This document discusses vulnerability assessment and penetration testing. It defines them as two types of vulnerability testing that search for known vulnerabilities and attempt to exploit vulnerabilities, respectively. Vulnerability assessment uses automated tools to detect known issues, while penetration testing employs hacking techniques to demonstrate how deeply vulnerabilities could be exploited like an actual attacker. Both are important security practices for identifying weaknesses and reducing risks, but require different skills and have different strengths, weaknesses, frequencies, and report outputs. Reasons for vulnerabilities include insecure coding, limited testing, and misconfigurations. The document outlines common vulnerability and attack types as well as how vulnerability assessment and penetration testing are typically conducted.
( ** Cyber Security Training: https://www.edureka.co/cybersecurity-certification-training ** )
This Edureka PPT on "Penetration Testing" will help you understand all about penetration testing, its methodologies, and tools. Below is the list of topics covered in this session:
What is Penetration Testing?
Phases of Penetration Testing
Penetration Testing Types
Penetration Testing Tools
How to perform Penetration Testing on Kali Linux?
Cyber Security Playlist: https://bit.ly/2N2jlNN
Cyber Security Blog Series: https://bit.ly/2AuULkP
Instagram: https://www.instagram.com/edureka_lea...
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Vulnerability assessment & Penetration testing Basics Mohammed Adam
In these days of widespread Internet usage, security is of prime importance. The almost universal use of mobile and Web applications makes systems vulnerable to cyber attacks. Vulnerability assessment can help identify the loopholes in a system while penetration testing is a proof-of-concept approach to actually explore and exploit a vulnerability.
Application Security - Your Success Depends on itWSO2
Traditional information security mainly revolves around network and operating system (OS) level protection. Regardless of the level of security guarding those aspects, the system can be penetrated and the entire deployment can be brought down if your application's security isn't taken into serious consideration. Information security should ideally start at the application level, before network and OS level security is ensured. To achieve this, security needs to be integrated into the application at the software development phase.
In this session, Dulanja will discuss the following:
The importance of application security - why network and OS security is insufficient.
Challenges in securing your application.
Making security part of the development lifecycle.
( ** Cyber Security Training: https://www.edureka.co/cybersecurity-certification-training ** )
This Edureka PPT on "Penetration Testing" will help you understand all about penetration testing, its methodologies, and tools. Below is the list of topics covered in this session:
What is Penetration Testing?
Phases of Penetration Testing
Penetration Testing Types
Penetration Testing Tools
How to perform Penetration Testing on Kali Linux?
Cyber Security Playlist: https://bit.ly/2N2jlNN
Cyber Security Blog Series: https://bit.ly/2AuULkP
Instagram: https://www.instagram.com/edureka_lea...
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Vulnerability assessment & Penetration testing Basics Mohammed Adam
In these days of widespread Internet usage, security is of prime importance. The almost universal use of mobile and Web applications makes systems vulnerable to cyber attacks. Vulnerability assessment can help identify the loopholes in a system while penetration testing is a proof-of-concept approach to actually explore and exploit a vulnerability.
Application Security - Your Success Depends on itWSO2
Traditional information security mainly revolves around network and operating system (OS) level protection. Regardless of the level of security guarding those aspects, the system can be penetrated and the entire deployment can be brought down if your application's security isn't taken into serious consideration. Information security should ideally start at the application level, before network and OS level security is ensured. To achieve this, security needs to be integrated into the application at the software development phase.
In this session, Dulanja will discuss the following:
The importance of application security - why network and OS security is insufficient.
Challenges in securing your application.
Making security part of the development lifecycle.
VAPT defines the security measures that are supposed to be put in place to address cyber threats. There are plenty of strategies that can be adopted in Pen Testing which include Black Box Pen Test, White Box Pen Text, Hidden Pen Test, Internal Pen Test, and Gray Box Testing. It is mandatory that VAPT is conducted in order to deter cyber-attacks that are on the upsurge daily. These VAPT ranges from Mobile, Network Penetration Testing, and Vulnerability Assessments.
There are many merits to VAPT in your business which include early error detection in program codes which will prevent cyber attacks. Most companies lose billions of dollars due to cyber-attacks. With VAPT, it guarantees that all loopholes are tightened before an intrusion transpires.
Penetration testing reporting and methodologyRashad Aliyev
This paper covering information about Penetration testing methodology, standards reporting formats and comparing reports. Explained problem of Cyber Security experts when they making penetration tests. How they doing current presentations.
We will focus our work in penetration testing methodology reporting form and detailed information how to compare result and related work information.
This presentation describes penetration testing with a Who, What, Where, When, and How approach. In the presentation, you may discover the common pitfalls of a bad penetration test and you could identify a better one. You should be able to recognize and differentiate both looking at the methods (attitude) and result.
This presentation will provide an overview of what a penetration test is, why companies pay for them, and what role they play in most IT security programs. It will also include a brief overview of the common skill sets and tools used by today’s security professionals. Finally, it will offer some basic advice for getting started in penetration testing. This should be interesting to aspiring pentesters trying to gain a better understanding of how penetration testing fits into the larger IT security world.
Additional resources can be found in the blog below:
https://www.netspi.com/blog/entryid/140/resources-for-aspiring-penetration-testers
More security blogs by the authors can be found @
https://www.netspi.com/blog/
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
a perfect example of your 6 weeks summer training ppt. Course-Ethical Hacking , its info and VAPT- Vulnerability Assessment n Penetration testing. about how vulnerability scanning , tools used , cracking password , etc.
Vapt( vulnerabilty and penetration testing ) servicesAkshay Kurhade
The VAPT testers from Suma Soft are familiar with different ethical hacking techniques such as Foot printing and reconnaissance, Host enumeration, Scanning networks, System hacking Evading IDS, Firewalls and honeypots, Social engineering, SQL injection, Session hijacking, Exploiting the network etc. https://bit.ly/2HLpbnz
Vulnerabilities in modern web applicationsNiyas Nazar
Microsoft powerpoint presentation for BTech academic seminar.This seminar discuses about penetration testing, penetration testing tools, web application vulnerabilities, impact of vulnerabilities and security recommendations.
+ Background & Basics of Web App Security, The HTTP Protocol, Web.
+ Application Insecurities, OWASP Top 10 Vulnerabilities (XSS, SQL Injection, CSRF, etc.)
+ Web App Security Tools (Scanners, Fuzzers, etc), Remediation of Web App
+ Vulnerabilities, Web Application Audits and Risk Assessment.
Web Application Security 101 was conducted by:
Vaibhav Gupta, Vishal Ashtana, Sandeep Singh from Null.
Understanding Penetration Testing & its Benefits for OrganizationPECB
This topic will cover the most important part related the penetration testing and the importance of its implementation on the organization. Considering it as a good tool for companies to deal with information security vulnerabilities, it is becoming significant part for companies to develop it.
Main point that will be covered:
• Overview of Penetration Testing
• Purpose of Penetration testing and benefits
• What are the Rules of Engagement (White, Black and Grey Box Testing)
• Penetration Testing and Phases
Presenter:
Christie Oso is Managing Principal Information Security consultant and trainer at Intex IT. She is also responsible for Risk Management, Vulnerability Assessment, and Penetration Testing. She holds certification on CISSP, CISM, CEH, ISO 27001 LA, ISO 27005 Risk Manager,
Link of the recorded session published on YouTube: https://youtu.be/lyqOJmC94vg
Secure web programming plus end users' awareness are the last line of defense against attacks targeted at the corporate systems, particularly web applications, in the era of world-wide web.
Most web application attacks occur through Cross Site Scripting (XSS), and SQL Injection. On the other hand, most web application vulnerabilities arise from weak coding with failure to properly validate users' input, and failure to properly sanitize output while displaying the data to the visitors.
The literature also confirms the following web application weaknesses in 2010: 26% improper output handling, 22% improper input handling, and 15% insufficient authentication, and others.
Abdul Rahman Sherzad, lecturer at Computer Science Faculty of Herat University, and Ph.D. student at Technical University of Berlin gave a presentation at 12th IT conference on Higher Education for Afghanistan in MoHE, and then conducted a seminar at Hariwa Institute of Higher Education in Herat, Afghanistan introducing web application security threats by demonstrating the security problems that exist in corporate systems with a strong emphasis on secure development. Major security vulnerabilities, secure design and coding best practices when designing and developing web-based applications were covered.
The main objective of the presentation was raising awareness about the problems that might occur in web-application systems, as well as secure coding practices and principles. The presentation's aims were to build security awareness for web applications, to discuss the threat landscape and the controls users should use during the software development lifecycle, to introduce attack methods, to discuss approaches for discovering security vulnerabilities, and finally to discuss the basics of secure web development techniques and principles.
Introduction of Ethical Hacking, Life cycle of Hacking, Introduction of Penetration testing, Steps in Penetration Testing, Foot printing Module, Scanning Module, Live Demos on Finding Vulnerabilities a) Bypass Authentication b) Sql Injection c) Cross site Scripting d) File upload Vulnerability (Web Server Hacking) Countermeasures of Securing Web applications
chap-1 : Vulnerabilities in Information SystemsKashfUlHuda1
Introduction to Cyber Security. Chapter #1. Vulnerabilities in Information Systems. What is a vulnerability?
Cyberspace: From terra incognita to terra nullius.
Cyberspace performance expectations. Measuring vulnerabilities. CVSS XCCDF OVAL
Avoiding vulnerabilities through secure coding
VAPT defines the security measures that are supposed to be put in place to address cyber threats. There are plenty of strategies that can be adopted in Pen Testing which include Black Box Pen Test, White Box Pen Text, Hidden Pen Test, Internal Pen Test, and Gray Box Testing. It is mandatory that VAPT is conducted in order to deter cyber-attacks that are on the upsurge daily. These VAPT ranges from Mobile, Network Penetration Testing, and Vulnerability Assessments.
There are many merits to VAPT in your business which include early error detection in program codes which will prevent cyber attacks. Most companies lose billions of dollars due to cyber-attacks. With VAPT, it guarantees that all loopholes are tightened before an intrusion transpires.
Penetration testing reporting and methodologyRashad Aliyev
This paper covering information about Penetration testing methodology, standards reporting formats and comparing reports. Explained problem of Cyber Security experts when they making penetration tests. How they doing current presentations.
We will focus our work in penetration testing methodology reporting form and detailed information how to compare result and related work information.
This presentation describes penetration testing with a Who, What, Where, When, and How approach. In the presentation, you may discover the common pitfalls of a bad penetration test and you could identify a better one. You should be able to recognize and differentiate both looking at the methods (attitude) and result.
This presentation will provide an overview of what a penetration test is, why companies pay for them, and what role they play in most IT security programs. It will also include a brief overview of the common skill sets and tools used by today’s security professionals. Finally, it will offer some basic advice for getting started in penetration testing. This should be interesting to aspiring pentesters trying to gain a better understanding of how penetration testing fits into the larger IT security world.
Additional resources can be found in the blog below:
https://www.netspi.com/blog/entryid/140/resources-for-aspiring-penetration-testers
More security blogs by the authors can be found @
https://www.netspi.com/blog/
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
a perfect example of your 6 weeks summer training ppt. Course-Ethical Hacking , its info and VAPT- Vulnerability Assessment n Penetration testing. about how vulnerability scanning , tools used , cracking password , etc.
Vapt( vulnerabilty and penetration testing ) servicesAkshay Kurhade
The VAPT testers from Suma Soft are familiar with different ethical hacking techniques such as Foot printing and reconnaissance, Host enumeration, Scanning networks, System hacking Evading IDS, Firewalls and honeypots, Social engineering, SQL injection, Session hijacking, Exploiting the network etc. https://bit.ly/2HLpbnz
Vulnerabilities in modern web applicationsNiyas Nazar
Microsoft powerpoint presentation for BTech academic seminar.This seminar discuses about penetration testing, penetration testing tools, web application vulnerabilities, impact of vulnerabilities and security recommendations.
+ Background & Basics of Web App Security, The HTTP Protocol, Web.
+ Application Insecurities, OWASP Top 10 Vulnerabilities (XSS, SQL Injection, CSRF, etc.)
+ Web App Security Tools (Scanners, Fuzzers, etc), Remediation of Web App
+ Vulnerabilities, Web Application Audits and Risk Assessment.
Web Application Security 101 was conducted by:
Vaibhav Gupta, Vishal Ashtana, Sandeep Singh from Null.
Understanding Penetration Testing & its Benefits for OrganizationPECB
This topic will cover the most important part related the penetration testing and the importance of its implementation on the organization. Considering it as a good tool for companies to deal with information security vulnerabilities, it is becoming significant part for companies to develop it.
Main point that will be covered:
• Overview of Penetration Testing
• Purpose of Penetration testing and benefits
• What are the Rules of Engagement (White, Black and Grey Box Testing)
• Penetration Testing and Phases
Presenter:
Christie Oso is Managing Principal Information Security consultant and trainer at Intex IT. She is also responsible for Risk Management, Vulnerability Assessment, and Penetration Testing. She holds certification on CISSP, CISM, CEH, ISO 27001 LA, ISO 27005 Risk Manager,
Link of the recorded session published on YouTube: https://youtu.be/lyqOJmC94vg
Secure web programming plus end users' awareness are the last line of defense against attacks targeted at the corporate systems, particularly web applications, in the era of world-wide web.
Most web application attacks occur through Cross Site Scripting (XSS), and SQL Injection. On the other hand, most web application vulnerabilities arise from weak coding with failure to properly validate users' input, and failure to properly sanitize output while displaying the data to the visitors.
The literature also confirms the following web application weaknesses in 2010: 26% improper output handling, 22% improper input handling, and 15% insufficient authentication, and others.
Abdul Rahman Sherzad, lecturer at Computer Science Faculty of Herat University, and Ph.D. student at Technical University of Berlin gave a presentation at 12th IT conference on Higher Education for Afghanistan in MoHE, and then conducted a seminar at Hariwa Institute of Higher Education in Herat, Afghanistan introducing web application security threats by demonstrating the security problems that exist in corporate systems with a strong emphasis on secure development. Major security vulnerabilities, secure design and coding best practices when designing and developing web-based applications were covered.
The main objective of the presentation was raising awareness about the problems that might occur in web-application systems, as well as secure coding practices and principles. The presentation's aims were to build security awareness for web applications, to discuss the threat landscape and the controls users should use during the software development lifecycle, to introduce attack methods, to discuss approaches for discovering security vulnerabilities, and finally to discuss the basics of secure web development techniques and principles.
Introduction of Ethical Hacking, Life cycle of Hacking, Introduction of Penetration testing, Steps in Penetration Testing, Foot printing Module, Scanning Module, Live Demos on Finding Vulnerabilities a) Bypass Authentication b) Sql Injection c) Cross site Scripting d) File upload Vulnerability (Web Server Hacking) Countermeasures of Securing Web applications
chap-1 : Vulnerabilities in Information SystemsKashfUlHuda1
Introduction to Cyber Security. Chapter #1. Vulnerabilities in Information Systems. What is a vulnerability?
Cyberspace: From terra incognita to terra nullius.
Cyberspace performance expectations. Measuring vulnerabilities. CVSS XCCDF OVAL
Avoiding vulnerabilities through secure coding
Web App Security Presentation by Ryan Holland - 05-31-2017TriNimbus
Web App Security - A presentation by Ryan Holland, Sr. Director, Cloud Architecture at Alert Logic for the Vancouver AWS User Group Meetup on May 31, 2017.
In the ever-evolving, fast-paced Agile development world, application security has not scaled well. Incorporating application security and testing into the current development process is difficult, leading to incomplete tooling or unorthodox stoppages due to the required manual security assessments. Development teams are working with a backlog of stories—stories that are typically focused on features and functionality instead of security. Traditionally, security was viewed as a prevention of progress, but there are ways to incorporate security activities without hindering development. There are many types of security activities you can bake into your current development lifecycles—tooling, assessments, stories, scrums, iterative reviews, repo and bug tracking integrations—every organization has a unique solution and there are positives and negatives to each of them. In this slide deck, we go through the various solutions to help build security into the development process.
For Business's Sake, Let's focus on AppSecLalit Kale
Slide-Deck for session on Application Security at Limerick DotNet-Azure User Group on 15th Feb, 2018
Event URL: https://www.meetup.com/Limerick-DotNet/events/hzctdpyxdbtb/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
1. Vulnerability Assessment and
Penetration Testing
Abu Sadat Mohammed Yasin
Programmer/Asst.Systems Analyst (DD)
Information Systems & Development Department
Bangladesh Bank, Head Office.
2. Introduction
• IT/Computer/Cyber Security.
• Security is a journey and not a destination.
• CIA Triad.
•Confidentiality (being safe
from unauthorized access)
•Integrity (correctness and
comprehensiveness of data)
•Availability (resources are
always available to
authorized user)
3. What Is Vulnerability Assessment and
Penetration Testing?
• Vulnerability
• VAPT are two types of vulnerability testing.
– Vulnerability Assessments
– Penetration Testing
4. Vulnerability Assessment
• Search systems for known vulnerabilities.
• Vulnerability Assessment/Scans/Testing
• It’s a process to probe system from known
vulnerabilities.
5. Process of Vulnerability Assessment
1. Goals & Objectives
2. Scope
1. Black Box Testing
2. White Box Testing
3. Gray Box Testing
3. Information Gathering
4. Vulnerability Detection
5. Information Analysis and Planning
7. Benefits of Vulnerability Assessment
• Some freeware tools are available.
• Identifies almost all known vulnerabilities
• Extremely automated for scanning.
• Easy to run on a regular basis.
8. Weaknesses of Vulnerabilities
Assessment
• Have high false positive rate.
• Easily detect by Intrusion Detection System
firewall.
• Cause a denial of services by generating bulk
of packets.
• Often fail to notice latest vulnerabilities.
9. Tools for Vulnerability Assessment
• OpenVAS
– The scan engine of OpenVAS is updated with the Network
Vulnerability Tests on a regular basis.
– OpenVAS scanner is a complete vulnerability assessment tool that is
used to spot issues related to security in the servers and other devices
of the network.
• Nmap
– Nmap (Network Mapper) is a free and an open source security
scanner used to determine hosts and services on a network by
structuring the map of the computer network.
• Wireshark
– Wireshark has a special feature like it captures the issues online and
performs the analysis offline
– Wireshark has the capability of deeply inspecting many protocols with
further more added all the time.
14. Benefits of Penetration Testing
• Test network or system using the tools and
techniques that attackers use.
• Demonstrate at what depth vulnerabilities can
be exploited.
• Validate vulnerabilities.
• Can provide the realism and evidence needed
to address security issue.
15. Weaknesses of Penetration Testing
• Labor intensive, require great expertise.
• Dangerous when conducted by inexperienced
tester.
• Revel source code to third party.
• Expensive.
• Some tools and methods may be banned by
agency regulation.
• Conducted in limited time period.
• If a service is not tested then there will be no
information about its security or insecurity.
16. Tools for Penetration Testing
• Sqlmap
– detect and exploite SQL injection.
• Kali Linux
– Opensource Operating System including various free tools.
• Aircrack-ng
– analyzing the weaknesses in a WiFi network.
– WEP and WPA-PSK keys, can be cracked by using this tool.
• Netsparker
– Identify vulnerabilities such as SQL Injection and Cross-site Scripting in web
applications and web APIs.
– verifies the identified vulnerabilities proving they are real and not false
positives.
• Metasploit
– One of the most advanced and popular Framework.
– It can be used on web applications, networks, servers etc
– works on Linux, Apple Mac OS X and Microsoft Window
17. Vulnerability Assessment Vs
Penetration Testing
Basis Vulnerability Assessment Penetration Testing
Definition Automatically identify weaknesses
via a software rather than manually.
Penetration testing is a form of stress
testing
which exposes weaknesses.
Strengths Run easily and quickly, freeware or
inexpensive tools available.
Imitate actual attacker process to
extend possible. Expensive, need
special experts.
Scope It will stop just before compromising
a system.
It will go as far as they can within
the scope of the contract.
Task Searches and checks the underlying
design to detect holes.
Intends to exploit the vulnerabilities
to probe the damage that could
result from the VA.
Frequency
At least quarterly, especially after
new equipment is loaded or the
network undergoes significant
changes
Once or twice a year, as well as
anytime the Internet-facing
equipment undergoes significant
changes
18. Vulnerability Assessment Vs
Penetration Testing
Basis VulnerabilityAssessment PenetrationTesting
Focus Lists known software
vulnerabilities that could be
exploited
Discovers unknown and
exploitable weaknesses in normal
business processes
Performed by Typically conducted by in-house
staff using authenticated
credentials; does not require a
high skill level
Best to use an independent
outside service and alternate
between two or three; requires a
great deal of skill
Value Detects when equipment could
be compromised
Identifies and reduces
weaknesses
Report A comprehensive technical
report that includes all identified
vulnerabilities, risk rankings, and
recommended remediation
activites.
A targeted summary narrative
that includes the successful attack
vector and recommended
remediation activities to close
that attack vendor.
19. Reasons for Vulnerability Existence
• Insecure coding practices
• Developer education not focused on security
• Limited testing budget and scope
• Disjoined security processes
• More resources outside than inside
• Misconfigurations
• Not updated.
20. Different Types of Vulnerabilities
• Missing data encryption
• OS command injection
• SQL injection
• Buffer overflow
• Missing authentication for critical function
• Missing authorization
• Unrestricted upload of dangerous file types
• Reliance on untrusted inputs in a security decision
• Cross-site scripting and forgery
• Download of codes without integrity checks
• Use of broken algorithms
• URL redirection to untrusted sites
• Path traversal
• Bugs
• Weak passwords
• Software that is already infected with virus
21. Different Types of Attacks
• Denial-of-service (DoS) and distributed denial-of-
service (DDoS) attacks
• Man-in-the-middle (MitM) attack
• Phishing and spear phishing attacks
• Drive-by attack
• Password attack
• SQL injection attack
• Cross-site scripting (XSS) attack
• Eavesdropping attack
• Birthday attack
• Malware attack
22. How VAPT Conduct
• Cyber Security Research Lab
• Computer Emergency Readiness Team
(CERT)
• Internal & External
• Consultant
• BGD eGov CERT
23. Why?
• ICT Security Policy
• Avoid network downtime due to breach.
• CIA Triad
• Enhancive effectiveness of an overall security
life cycle.
• Provide a strong basis for helping to
determine appropriate security budgets.
Confidentiality (being safe from unauthorized
access) Confidentiality refers to limiting information
access and disclosure to authorized user and
preventing access and disclosure from unauthorized
ones.
Integrity (correctness and comprehensiveness of
data) Integrity refers to the credibility of information
resources. It ensures that data have not been changed
inappropriately either by deliberately or inadvertently
malign activity.
Availability (resources are always available to
authorized user) Availability refers to the
accessibility of the information resources. It ensures
that information must be available to authorized user
when they accessed.
Vulnerability Assessment and Penetration Testing (VAPT) are two types of vulnerability testing. The tests have different strengths and are often combined to achieve a more complete vulnerability analysis. In short, Penetration Testing and Vulnerability Assessments perform two different tasks, usually with different results, within the same area of focus.
"Vulnerabilities are the doorways via which threats
are revealed”. Vulnerabilities are actually weaknesses
in system. A system is any of the following: computer
system, network system, network nodes, routers,
switches and firewalls and network or computer
application. It is the inherit defects in systems, web
applications or even in networks design.
Vulnerabilities are open a door to exploitation.
This generates the possibility for penetration into the
systems that may consequence in unauthorized access
and a compromise of confidentiality, integrity, and
availability of network resources. Vulnerability
testing is a process to probe system from known
vulnerabilities. Vulnerability Assessment is the
process of pinpointing, computing and ranking the
vulnerabilities in the system. In this process, such as
operating systems & application software and
network are scanned in order to identify the
occurrence of well-known and unknown
vulnerabilities. These vulnerabilities are occurs due to
inappropriate software design, insecure authentication
or even much vulnerabilities occurs as a result of
misconfiguration.
1. Goals & Objectives: Defines goals and
objectives of Vulnerabilities analysis.
2. Scope: While performing assessments and tests,
the scope of the assignment needs to be clearly
defined. The scope is based on the assets to be
tested. The following are the three possible
scopes that exist:
Black Box Testing: Testing from an external
network with no prior knowledge of the
internal networks and systems.
Gray Box Testing: Testing from an external
or internal network, with knowledge of the
internal networks and systems. This is
usually a combination of black box testing
and white box testing.
White Box Testing: Performing the test from
within the network with the knowledge of
the network architecture and the systems.
This is also referred to as internal testing.
3. Information Gathering: The process of
information gathering is to obtain as much
information as possible about the IT environment
such as networks, IP addresses, operating system
version, etc. This is applicable to all the three
types of scope as discussed earlier.
4. Vulnerability Detection: In this process, tools
such as vulnerability scanners are used, and
vulnerabilities are identified in the IT
environment by way of scanning.
5. Information Analysis and Planning: This process
is used to analyze the identified vulnerabilities,
combined with the information gathered about
the IT environment, to devise a plan for
penetrating into the network and system.
On the basis of vulnerabilities tool there are three
board categories of vulnerabilities assessment: Host
Based, Network Based, and Database based.
1. Host Based: Host Based VA identify an issue
particular to an individual host or system. It is carried
out via a host based scanner and able to diagnose
system-level vulnerabilities. The host based tools
load mediator software onto the target system that
traces the events and reports it to the security analyst.
2. Network Based: Network Based VA detect open
ports, identify unknown services running on these
ports and disclose possible vulnerabilities associated
with these service. This is done via a network based
scanners, reside on the network to detect
vulnerabilities.
3. Database Based: Database Based VA identify
security exposures in database systems using tools
and techniques to prevent from SQL- Injections
exploit, can read sensitive data from the database and
provides patch & update the DBMS.
The purpose of penetration testing is to determine whether a detected vulnerability is genuine. If a pentester manages to exploit a potentially vulnerable spot, he or she considers it genuine and reflects it in the report. The report can also show unexploitable vulnerabilities as theoretical findings. Don’t confuse these theoretical findings with false-positives. Theoretical vulnerabilities threaten the network but it’s a bad idea to exploit them as this will lead to DoS.
Penetration testing is more of an art than a science
[8]. It is the process of trying to gain unauthorized
access to authorized resources. Penetration testing is
also known as an ethical hacking as “breaking into
your own system to see how hard it is to do.” It is a
main branch of network security evaluation, which
aims at providing analysis to discover the
vulnerabilities and security threats in systems and
networks. The purpose of penetration testing is to
recognize technique of gaining access to a system by
using common tools and techniques developed by
hackers. After vulnerability assessments, which is
are used to identify and inventory various exposures
within the organization’s systems. Penetration testing
attempts to exploit any one of the vulnerabilities to
gain unauthorized access.
Penetration testing methodology includes three types:
1. A zero-knowledge Test: Penetration test team has
no real information about the target environment.
2. A full knowledge test: The client organisation
provides full information to test team.
3. A partial knowledge Test: Penetration test team
has partial information about the target
environment.
Scope test Plan: In first step we narrow the
scope of our test to what is meaningful to the
client.
Identify Potential Vulnerabilities: In this step
potential vulnerabilities are identified by using
some tools. As vulnerabilities are identified then
vulnerabilities are patched.
2. Attempt Vulnerability Exploitation: In this step,
we find out the greatest possible advantage that
we can take from vulnerabilities .The assigned
security analyst utilizes a set of tools to exploit
and gain access to key systems (core servers,
domain controllers, e-mail platforms, ERP, and
ERM systems, etc.)
3. Document Finding: While testing in-scope
systems, the analyst documents all test findings
within the Frontline Services Platform (FSP), a
secure multi-function portal that allows clients
to receive centralized and standardized
reporting functionality.
4. Provide Detailed and Remediation Steps: At
completion of previous step, the client is
provided full executive and technical reporting
via the FSP client portal, Frontline. Clients can
optionally contract for access to a workflow
management tool that is also available with
Frontline. This tool enables you to efficiently
manage and track remediation of the penetration
test findings.
5. Populate Workflow Management Portal: Now
clients can take advantage of the integrated
workflow management tool to quickly and
effectively deal with discovered issues.
1. External Testing: It includes Internet and
Dial-in. In internet, attack on the target
network from outside the network. In Dial-
in, War dialing is the systematic calling of
each number in the number in the target rang
in search of listening modems.
2. Internal Testing: It is performed from
inside the network. The goal is to ascertain
the internal network topology which gives
the mapping of the critical access path.