Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Outline
What is Penetration Testing?
01
Phases of Penetration
Testing
02
Penetration Testing Types
03
Metasploit
05
Penetration Testing
Tools
0404
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
What is penetration testing?
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Vulnerabilities
Design & implementation
Poor system configuration
Insecure network
System complexity
Human errors
Technology
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
What is Penetration Testing?
Penetration testing is an attempt to exploit the vulnerabilities to determine
whether unauthorized access or other malicious activity is possible
Discover
vulnerabilities
Test for security
compliance
Verify staff
awareness
Purpose
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Phase of Penetration Testing?
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Penetration Testing Phases
Planning &
Reconnaissance
01
Scanning &
Discovery
02
03
Exploitation
Risk Analysis &
Suggestions
04
05
Report
Generation
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Project Management Phases
01
05
02
04
Planning
Phase
Output
Phase
Analysis
Phase
03
Execution
Phase
Scanning
phase
Activities involved in this phase
Defining goals & scope of a test
Gathering Intelligence
Deciding on testing methods to
be use
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Project Management Phases
01
05
02
04
Planning
Phase
Output
Phase
Analysis
Phase
03
Execution
Phase
Scanning
phase
Mapping the attack vectors & identifying vulnerabilities
Static Analysis
Inspecting
application code
logic, functions etc
Dynamic Analysis
Inspecting
application code in
running state
Dynamic Analysis
Inspecting
application code in
running state
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Project Management Phases
01
05
02
04
Planning
Phase
Output
Phase
Analysis
Phase
03
Execution
Phase
Scanning
phase
Crucial phase where actual damage is done
PEN
TESTING
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Project Management Phases
01
05
02
04
Planning
Phase
Output
Phase
Analysis
Phase
03
Execution
Phase
Scanning
phase
Activities involved in this phase
Collect the evidence of exploited
vulnerabilities
Categorize the risks to – Critical, High,
Medium & Low
Reporting results to executive
management
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Project Management Phases
01
05
02
04
Planning
Phase
Output
Phase
Analysis
Phase
03
Execution
Phase
Scanning
phase
Results of penetration testing are complied into detailed report
Exploited
vulnerabilities
Summary
of test
Recommended
solutions
Risks
discovered
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Penetration Testing Types
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Penetration Testing Types
01
02 04
03 05Web
Application
Network
Services
Wireless
Social
Engineering
Client Side
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Types of Penetration Testing
Black – Box
Testing
Grey – Box
Testing
White – Box
Testing
Zero Knowledge Some Knowledge Full Knowledge
TEST CASE - INPUT
TEST CASE - OUTPUT
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Penetration Testing Strategies
NETWORK
SERVICES
WEB
APPLICATIONS
WIRELESS
CLIENT
INTERNAL
TARGETED
EXTERNAL
BLIND
D-BLIND
PENETRATION
TESTING
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Penetration Testing Tools
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Penetration Testing Tools
Why do we need penetration tools?
Saves time & effort
Accurate results
Advanced analysis
Automate manual tasks
Gather bulk data
Popular penetration tools
Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Demo – Exploring Metasploit
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Training | Edureka

  • 2.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Outline What is Penetration Testing? 01 Phases of Penetration Testing 02 Penetration Testing Types 03 Metasploit 05 Penetration Testing Tools 0404
  • 3.
    Copyright © 2018,edureka and/or its affiliates. All rights reserved. What is penetration testing?
  • 4.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Vulnerabilities Design & implementation Poor system configuration Insecure network System complexity Human errors Technology
  • 5.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training What is Penetration Testing? Penetration testing is an attempt to exploit the vulnerabilities to determine whether unauthorized access or other malicious activity is possible Discover vulnerabilities Test for security compliance Verify staff awareness Purpose
  • 6.
    Copyright © 2018,edureka and/or its affiliates. All rights reserved. Phase of Penetration Testing?
  • 7.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Penetration Testing Phases Planning & Reconnaissance 01 Scanning & Discovery 02 03 Exploitation Risk Analysis & Suggestions 04 05 Report Generation
  • 8.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Project Management Phases 01 05 02 04 Planning Phase Output Phase Analysis Phase 03 Execution Phase Scanning phase Activities involved in this phase Defining goals & scope of a test Gathering Intelligence Deciding on testing methods to be use
  • 9.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Project Management Phases 01 05 02 04 Planning Phase Output Phase Analysis Phase 03 Execution Phase Scanning phase Mapping the attack vectors & identifying vulnerabilities Static Analysis Inspecting application code logic, functions etc Dynamic Analysis Inspecting application code in running state Dynamic Analysis Inspecting application code in running state
  • 10.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Project Management Phases 01 05 02 04 Planning Phase Output Phase Analysis Phase 03 Execution Phase Scanning phase Crucial phase where actual damage is done PEN TESTING
  • 11.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Project Management Phases 01 05 02 04 Planning Phase Output Phase Analysis Phase 03 Execution Phase Scanning phase Activities involved in this phase Collect the evidence of exploited vulnerabilities Categorize the risks to – Critical, High, Medium & Low Reporting results to executive management
  • 12.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Project Management Phases 01 05 02 04 Planning Phase Output Phase Analysis Phase 03 Execution Phase Scanning phase Results of penetration testing are complied into detailed report Exploited vulnerabilities Summary of test Recommended solutions Risks discovered
  • 13.
    Copyright © 2018,edureka and/or its affiliates. All rights reserved. Penetration Testing Types
  • 14.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Penetration Testing Types 01 02 04 03 05Web Application Network Services Wireless Social Engineering Client Side
  • 15.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Types of Penetration Testing Black – Box Testing Grey – Box Testing White – Box Testing Zero Knowledge Some Knowledge Full Knowledge TEST CASE - INPUT TEST CASE - OUTPUT
  • 16.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Penetration Testing Strategies NETWORK SERVICES WEB APPLICATIONS WIRELESS CLIENT INTERNAL TARGETED EXTERNAL BLIND D-BLIND PENETRATION TESTING
  • 17.
    Copyright © 2018,edureka and/or its affiliates. All rights reserved. Penetration Testing Tools
  • 18.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training Penetration Testing Tools Why do we need penetration tools? Saves time & effort Accurate results Advanced analysis Automate manual tasks Gather bulk data Popular penetration tools
  • 19.
    Copyright © 2018,edureka and/or its affiliates. All rights reserved. Demo – Exploring Metasploit
  • 20.
    Cybersecurity Certification Trainingwww.edureka.co/cybersecurity-certification-training