INTRO TO NETWORK VAPT
BY – APURV SINGH GAUTAM
Vulnerability Assessment
• Process in which computers and networks are scanned in order to identify
the presence of vulnerabilities associated with them.
• They do not differentiate the flaws that can be exploited and those that
cannot
• It provides enterprises with a more comprehensive application evaluation
• It alerts companies about the weaknesses in their systems
Penetration Testing
• It is the practice of testing a computer, network or web application to
exploit vulnerabilities.
• It may be performed automatically or manually
• Main objective is to determine security weaknesses
• It is also used to test organization's security policy
Types of Penetration Testing
• White Box Testing – Performing test from within the network
• Black Box Testing – Performing test from an external network
• Gray Box Testing – Performing test from an external network with the
knowledge of internal network
Areas of Penetration Testing
• Network Pentesting
• Web Application Pentesting
• Android/iOS Pentesting
Process of Network VAPT
• Information Gathering & Scanning
• Vulnerability Detection
• Gaining Network Access
• Privilege Escalation
• Making a report
Intro to Network Vapt

Intro to Network Vapt

  • 1.
    INTRO TO NETWORKVAPT BY – APURV SINGH GAUTAM
  • 2.
    Vulnerability Assessment • Processin which computers and networks are scanned in order to identify the presence of vulnerabilities associated with them. • They do not differentiate the flaws that can be exploited and those that cannot • It provides enterprises with a more comprehensive application evaluation • It alerts companies about the weaknesses in their systems
  • 3.
    Penetration Testing • Itis the practice of testing a computer, network or web application to exploit vulnerabilities. • It may be performed automatically or manually • Main objective is to determine security weaknesses • It is also used to test organization's security policy
  • 4.
    Types of PenetrationTesting • White Box Testing – Performing test from within the network • Black Box Testing – Performing test from an external network • Gray Box Testing – Performing test from an external network with the knowledge of internal network
  • 5.
    Areas of PenetrationTesting • Network Pentesting • Web Application Pentesting • Android/iOS Pentesting
  • 6.
    Process of NetworkVAPT • Information Gathering & Scanning • Vulnerability Detection • Gaining Network Access • Privilege Escalation • Making a report