
● Port Scanners - nmap, zenmap, hping3, etc.
● OSINT Tools - spiderfoot, recon-ng, etc.
● Search Engines - Google, Bing, Yahoo, etc.
Demo
Demo
● Penetration Test of a Capture The
Flag (CTF) challenge named “All
in One”.
● Cyber Security Training Platform
- Try Hack Me
(https://tryhackme.com)
THANK YOU
linkedin.com/in/obikag

More Related Content

What's hot

What is penetration testing
What is penetration testingWhat is penetration testing
What is penetration testingsakshisoni076
 
What is Penetration & Penetration test ?
What is Penetration & Penetration test ?What is Penetration & Penetration test ?
What is Penetration & Penetration test ?Bhavin Shah
 
Penetration Testing Services
Penetration Testing ServicesPenetration Testing Services
Penetration Testing ServicesCyber 51 LLC
 
Penetration testing overview
Penetration testing overviewPenetration testing overview
Penetration testing overviewSupriya G
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical HackingS.E. CTS CERT-GOV-MD
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingYvonne Marambanyika
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases Nasir Bhutta
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingANURAG CHAKRABORTY
 
The Basics of Hacking and Penetration Testing Tools
The Basics of Hacking and Penetration Testing ToolsThe Basics of Hacking and Penetration Testing Tools
The Basics of Hacking and Penetration Testing ToolsHacker Combat
 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by primePrime Infoserv
 
Vapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesAkshay Kurhade
 
Ethical Hacking & Penetration Testing
Ethical  Hacking &  Penetration  TestingEthical  Hacking &  Penetration  Testing
Ethical Hacking & Penetration TestingWon Ju Jub
 
Penetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability ScanningPenetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability ScanningSecurityMetrics
 
How Ethical Hacking is Healthy for Business
How Ethical Hacking is Healthy for BusinessHow Ethical Hacking is Healthy for Business
How Ethical Hacking is Healthy for BusinessSecurityMetrics
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingRaghav Bisht
 
Penetration testing services
Penetration testing servicesPenetration testing services
Penetration testing servicesAlisha Henderson
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingAmine SAIGHI
 

What's hot (20)

What is penetration testing
What is penetration testingWhat is penetration testing
What is penetration testing
 
Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
 
What is Penetration & Penetration test ?
What is Penetration & Penetration test ?What is Penetration & Penetration test ?
What is Penetration & Penetration test ?
 
Penetration Testing Services
Penetration Testing ServicesPenetration Testing Services
Penetration Testing Services
 
Penetration testing overview
Penetration testing overviewPenetration testing overview
Penetration testing overview
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
The Basics of Hacking and Penetration Testing Tools
The Basics of Hacking and Penetration Testing ToolsThe Basics of Hacking and Penetration Testing Tools
The Basics of Hacking and Penetration Testing Tools
 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by prime
 
Vapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) services
 
Ethical Hacking & Penetration Testing
Ethical  Hacking &  Penetration  TestingEthical  Hacking &  Penetration  Testing
Ethical Hacking & Penetration Testing
 
Penetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability ScanningPenetration Testing vs. Vulnerability Scanning
Penetration Testing vs. Vulnerability Scanning
 
How Ethical Hacking is Healthy for Business
How Ethical Hacking is Healthy for BusinessHow Ethical Hacking is Healthy for Business
How Ethical Hacking is Healthy for Business
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
Penetration testing services
Penetration testing servicesPenetration testing services
Penetration testing services
 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 

Similar to Introduction to Penetration Testing: Understanding Threats and Reducing Attack Surfaces

Security and Penetration Testing Overview
Security and Penetration Testing OverviewSecurity and Penetration Testing Overview
Security and Penetration Testing OverviewQA InfoTech
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGEr Vivek Rana
 
The Art of Penetration Testing in Cybersecurity.
The Art of Penetration Testing in Cybersecurity.The Art of Penetration Testing in Cybersecurity.
The Art of Penetration Testing in Cybersecurity.Expeed Software
 
pentration testing.pdf
pentration testing.pdfpentration testing.pdf
pentration testing.pdfRamya Nellutla
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing ExplainedRand W. Hirt
 
Penentration testing
Penentration testingPenentration testing
Penentration testingtahreemsaleem
 
Security Testing.pptx
Security Testing.pptxSecurity Testing.pptx
Security Testing.pptxosandadeshan
 
Benefits of Network Penetration Testing - Cyberoctet
Benefits of Network Penetration Testing - CyberoctetBenefits of Network Penetration Testing - Cyberoctet
Benefits of Network Penetration Testing - CyberoctetCyber Octet Private Limited
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guidePankaj Dubey
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Mohammed Adam
 
CohenNancyPresentation.ppt
CohenNancyPresentation.pptCohenNancyPresentation.ppt
CohenNancyPresentation.pptmypc72
 
Itis pentest slides hyd
Itis pentest slides  hydItis pentest slides  hyd
Itis pentest slides hydRama krishna
 
GSA calls out Cyber Hunt skills in final Cybersecurity Contract Orals
GSA calls out Cyber Hunt skills in final Cybersecurity Contract OralsGSA calls out Cyber Hunt skills in final Cybersecurity Contract Orals
GSA calls out Cyber Hunt skills in final Cybersecurity Contract OralsDavid Sweigert
 
penetration testing.pptx
penetration testing.pptxpenetration testing.pptx
penetration testing.pptxwilnawilliams3
 
penetration testing.pptx
penetration testing.pptxpenetration testing.pptx
penetration testing.pptxwilnawilliams3
 
Learn more about the Penetration Services
Learn more about the Penetration ServicesLearn more about the Penetration Services
Learn more about the Penetration Serviceswilnawilliams3
 
Assessing a pen tester: Making the right choice when choosing a third party P...
Assessing a pen tester: Making the right choice when choosing a third party P...Assessing a pen tester: Making the right choice when choosing a third party P...
Assessing a pen tester: Making the right choice when choosing a third party P...Jason Broz, CIPP/US
 

Similar to Introduction to Penetration Testing: Understanding Threats and Reducing Attack Surfaces (20)

Security and Penetration Testing Overview
Security and Penetration Testing OverviewSecurity and Penetration Testing Overview
Security and Penetration Testing Overview
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
The Art of Penetration Testing in Cybersecurity.
The Art of Penetration Testing in Cybersecurity.The Art of Penetration Testing in Cybersecurity.
The Art of Penetration Testing in Cybersecurity.
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
pentration testing.pdf
pentration testing.pdfpentration testing.pdf
pentration testing.pdf
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
Penentration testing
Penentration testingPenentration testing
Penentration testing
 
Security Testing.pptx
Security Testing.pptxSecurity Testing.pptx
Security Testing.pptx
 
Benefits of Network Penetration Testing - Cyberoctet
Benefits of Network Penetration Testing - CyberoctetBenefits of Network Penetration Testing - Cyberoctet
Benefits of Network Penetration Testing - Cyberoctet
 
Module 6.pptx
Module 6.pptxModule 6.pptx
Module 6.pptx
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
 
CohenNancyPresentation.ppt
CohenNancyPresentation.pptCohenNancyPresentation.ppt
CohenNancyPresentation.ppt
 
Itis pentest slides hyd
Itis pentest slides  hydItis pentest slides  hyd
Itis pentest slides hyd
 
GSA calls out Cyber Hunt skills in final Cybersecurity Contract Orals
GSA calls out Cyber Hunt skills in final Cybersecurity Contract OralsGSA calls out Cyber Hunt skills in final Cybersecurity Contract Orals
GSA calls out Cyber Hunt skills in final Cybersecurity Contract Orals
 
Penetration Testing Service in India Senselearner .pdf
Penetration Testing Service in India Senselearner .pdfPenetration Testing Service in India Senselearner .pdf
Penetration Testing Service in India Senselearner .pdf
 
penetration testing.pptx
penetration testing.pptxpenetration testing.pptx
penetration testing.pptx
 
penetration testing.pptx
penetration testing.pptxpenetration testing.pptx
penetration testing.pptx
 
Learn more about the Penetration Services
Learn more about the Penetration ServicesLearn more about the Penetration Services
Learn more about the Penetration Services
 
Assessing a pen tester: Making the right choice when choosing a third party P...
Assessing a pen tester: Making the right choice when choosing a third party P...Assessing a pen tester: Making the right choice when choosing a third party P...
Assessing a pen tester: Making the right choice when choosing a third party P...
 

More from Obika Gellineau

Securing Infrastructure as a Code - DevFest 2022 Presentation
Securing Infrastructure as a Code - DevFest 2022 PresentationSecuring Infrastructure as a Code - DevFest 2022 Presentation
Securing Infrastructure as a Code - DevFest 2022 PresentationObika Gellineau
 
Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...
Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...
Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...Obika Gellineau
 
Robotic Process Automation Development
Robotic Process Automation DevelopmentRobotic Process Automation Development
Robotic Process Automation DevelopmentObika Gellineau
 
MANRS - Introduction to Internet Routing Security
MANRS - Introduction to Internet Routing SecurityMANRS - Introduction to Internet Routing Security
MANRS - Introduction to Internet Routing SecurityObika Gellineau
 

More from Obika Gellineau (6)

Securing Infrastructure as a Code - DevFest 2022 Presentation
Securing Infrastructure as a Code - DevFest 2022 PresentationSecuring Infrastructure as a Code - DevFest 2022 Presentation
Securing Infrastructure as a Code - DevFest 2022 Presentation
 
Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...
Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...
Open source during COVID-19: A lesson about the Caribbean Virus Tracker - gdg...
 
Robotic Process Automation Development
Robotic Process Automation DevelopmentRobotic Process Automation Development
Robotic Process Automation Development
 
Capital One Data Breach
Capital One Data BreachCapital One Data Breach
Capital One Data Breach
 
MANRS - Introduction to Internet Routing Security
MANRS - Introduction to Internet Routing SecurityMANRS - Introduction to Internet Routing Security
MANRS - Introduction to Internet Routing Security
 
Static Code Analysis
Static Code AnalysisStatic Code Analysis
Static Code Analysis
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Introduction to Penetration Testing: Understanding Threats and Reducing Attack Surfaces

  • 1. Introduction to Penetration Testing Obika Gellineau KPMG Trinidad and Tobago
  • 2. Agenda ● What is a Penetration Test? ● Importance of Pentesting ● Types of Pentesting ● Pentesting Methodology ● Pentesting Tools ● Demo
  • 4. What is a Penetration Test (or Pentest)? “Security testing in which evaluators mimic real-world attacks in an attempt to identify ways to circumvent the security features of an application, system, or network.” - NIST SP 800-115
  • 5. What is a Penetration Test? A penetration test: ● Identifies vulnerabilities in systems and networks ● Is a good security practice ● Should be done prior to an system / application going “live” ● Builds confidence and trust in the security measures utilized
  • 7. Importance of Pentesting - Overview Penetration Testing Security Vulnerabilities ★ Understanding threats to IT systems and networks ★ Reducing attack surfaces ★ Improves security monitoring ★ Secures software development and architecture practices ★ Broken Access Control ★ Data Leakage ★ Misconfigurations ★ Unpatched systems and applications ★ Injection ★ Software and Data Integrity Failures ★ Security Logging Failures ★ Forgery requests
  • 9. Types of Pentesting 1) Black Box 2) White Box 3) Grey Box
  • 10. Types of Pentesting - Black Box ● No information is given to the ethical hacker. ● Only publicly available information about the company is utilized. ● Testing is external to the company’s network. Advantages: ● Low-cost ● Real-world scenario ● Disclosure of information found on the dark web Disadvantages: ● Testing is not “in-depth” ● Internal testing not done
  • 11. Types of Pentesting - White Box ● Information on the company’s network and/or systems are provided. ● Testing is usually internal to the company’s network. Advantages: ● Minimal effort on hacking approach and execution ● Minimal research required on company and its systems Disadvantages: ● High-cost ● Very labour intensive depending on the number of systems and scale of network
  • 12. Types of Pentesting - Grey Box ● Mixture of black box and white box testing. ● Information is provided on some or all of the company’s systems and networks. ● Testing is external and internal to the company’s network. Advantages: ● Minimal research required for company and its systems ● Attack approaches come from both sides of the network Disadvantages: ● Relatively high cost ● Effort can be high
  • 14. Pentesting Methodology - Overview Reconnaissance Obtaining information about the target Privilege Escalation Attacking the system to gain administrator access Scanning and Fingerprinting Identifying systems, services and vulnerabilities Maintaining Access Leveraging a vulnerability to maintain access on the target’s system Gaining Access Attacking the target’s system through an identified vulnerability to gain access Penetration Testing Methodology
  • 15. Pentesting Methodology - Project Approach Start Determine Scope (Rules of engagement) Conduct Penetration Test Clear Tracks Report End
  • 17. Pentesting Tools Privilege Escalation 05 ● Credential Cracking - Mimikatz, Hydra, etc. ● Kernel Exploits - CVE Database, NVD, etc. ● Automated Exploits - Metasploit, Cobalt Strike, etc. Maintaining Access 04 ● Reverse Shells - ncat, socat, MSFVenom, etc. ● Local Enumeration Tools - LinEnum, LinPEAS, etc. Gaining Access 03 ● Public Exploits - ExploitDB, Seachsploit, etc. ● Brute forcing - Hashcat, Hydra, etc. ● Automated Exploits - Metasploit, sqlmap, etc. Scanning and Fingerprinting 02 ● Port Scanners - nmap, zenmap, hping3, etc. ● Vulnerability Scanners - Nessus, OpenVAS, etc. ● Web Proxies - OpenZAP, Burp Suite Reconnaissance 01 ● Port Scanners - nmap, zenmap, hping3, etc. ● OSINT Tools - spiderfoot, recon-ng, etc. ● Search Engines - Google, Bing, Yahoo, etc.
  • 18. Demo
  • 19. Demo ● Penetration Test of a Capture The Flag (CTF) challenge named “All in One”. ● Cyber Security Training Platform - Try Hack Me (https://tryhackme.com)