SlideShare a Scribd company logo
1 of 9
PENETRATION TESTING 
From: Sumtrix 
(A Cyber Security Consultancy) 
By: Mayank Singh
About PENETRATION TESTING 
▪ A Penetration Testing, also known as a Pen Test is a legal attempt at gaining access 
to your protected computer systems or networks, often conducted by a third party 
organization. The purpose of the test is to identify security vulnerabilities and then 
attempt to successfully exploit them in order to gain some form of access to the 
network or computer system. 
▪ Two of the more common types of penetration tests are black box and white box 
penetration testing. 
In a black box test, no prior knowledge of the corporate system is given to the 
third party tester. This is often the most preferred test as it is an accurate 
simulation of how an outsider/hacker would see the network and attempt to break 
into it. 
A white box test on the other hand is when the third party organisation is given 
full IP information, network diagrams and source code files to the software, 
networks and systems, in a bid to find weaknesses from any of the available 
information. 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
PENETRATION TESTING- SOFTWARE'S / TOOLS 
/ UTILITIES 
▪ Exploitation 
▪ Framework 
▪ Social Engineering Attack Tools 
▪ SQL Injection Detection Tools 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
EXPLOITATION TOOL 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
EXPLOITATION TOOL 
Continue… 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
FRAMEWORK 
▪ Metasploit 
▪ Mercury 
▪ OpenSCAP 
▪ rsif 
▪ Phemail.py 
▪ Xenotix XSS Exploit Framework 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
SOCIAL ENGINEERING ATTACK TOOLS 
• Social-Engineering Toolkit (SET) 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
SQL INJECTION DETECTION TOOLS 
▪ CAT.NET 
▪ Dotdefender 
▪ Microsoft Url Scan 
▪ GreenSql 
▪ HP Scrawlr 
▪ Sqlstripes 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
ThankYou 
Be Secure Always 
For more Updates: 
www.sumtrix.com 
www.facebook.com/sumtrix14 
Email:info@sumtrix.com 
Sumtrix 
A Cyber Security Consultancy 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh

More Related Content

What's hot

Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingYvonne Marambanyika
 
Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Rishabh Upadhyay
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases Nasir Bhutta
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
Penetration testing
Penetration testingPenetration testing
Penetration testingAmmar WK
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGEr Vivek Rana
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing RomSoft SRL
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationChris Gates
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonBen Boyd
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Mohammed Adam
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?btpsec
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingRaghav Bisht
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Privilege escalation from 1 to 0 Workshop
Privilege escalation from 1 to 0 Workshop Privilege escalation from 1 to 0 Workshop
Privilege escalation from 1 to 0 Workshop Hossam .M Hamed
 

What's hot (20)

Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 
Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report
 
Assessing network security
Assessing network securityAssessing network security
Assessing network security
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
 
Breach and attack simulation tools
Breach and attack simulation toolsBreach and attack simulation tools
Breach and attack simulation tools
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting season
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Privilege escalation from 1 to 0 Workshop
Privilege escalation from 1 to 0 Workshop Privilege escalation from 1 to 0 Workshop
Privilege escalation from 1 to 0 Workshop
 

Viewers also liked

Penetration And its Tool
Penetration And its ToolPenetration And its Tool
Penetration And its ToolMayank Singh
 
Microsoft Powerpoint Presentation- Charity Hope Ponce C Fund 1-H
Microsoft Powerpoint Presentation- Charity Hope Ponce C Fund 1-HMicrosoft Powerpoint Presentation- Charity Hope Ponce C Fund 1-H
Microsoft Powerpoint Presentation- Charity Hope Ponce C Fund 1-HCharity Hope Ponce
 
Atl 12 fi̇zi̇hi̇n dogasi bi̇lal şahi̇n
Atl 12 fi̇zi̇hi̇n dogasi   bi̇lal şahi̇nAtl 12 fi̇zi̇hi̇n dogasi   bi̇lal şahi̇n
Atl 12 fi̇zi̇hi̇n dogasi bi̇lal şahi̇nBilal Sahin
 
Creating your-first-product-in-click bank
Creating your-first-product-in-click bankCreating your-first-product-in-click bank
Creating your-first-product-in-click bankRio Sardoma
 
continental theory and plate tectonic
continental theory and plate tectoniccontinental theory and plate tectonic
continental theory and plate tectonicCharity Hope Ponce
 
Microsoft Powerpoint Presentation- Charity Hope Ponce Cfund 1-H
Microsoft Powerpoint Presentation- Charity Hope Ponce Cfund 1-HMicrosoft Powerpoint Presentation- Charity Hope Ponce Cfund 1-H
Microsoft Powerpoint Presentation- Charity Hope Ponce Cfund 1-HCharity Hope Ponce
 
Making Strong Security Easier
Making Strong Security EasierMaking Strong Security Easier
Making Strong Security EasierFen Labalme
 
Exim process pp1
Exim process pp1Exim process pp1
Exim process pp1chinu524
 
Livio Gianola Ejercicio n° 1, 2, 3 - arr.: Alfonso Rubio Rodríguez
Livio Gianola Ejercicio n° 1, 2, 3 - arr.: Alfonso Rubio RodríguezLivio Gianola Ejercicio n° 1, 2, 3 - arr.: Alfonso Rubio Rodríguez
Livio Gianola Ejercicio n° 1, 2, 3 - arr.: Alfonso Rubio RodríguezAlfonso Rubio Rodríguez
 
Operating Docker
Operating DockerOperating Docker
Operating DockerJen Andre
 
Ida e Volta (Cover Alfonso Rubio Rodríguez)
Ida e Volta (Cover Alfonso Rubio Rodríguez)Ida e Volta (Cover Alfonso Rubio Rodríguez)
Ida e Volta (Cover Alfonso Rubio Rodríguez)Alfonso Rubio Rodríguez
 
OSSIM and OMAR in the DoD/IC
OSSIM and OMAR in the DoD/ICOSSIM and OMAR in the DoD/IC
OSSIM and OMAR in the DoD/ICJoshua L. Davis
 
Whats New in OSSIM v2.2?
Whats New in OSSIM v2.2?Whats New in OSSIM v2.2?
Whats New in OSSIM v2.2?AlienVault
 
Integrated Tools in OSSIM
Integrated Tools in OSSIMIntegrated Tools in OSSIM
Integrated Tools in OSSIMAlienVault
 
Solving the Open Source Security Puzzle
Solving the Open Source Security PuzzleSolving the Open Source Security Puzzle
Solving the Open Source Security PuzzleVic Hargrave
 

Viewers also liked (20)

Penetration And its Tool
Penetration And its ToolPenetration And its Tool
Penetration And its Tool
 
Microsoft Powerpoint Presentation- Charity Hope Ponce C Fund 1-H
Microsoft Powerpoint Presentation- Charity Hope Ponce C Fund 1-HMicrosoft Powerpoint Presentation- Charity Hope Ponce C Fund 1-H
Microsoft Powerpoint Presentation- Charity Hope Ponce C Fund 1-H
 
Atl 12 fi̇zi̇hi̇n dogasi bi̇lal şahi̇n
Atl 12 fi̇zi̇hi̇n dogasi   bi̇lal şahi̇nAtl 12 fi̇zi̇hi̇n dogasi   bi̇lal şahi̇n
Atl 12 fi̇zi̇hi̇n dogasi bi̇lal şahi̇n
 
Creating your-first-product-in-click bank
Creating your-first-product-in-click bankCreating your-first-product-in-click bank
Creating your-first-product-in-click bank
 
continental theory and plate tectonic
continental theory and plate tectoniccontinental theory and plate tectonic
continental theory and plate tectonic
 
Microsoft Powerpoint Presentation- Charity Hope Ponce Cfund 1-H
Microsoft Powerpoint Presentation- Charity Hope Ponce Cfund 1-HMicrosoft Powerpoint Presentation- Charity Hope Ponce Cfund 1-H
Microsoft Powerpoint Presentation- Charity Hope Ponce Cfund 1-H
 
Making Strong Security Easier
Making Strong Security EasierMaking Strong Security Easier
Making Strong Security Easier
 
Peace - Niño Josele (Guitar Cover)
Peace - Niño Josele (Guitar Cover)Peace - Niño Josele (Guitar Cover)
Peace - Niño Josele (Guitar Cover)
 
Bolestifull
BolestifullBolestifull
Bolestifull
 
Exim process pp1
Exim process pp1Exim process pp1
Exim process pp1
 
Hsg anh. vong 1.2012 2013
Hsg anh. vong 1.2012 2013Hsg anh. vong 1.2012 2013
Hsg anh. vong 1.2012 2013
 
Livio Gianola Ejercicio n° 1, 2, 3 - arr.: Alfonso Rubio Rodríguez
Livio Gianola Ejercicio n° 1, 2, 3 - arr.: Alfonso Rubio RodríguezLivio Gianola Ejercicio n° 1, 2, 3 - arr.: Alfonso Rubio Rodríguez
Livio Gianola Ejercicio n° 1, 2, 3 - arr.: Alfonso Rubio Rodríguez
 
Operating Docker
Operating DockerOperating Docker
Operating Docker
 
Ida e Volta (Cover Alfonso Rubio Rodríguez)
Ida e Volta (Cover Alfonso Rubio Rodríguez)Ida e Volta (Cover Alfonso Rubio Rodríguez)
Ida e Volta (Cover Alfonso Rubio Rodríguez)
 
OSSIM and OMAR in the DoD/IC
OSSIM and OMAR in the DoD/ICOSSIM and OMAR in the DoD/IC
OSSIM and OMAR in the DoD/IC
 
Whats New in OSSIM v2.2?
Whats New in OSSIM v2.2?Whats New in OSSIM v2.2?
Whats New in OSSIM v2.2?
 
OSSIM Overview
OSSIM OverviewOSSIM Overview
OSSIM Overview
 
Integrated Tools in OSSIM
Integrated Tools in OSSIMIntegrated Tools in OSSIM
Integrated Tools in OSSIM
 
Solving the Open Source Security Puzzle
Solving the Open Source Security PuzzleSolving the Open Source Security Puzzle
Solving the Open Source Security Puzzle
 
Linux Hardening
Linux HardeningLinux Hardening
Linux Hardening
 

Similar to Penetration Testing

Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guidePankaj Dubey
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security introAbhilash Ak
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hackingVishal Kumar
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)Asif Iqbal
 
Footprintig (Haching)
Footprintig (Haching)Footprintig (Haching)
Footprintig (Haching)Asif Iqbal
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxSuhailShaik16
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfShivamSharma909
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptxvamshimatangi
 
Practical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber SecurityPractical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber SecurityPRISMA CSI
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hackingUday Verma
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0Q Fadlan
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPrasad Pawar
 

Similar to Penetration Testing (20)

Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
 
Footprintig (Haching)
Footprintig (Haching)Footprintig (Haching)
Footprintig (Haching)
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 
Network Penetration Testing Service
Network Penetration Testing ServiceNetwork Penetration Testing Service
Network Penetration Testing Service
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
Practical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber SecurityPractical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber Security
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hacking
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Presentation1
Presentation1Presentation1
Presentation1
 

Penetration Testing

  • 1. PENETRATION TESTING From: Sumtrix (A Cyber Security Consultancy) By: Mayank Singh
  • 2. About PENETRATION TESTING ▪ A Penetration Testing, also known as a Pen Test is a legal attempt at gaining access to your protected computer systems or networks, often conducted by a third party organization. The purpose of the test is to identify security vulnerabilities and then attempt to successfully exploit them in order to gain some form of access to the network or computer system. ▪ Two of the more common types of penetration tests are black box and white box penetration testing. In a black box test, no prior knowledge of the corporate system is given to the third party tester. This is often the most preferred test as it is an accurate simulation of how an outsider/hacker would see the network and attempt to break into it. A white box test on the other hand is when the third party organisation is given full IP information, network diagrams and source code files to the software, networks and systems, in a bid to find weaknesses from any of the available information. WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 3. PENETRATION TESTING- SOFTWARE'S / TOOLS / UTILITIES ▪ Exploitation ▪ Framework ▪ Social Engineering Attack Tools ▪ SQL Injection Detection Tools WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 4. EXPLOITATION TOOL WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 5. EXPLOITATION TOOL Continue… WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 6. FRAMEWORK ▪ Metasploit ▪ Mercury ▪ OpenSCAP ▪ rsif ▪ Phemail.py ▪ Xenotix XSS Exploit Framework WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 7. SOCIAL ENGINEERING ATTACK TOOLS • Social-Engineering Toolkit (SET) WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 8. SQL INJECTION DETECTION TOOLS ▪ CAT.NET ▪ Dotdefender ▪ Microsoft Url Scan ▪ GreenSql ▪ HP Scrawlr ▪ Sqlstripes WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 9. ThankYou Be Secure Always For more Updates: www.sumtrix.com www.facebook.com/sumtrix14 Email:info@sumtrix.com Sumtrix A Cyber Security Consultancy WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh