SlideShare a Scribd company logo
1 of 9
PENETRATION TESTING 
From: Sumtrix 
(A Cyber Security Consultancy) 
By: Mayank Singh
About PENETRATION TESTING 
▪ A Penetration Testing, also known as a Pen Test is a legal attempt at gaining access 
to your protected computer systems or networks, often conducted by a third party 
organization. The purpose of the test is to identify security vulnerabilities and then 
attempt to successfully exploit them in order to gain some form of access to the 
network or computer system. 
▪ Two of the more common types of penetration tests are black box and white box 
penetration testing. 
In a black box test, no prior knowledge of the corporate system is given to the 
third party tester. This is often the most preferred test as it is an accurate 
simulation of how an outsider/hacker would see the network and attempt to break 
into it. 
A white box test on the other hand is when the third party organisation is given 
full IP information, network diagrams and source code files to the software, 
networks and systems, in a bid to find weaknesses from any of the available 
information. 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
PENETRATION TESTING- SOFTWARE'S / TOOLS 
/ UTILITIES 
▪ Exploitation 
▪ Framework 
▪ Social Engineering Attack Tools 
▪ SQL Injection Detection Tools 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
EXPLOITATION TOOL 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
EXPLOITATION TOOL 
Continue… 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
FRAMEWORK 
▪ Metasploit 
▪ Mercury 
▪ OpenSCAP 
▪ rsif 
▪ Phemail.py 
▪ Xenotix XSS Exploit Framework 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
SOCIAL ENGINEERING ATTACK TOOLS 
• Social-Engineering Toolkit (SET) 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
SQL INJECTION DETECTION TOOLS 
▪ CAT.NET 
▪ Dotdefender 
▪ Microsoft Url Scan 
▪ GreenSql 
▪ HP Scrawlr 
▪ Sqlstripes 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
ThankYou 
Be Secure Always 
For more Updates: 
www.sumtrix.com 
www.facebook.com/sumtrix14 
Email:info@sumtrix.com 
Sumtrix 
A Cyber Security Consultancy 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh

More Related Content

What's hot

Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolIssar Kapadia
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical HackingS.E. CTS CERT-GOV-MD
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanningamiable_indian
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testingecmee
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Security testing presentation
Security testing presentationSecurity testing presentation
Security testing presentationConfiz
 
Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Rishabh Upadhyay
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security PresentationWajahat Rajab
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Rishabh Upadhyay
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing ExplainedRand W. Hirt
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 

What's hot (20)

Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanning
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
 
Cyber security
Cyber securityCyber security
Cyber security
 
Application security
Application securityApplication security
Application security
 
Physical security
Physical securityPhysical security
Physical security
 
Security testing presentation
Security testing presentationSecurity testing presentation
Security testing presentation
 
Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing
 
Security testing
Security testingSecurity testing
Security testing
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 

Viewers also liked

Penetration And its Tool
Penetration And its ToolPenetration And its Tool
Penetration And its ToolMayank Singh
 
Microsoft Powerpoint Presentation- Charity Hope Ponce C Fund 1-H
Microsoft Powerpoint Presentation- Charity Hope Ponce C Fund 1-HMicrosoft Powerpoint Presentation- Charity Hope Ponce C Fund 1-H
Microsoft Powerpoint Presentation- Charity Hope Ponce C Fund 1-HCharity Hope Ponce
 
Atl 12 fi̇zi̇hi̇n dogasi bi̇lal şahi̇n
Atl 12 fi̇zi̇hi̇n dogasi   bi̇lal şahi̇nAtl 12 fi̇zi̇hi̇n dogasi   bi̇lal şahi̇n
Atl 12 fi̇zi̇hi̇n dogasi bi̇lal şahi̇nBilal Sahin
 
Creating your-first-product-in-click bank
Creating your-first-product-in-click bankCreating your-first-product-in-click bank
Creating your-first-product-in-click bankRio Sardoma
 
continental theory and plate tectonic
continental theory and plate tectoniccontinental theory and plate tectonic
continental theory and plate tectonicCharity Hope Ponce
 
Microsoft Powerpoint Presentation- Charity Hope Ponce Cfund 1-H
Microsoft Powerpoint Presentation- Charity Hope Ponce Cfund 1-HMicrosoft Powerpoint Presentation- Charity Hope Ponce Cfund 1-H
Microsoft Powerpoint Presentation- Charity Hope Ponce Cfund 1-HCharity Hope Ponce
 
Making Strong Security Easier
Making Strong Security EasierMaking Strong Security Easier
Making Strong Security EasierFen Labalme
 
Exim process pp1
Exim process pp1Exim process pp1
Exim process pp1chinu524
 
Livio Gianola Ejercicio n° 1, 2, 3 - arr.: Alfonso Rubio Rodríguez
Livio Gianola Ejercicio n° 1, 2, 3 - arr.: Alfonso Rubio RodríguezLivio Gianola Ejercicio n° 1, 2, 3 - arr.: Alfonso Rubio Rodríguez
Livio Gianola Ejercicio n° 1, 2, 3 - arr.: Alfonso Rubio RodríguezAlfonso Rubio Rodríguez
 
Operating Docker
Operating DockerOperating Docker
Operating DockerJen Andre
 
Ida e Volta (Cover Alfonso Rubio Rodríguez)
Ida e Volta (Cover Alfonso Rubio Rodríguez)Ida e Volta (Cover Alfonso Rubio Rodríguez)
Ida e Volta (Cover Alfonso Rubio Rodríguez)Alfonso Rubio Rodríguez
 
OSSIM and OMAR in the DoD/IC
OSSIM and OMAR in the DoD/ICOSSIM and OMAR in the DoD/IC
OSSIM and OMAR in the DoD/ICJoshua L. Davis
 
Whats New in OSSIM v2.2?
Whats New in OSSIM v2.2?Whats New in OSSIM v2.2?
Whats New in OSSIM v2.2?AlienVault
 
Integrated Tools in OSSIM
Integrated Tools in OSSIMIntegrated Tools in OSSIM
Integrated Tools in OSSIMAlienVault
 
Solving the Open Source Security Puzzle
Solving the Open Source Security PuzzleSolving the Open Source Security Puzzle
Solving the Open Source Security PuzzleVic Hargrave
 

Viewers also liked (20)

Penetration And its Tool
Penetration And its ToolPenetration And its Tool
Penetration And its Tool
 
Microsoft Powerpoint Presentation- Charity Hope Ponce C Fund 1-H
Microsoft Powerpoint Presentation- Charity Hope Ponce C Fund 1-HMicrosoft Powerpoint Presentation- Charity Hope Ponce C Fund 1-H
Microsoft Powerpoint Presentation- Charity Hope Ponce C Fund 1-H
 
Atl 12 fi̇zi̇hi̇n dogasi bi̇lal şahi̇n
Atl 12 fi̇zi̇hi̇n dogasi   bi̇lal şahi̇nAtl 12 fi̇zi̇hi̇n dogasi   bi̇lal şahi̇n
Atl 12 fi̇zi̇hi̇n dogasi bi̇lal şahi̇n
 
Creating your-first-product-in-click bank
Creating your-first-product-in-click bankCreating your-first-product-in-click bank
Creating your-first-product-in-click bank
 
continental theory and plate tectonic
continental theory and plate tectoniccontinental theory and plate tectonic
continental theory and plate tectonic
 
Microsoft Powerpoint Presentation- Charity Hope Ponce Cfund 1-H
Microsoft Powerpoint Presentation- Charity Hope Ponce Cfund 1-HMicrosoft Powerpoint Presentation- Charity Hope Ponce Cfund 1-H
Microsoft Powerpoint Presentation- Charity Hope Ponce Cfund 1-H
 
Making Strong Security Easier
Making Strong Security EasierMaking Strong Security Easier
Making Strong Security Easier
 
Peace - Niño Josele (Guitar Cover)
Peace - Niño Josele (Guitar Cover)Peace - Niño Josele (Guitar Cover)
Peace - Niño Josele (Guitar Cover)
 
Bolestifull
BolestifullBolestifull
Bolestifull
 
Exim process pp1
Exim process pp1Exim process pp1
Exim process pp1
 
Hsg anh. vong 1.2012 2013
Hsg anh. vong 1.2012 2013Hsg anh. vong 1.2012 2013
Hsg anh. vong 1.2012 2013
 
Livio Gianola Ejercicio n° 1, 2, 3 - arr.: Alfonso Rubio Rodríguez
Livio Gianola Ejercicio n° 1, 2, 3 - arr.: Alfonso Rubio RodríguezLivio Gianola Ejercicio n° 1, 2, 3 - arr.: Alfonso Rubio Rodríguez
Livio Gianola Ejercicio n° 1, 2, 3 - arr.: Alfonso Rubio Rodríguez
 
Operating Docker
Operating DockerOperating Docker
Operating Docker
 
Ida e Volta (Cover Alfonso Rubio Rodríguez)
Ida e Volta (Cover Alfonso Rubio Rodríguez)Ida e Volta (Cover Alfonso Rubio Rodríguez)
Ida e Volta (Cover Alfonso Rubio Rodríguez)
 
OSSIM and OMAR in the DoD/IC
OSSIM and OMAR in the DoD/ICOSSIM and OMAR in the DoD/IC
OSSIM and OMAR in the DoD/IC
 
Whats New in OSSIM v2.2?
Whats New in OSSIM v2.2?Whats New in OSSIM v2.2?
Whats New in OSSIM v2.2?
 
OSSIM Overview
OSSIM OverviewOSSIM Overview
OSSIM Overview
 
Integrated Tools in OSSIM
Integrated Tools in OSSIMIntegrated Tools in OSSIM
Integrated Tools in OSSIM
 
Solving the Open Source Security Puzzle
Solving the Open Source Security PuzzleSolving the Open Source Security Puzzle
Solving the Open Source Security Puzzle
 
Linux Hardening
Linux HardeningLinux Hardening
Linux Hardening
 

Similar to Penetration Testing

Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guidePankaj Dubey
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security introAbhilash Ak
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hackingVishal Kumar
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)Asif Iqbal
 
Footprintig (Haching)
Footprintig (Haching)Footprintig (Haching)
Footprintig (Haching)Asif Iqbal
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxSuhailShaik16
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfShivamSharma909
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptxvamshimatangi
 
Practical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber SecurityPractical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber SecurityPRISMA CSI
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hackingUday Verma
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0Q Fadlan
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPrasad Pawar
 

Similar to Penetration Testing (20)

Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
 
Footprintig (Haching)
Footprintig (Haching)Footprintig (Haching)
Footprintig (Haching)
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 
Network Penetration Testing Service
Network Penetration Testing ServiceNetwork Penetration Testing Service
Network Penetration Testing Service
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
Practical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber SecurityPractical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber Security
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
 
Ehtical hacking
Ehtical hackingEhtical hacking
Ehtical hacking
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Presentation1
Presentation1Presentation1
Presentation1
 

Penetration Testing

  • 1. PENETRATION TESTING From: Sumtrix (A Cyber Security Consultancy) By: Mayank Singh
  • 2. About PENETRATION TESTING ▪ A Penetration Testing, also known as a Pen Test is a legal attempt at gaining access to your protected computer systems or networks, often conducted by a third party organization. The purpose of the test is to identify security vulnerabilities and then attempt to successfully exploit them in order to gain some form of access to the network or computer system. ▪ Two of the more common types of penetration tests are black box and white box penetration testing. In a black box test, no prior knowledge of the corporate system is given to the third party tester. This is often the most preferred test as it is an accurate simulation of how an outsider/hacker would see the network and attempt to break into it. A white box test on the other hand is when the third party organisation is given full IP information, network diagrams and source code files to the software, networks and systems, in a bid to find weaknesses from any of the available information. WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 3. PENETRATION TESTING- SOFTWARE'S / TOOLS / UTILITIES ▪ Exploitation ▪ Framework ▪ Social Engineering Attack Tools ▪ SQL Injection Detection Tools WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 4. EXPLOITATION TOOL WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 5. EXPLOITATION TOOL Continue… WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 6. FRAMEWORK ▪ Metasploit ▪ Mercury ▪ OpenSCAP ▪ rsif ▪ Phemail.py ▪ Xenotix XSS Exploit Framework WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 7. SOCIAL ENGINEERING ATTACK TOOLS • Social-Engineering Toolkit (SET) WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 8. SQL INJECTION DETECTION TOOLS ▪ CAT.NET ▪ Dotdefender ▪ Microsoft Url Scan ▪ GreenSql ▪ HP Scrawlr ▪ Sqlstripes WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 9. ThankYou Be Secure Always For more Updates: www.sumtrix.com www.facebook.com/sumtrix14 Email:info@sumtrix.com Sumtrix A Cyber Security Consultancy WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh