SlideShare a Scribd company logo

Penetration testing

Ammar WK
Ammar WKProfessional Bandwidth hunter at Inside your Machine
SECURITY PENETRATION
       TESTING
 TEKNIS PELATIHAN KEAMANAN INFORMASI




                              AHMAD MUAMMAR !(C)2011 | @Y3DIPS
AGENDA


SECURITY ASSESSMENT

 VULNERABILITY ASSESSMENT

 SECURITY AUDIT

 PENETRATION TESTING

 VA V.S PENTEST

 PENTEST V.S SYSTEM AUDIT



                            AHMAD MUAMMAR !(C)2011 | @Y3DIPS
AGENDA

PENETRATION TESTING

  TYPE

  SCOPE (AREA)

  LIMITATIONS

PENETRATION TESTING

  METHODOLOGIES

  WELL KNOWN STANDARD


                          AHMAD MUAMMAR !(C)2011 | @Y3DIPS
SECURITY ASSESSMENT


IS A WAY TO VALIDATE/CHECK THE LEVEL OF SECURITY
ON EVERY ASPECT OF IT INFRASTRUCTURE.

ALSO TO ENSURE THAT NECESSARY SECURITY
CONTROLS ARE INTEGRATED INTO THE DESIGN AND
IMPLEMENTATION.

TO PREPARE FOR BETTER ENHANCEMENT




                                    AHMAD MUAMMAR !(C)2011 | @Y3DIPS
SECURITY ASSESSMENT

VULNERABILITY ASSESSMENT

 A VULNERABILITY ASSESSMENT IS USUALLY
 CARRIED OUT BY SECURITY VULNERABILITY SCANNER
 APPLICATION. MOST OF THE PRODUCT TEST TYPE OF
 OPERATING SYSTEM, APPLICATION, PATCH LEVEL,
 USER ACCOUNT AND ELSE.

 VULNERABILITY SCANNER IDENTIFY COMMON
 SECURITY CONFIGURATION MISTAKES AND COMMON
 ATTACK



                                 AHMAD MUAMMAR !(C)2011 | @Y3DIPS
SECURITY ASSESSMENT


SECURITY AUDIT

  MOST PART ARE CHECKLIST-BASED (CORPORATE
  SECURITY POLICICES OR REGULATION STANDARDS
  (ISO) OR PBI)

  IMPORTANT FOR BEING COMPLIED WITH SECURITY
  POLICIES, LEGISLATION AND STANDARDS

  E.G: IS THERE ANY BACKUPS? ANTIVIRUS?




                                    AHMAD MUAMMAR !(C)2011 | @Y3DIPS
SECURITY ASSESSMENT



PENETRATION TESTING

  IS WHEN A “HACKER” DO THE ATTACKER WORK.

  THE ONLY GOAL IS TO GET AS MUCH AS POSSIBLE
  AND AS DEEP AS POSSIBLE TO BREAK INTO THE
  SYSTEM.




                                   AHMAD MUAMMAR !(C)2011 | @Y3DIPS
VA V.S PENTEST




VULNERABILITY ASSESSMENT IDENTIFIES THE
“POSSIBLE” VULNERABILITIES (ALSO FALSE POSITIVE)

PENETRATION TESTING VALIDATES THE VULNERABILITY




                                    AHMAD MUAMMAR !(C)2011 | @Y3DIPS
PENTEST V.S SECURITY AUDITS



SECURITY AUDITS IMPORTANT FOR BEING COMPLIED
WITH SECURITY POLICIES, LEGISLATION AND
STANDARDS

PENTEST COMPLEMENT SYSTEM AUDITS AND HELP TO
FIX SECURITY THREAT BEFORE AN ATTACKER
DISCOVERS IT




                                   AHMAD MUAMMAR !(C)2011 | @Y3DIPS
PENETRATION TESTING



CHECK SENSITIVE INFORMATION AVAILABLE

CHECK WHAT KIND OF PRIVILEGES PENTESTER GAIN

CHECK IF POSSIBLE TO ESCALATE PRIVILEGES

CHECK IF VULNERABILITY CAN LEAD TO MORE EXPLOITS
(ANOTHER APPLICATION, SYSTEM, OR SERVER)




                                    AHMAD MUAMMAR !(C)2011 | @Y3DIPS
PENETRATION TESTING

TYPE OF PENETRATION TESTING:

  BLACK BOX: 0 INFORMATION ABOUT THE SYSTEM,
  MAYBE ONLY THE IP/DOMAIN NAME. FULL ATTACKER
  PERSPECTIVE

  GRAY BOX: PARTIAL INFORMATION ABOUT A SYSTEM,
  SIMULATE ATTACK BY EMPLOYEE, VENDORS.

  WHITE BOX: SIGNIFICANT INFORMATION ABOUT A
  SYSTEM, SOURCE CODE/CONFIGURATION REVIEW.



                                   AHMAD MUAMMAR !(C)2011 | @Y3DIPS
PENETRATION TESTING

NETWORK INFRASTRUCTURE PENTEST

  WIFI, VOIP, TELEPHONE

APPLICATION INFRASTRUCTURE PENTEST

  WEB, MOBILE

SYSTEM INFRASTRUCTURE PENTEST

PHYSICAL SECURITY

SOCIAL ENGINEETING (PEOPLE)


                                     AHMAD MUAMMAR !(C)2011 | @Y3DIPS
PENETRATION TESTING



MOST LIMITATIONS

  TIME

  SKILLED

  ACCESS TO EQUIPMENT




                        AHMAD MUAMMAR !(C)2011 | @Y3DIPS
PENETRATION TESTING



METHODOLOGY

 A GUIDELINE FOR SOLVING A PROBLEM, WITH SPECIFIC
 COMPONENTS SUCH AS PHASES, TASKS, METHODS,
 TECHNIQUES AND TOOLS




                                   AHMAD MUAMMAR !(C)2011 | @Y3DIPS
PENETRATION TESTING

WELL KNOWN STANDARD




                                                !




                      AHMAD MUAMMAR !(C)2011 | @Y3DIPS
PENETRATION TESTING




SOURCE: ISSAF

                                AHMAD MUAMMAR !(C)2011 | @Y3DIPS
PENETRATION TESTING




          INFORMATION GATHERING : USING ALL RESOURCES
          (INTERNET) TO FIND ALL THE INFORMATION ABOUT
          TARGET, USING TECHNICAL AND NON-TEHCNICAL
          METHODS




SOURCE: ISSAF

                                            AHMAD MUAMMAR !(C)2011 | @Y3DIPS
INFORMATION GATHERING


NON TECHNICAL

SEARCH COMPANY INFO ON SOCIAL NETWORK :
LINKEDIN.COM, FACEBOOK

SEARCH KEY PERSONAL ACTIVITY: ADMINISTRATOR,
PROGRAMMER

GOOGLE HACKING




                                   AHMAD MUAMMAR !(C)2011 | @Y3DIPS
HANDS ON




INFORMATION GATHERING VIA SOCIAL NETWORK

INFORMATION GATHERING VIA GOOGLE HACKING




                                  AHMAD MUAMMAR !(C)2011 | @Y3DIPS
INFORMATION GATHERING




TECHNICAL

USING DIG. NSLOOKUP, WHOIS TO FIND INFORMATION




                                    AHMAD MUAMMAR !(C)2011 | @Y3DIPS
HANDS ON




INFORMATION GATHERING USING DIG

INFORMATION GATHERING USING WHOIS




                                    AHMAD MUAMMAR !(C)2011 | @Y3DIPS
PENETRATION TESTING



          NETWORK MAPPING: FOOTPRINT THE NETWORK AND
          RESOURCES THAT ALREADY GATHER FROM
          INFORMATION GATHERING. E.G: FIND LIVE HOST, PORT
          AND SERVICE, NETWORK PERIMETER, OS AND SERVICE
          FINGERPRINTING




SOURCE: ISSAF

                                              AHMAD MUAMMAR !(C)2011 | @Y3DIPS
NETWORK MAPPING




          TOOLS: NMAP, TRACEROUTE, PING

          MENCOBA NMAP, TRACEROUTE




SOURCE: ISSAF

                                          AHMAD MUAMMAR !(C)2011 | @Y3DIPS
HANDS ON




           AHMAD MUAMMAR !(C)2011 | @Y3DIPS
HANDS ON




           AHMAD MUAMMAR !(C)2011 | @Y3DIPS
PENETRATION TESTING



          VULNERABILITY IDENTIFICATION : IDENTIFY ALL
          SERVICES VULNERABILITY (BASED ON VERSION/
          BANNER), USING VULNERABILITY SCAN, IDENTIFY
          ATTACK PATH

                TOOLS: NMAP, NESSUS




SOURCE: ISSAF

                                              AHMAD MUAMMAR !(C)2011 | @Y3DIPS
HANDS ON




NMAP -SV (DETECT OPEN PORT WITH SERVICE INFO
(VERSION))

NMAP -O (DETECT POSSIBLE OS)




                                    AHMAD MUAMMAR !(C)2011 | @Y3DIPS
PENETRATION TESTING




          PENETRATION: TRY TO GAIN UNAUTHORIZED ACCESS BY
          CIRCUMVENTING THE SECURITY MEASURES TO GET
          ACCESS,. E.G: FIND POC, CREATE TOOLS, TESTING




SOURCE: ISSAF

                                            AHMAD MUAMMAR !(C)2011 | @Y3DIPS
PENETRATION TESTING


          GAINING ACCESS AND PRIVILEGES : GAINING LEAST
          PRIVILEGE BY DEFAULT USER OR PASSWORD, DEFAULT
          SETTINGS, PUBLIC SERVICES, TRY TO ESCALATE
          PRIVILEGES TO SUPERIOR LEVEL (ADMINISTRATOR/
          ROOT)

                USING/CREATING EXPLOIT

                OR METASPLOIT (FREE) , IMMUNITY CANVAS, CORE
                IMPACT



SOURCE: ISSAF

                                                  AHMAD MUAMMAR !(C)2011 | @Y3DIPS
HANDS ON




USING METASPLOIT

USING LOCAL EXPLOIT TO GAIN HIGHER LEVEL
PRIVILEGES




                                    AHMAD MUAMMAR !(C)2011 | @Y3DIPS
PENETRATION TESTING




          ENUMERATING FURTHER: OBTAIN PASSWORD
          (PASSWORD FILE (/ETC/SHADOW, SAM), USER
          DATABASE), SNIFFING NETWORK, MAPPING INTERNAL
          NETWORK




SOURCE: ISSAF

                                            AHMAD MUAMMAR !(C)2011 | @Y3DIPS
HANDS ON




CRACKING PASSWORD FILE




                         AHMAD MUAMMAR !(C)2011 | @Y3DIPS
PENETRATION TESTING




          COMPROMISE REMOTE USERS/SITES: (IF POSSIBLE) TRY
          TO COMPROMISE REMOTE USER (VPN USERS) TO GET
          PRIVILEGE TO INTERNAL NETWORK




SOURCE: ISSAF

                                             AHMAD MUAMMAR !(C)2011 | @Y3DIPS
PENETRATION TESTING




          MAINTAINING ACCESS: OFTEN NOT PERFORM

          COVERING TRACKS: OFTEN NOT PERFORM




SOURCE: ISSAF

                                               AHMAD MUAMMAR !(C)2011 | @Y3DIPS
PENETRATION TESTING



VALUE IS ON THE REPORT

PENETRATION TESTING SERVICE LEVEL AGREEMENT

  NON DISCLOSURE AGREEMENT

THERE ARE ALWAYS A RISK, E.G : SYSTEM DOWN/
CRASH DURING PENTEST, SLOWDOWN NETWORK




                                   AHMAD MUAMMAR !(C)2011 | @Y3DIPS
1 of 35

Penetration testing

Download to read offline

Technical workshop about Penetration Testing for BPPT

Ammar WK
Ammar WKProfessional Bandwidth hunter at Inside your Machine

Recommended

Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applicationsNiyas Nazar
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingAmine SAIGHI
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghOWASP Delhi
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingNetsparker
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingNezar Alazzabi
 
Reconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awarenessReconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awarenessLeon Teale
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing ExplainedRand W. Hirt
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingAnurag Srivastava
 

More Related Content

What's hot

Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & TestingDeepu S Nath
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chainSymantec Brasil
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopDigit Oktavianto
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanningamiable_indian
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Amit Tyagi
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and AnalysisPrashant Chopra
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...ABHAY PATHAK
 
OWASP Top 10 2021 What's New
OWASP Top 10 2021 What's NewOWASP Top 10 2021 What's New
OWASP Top 10 2021 What's NewMichael Furman
 
OWASP Top 10 2021 Presentation (Jul 2022)
OWASP Top 10 2021 Presentation (Jul 2022)OWASP Top 10 2021 Presentation (Jul 2022)
OWASP Top 10 2021 Presentation (Jul 2022)TzahiArabov
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made SimplePaul Melson
 
Vapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesAkshay Kurhade
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
Thick client pentesting_the-hackers_meetup_version1.0pptx
Thick client pentesting_the-hackers_meetup_version1.0pptxThick client pentesting_the-hackers_meetup_version1.0pptx
Thick client pentesting_the-hackers_meetup_version1.0pptxAnurag Srivastava
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017TriNimbus
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operationsSunny Neo
 

What's hot (20)

Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & Testing
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanning
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
OWASP Top 10 2021 What's New
OWASP Top 10 2021 What's NewOWASP Top 10 2021 What's New
OWASP Top 10 2021 What's New
 
OWASP Top 10 2021 Presentation (Jul 2022)
OWASP Top 10 2021 Presentation (Jul 2022)OWASP Top 10 2021 Presentation (Jul 2022)
OWASP Top 10 2021 Presentation (Jul 2022)
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made Simple
 
Cyber security
Cyber securityCyber security
Cyber security
 
Vapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) services
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Thick client pentesting_the-hackers_meetup_version1.0pptx
Thick client pentesting_the-hackers_meetup_version1.0pptxThick client pentesting_the-hackers_meetup_version1.0pptx
Thick client pentesting_the-hackers_meetup_version1.0pptx
 
DDOS Attack
DDOS Attack DDOS Attack
DDOS Attack
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operations
 

Viewers also liked

Geek Moot '09 -- Smarty 101
Geek Moot '09 -- Smarty 101Geek Moot '09 -- Smarty 101
Geek Moot '09 -- Smarty 101Ted Kulp
 
Apache Web Server Architecture Chaitanya Kulkarni
Apache Web Server Architecture Chaitanya KulkarniApache Web Server Architecture Chaitanya Kulkarni
Apache Web Server Architecture Chaitanya Kulkarniwebhostingguy
 
세션 하이재킹
세션 하이재킹세션 하이재킹
세션 하이재킹Yu Yongwoo
 
Testing RESTful web services with REST Assured
Testing RESTful web services with REST AssuredTesting RESTful web services with REST Assured
Testing RESTful web services with REST AssuredBas Dijkstra
 
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedWeb Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedPort80 Software
 
Telecommunication system
Telecommunication systemTelecommunication system
Telecommunication systemJamilah Abbas
 
Web (HTTP) request to response life cycle
Web (HTTP) request to response life cycleWeb (HTTP) request to response life cycle
Web (HTTP) request to response life cycleGopakumar Kunduveetil
 
Hacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedHacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedSiddharth Bhattacharya
 
Web Cookies
Web CookiesWeb Cookies
Web Cookiesapwebco
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniquesamiable_indian
 

Viewers also liked (20)

Geek Moot '09 -- Smarty 101
Geek Moot '09 -- Smarty 101Geek Moot '09 -- Smarty 101
Geek Moot '09 -- Smarty 101
 
Web Server
Web ServerWeb Server
Web Server
 
Apache Web Server Architecture Chaitanya Kulkarni
Apache Web Server Architecture Chaitanya KulkarniApache Web Server Architecture Chaitanya Kulkarni
Apache Web Server Architecture Chaitanya Kulkarni
 
Cmsms, open source & business model
Cmsms, open source & business modelCmsms, open source & business model
Cmsms, open source & business model
 
세션 하이재킹
세션 하이재킹세션 하이재킹
세션 하이재킹
 
Nmap scripting engine
Nmap scripting engineNmap scripting engine
Nmap scripting engine
 
Testing RESTful web services with REST Assured
Testing RESTful web services with REST AssuredTesting RESTful web services with REST Assured
Testing RESTful web services with REST Assured
 
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedWeb Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting Started
 
Telecommunication system
Telecommunication systemTelecommunication system
Telecommunication system
 
Web (HTTP) request to response life cycle
Web (HTTP) request to response life cycleWeb (HTTP) request to response life cycle
Web (HTTP) request to response life cycle
 
Smarty sharing-2
Smarty sharing-2Smarty sharing-2
Smarty sharing-2
 
Hacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedHacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques Used
 
Web Cookies
Web CookiesWeb Cookies
Web Cookies
 
Cookie and session
Cookie and sessionCookie and session
Cookie and session
 
Sessions and cookies
Sessions and cookiesSessions and cookies
Sessions and cookies
 
Web Server Hardening
Web Server HardeningWeb Server Hardening
Web Server Hardening
 
Mvc architecture
Mvc architectureMvc architecture
Mvc architecture
 
Cookies and sessions
Cookies and sessionsCookies and sessions
Cookies and sessions
 
REST & RESTful Web Services
REST & RESTful Web ServicesREST & RESTful Web Services
REST & RESTful Web Services
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
 

Similar to Penetration testing

Network security
Network securityNetwork security
Network securityAmmar WK
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSSylvain Martinez
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
ELITE.BCS-Cloud-and-Mobile-Risk-Assessments
ELITE.BCS-Cloud-and-Mobile-Risk-AssessmentsELITE.BCS-Cloud-and-Mobile-Risk-Assessments
ELITE.BCS-Cloud-and-Mobile-Risk-AssessmentsJames '​-- Mckinlay
 
Black Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck by Synopsys
 
Secure Systems of Engagement
Secure Systems of EngagementSecure Systems of Engagement
Secure Systems of EngagementJohn Palfreyman
 
BlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow upBlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow upBlueHat Security Conference
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaAngeloluca Barba
 
Tracxn - Enterprise Security Startup Landscape
Tracxn - Enterprise Security Startup LandscapeTracxn - Enterprise Security Startup Landscape
Tracxn - Enterprise Security Startup LandscapeTracxn
 
Ixia Customer Presentation
Ixia Customer PresentationIxia Customer Presentation
Ixia Customer PresentationGilles Lejeune
 
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...ForgeRock
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuNixu Corporation
 
Android ieee project titles 2015 2016
Android ieee project titles 2015 2016Android ieee project titles 2015 2016
Android ieee project titles 2015 2016SHPINE TECHNOLOGIES
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesSkycure
 
OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure! OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure! Prathan Phongthiproek
 
apidays LIVE Singapore - Why verifying user identity Is not enough In 2021 by...
apidays LIVE Singapore - Why verifying user identity Is not enough In 2021 by...apidays LIVE Singapore - Why verifying user identity Is not enough In 2021 by...
apidays LIVE Singapore - Why verifying user identity Is not enough In 2021 by...apidays
 
Opportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataOpportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataEMC
 
Mobile Application Assessment - Don't Cheat Yourself
Mobile Application Assessment - Don't Cheat YourselfMobile Application Assessment - Don't Cheat Yourself
Mobile Application Assessment - Don't Cheat YourselfDenim Group
 

Similar to Penetration testing (20)

Network security
Network securityNetwork security
Network security
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICS
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
ELITE.BCS-Cloud-and-Mobile-Risk-Assessments
ELITE.BCS-Cloud-and-Mobile-Risk-AssessmentsELITE.BCS-Cloud-and-Mobile-Risk-Assessments
ELITE.BCS-Cloud-and-Mobile-Risk-Assessments
 
Black Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open Source
 
Secure Systems of Engagement
Secure Systems of EngagementSecure Systems of Engagement
Secure Systems of Engagement
 
BlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow upBlueHat v18 || Dep for the app layer - time for app sec to grow up
BlueHat v18 || Dep for the app layer - time for app sec to grow up
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
Tracxn - Enterprise Security Startup Landscape
Tracxn - Enterprise Security Startup LandscapeTracxn - Enterprise Security Startup Landscape
Tracxn - Enterprise Security Startup Landscape
 
Icc2009
Icc2009Icc2009
Icc2009
 
Ixia Customer Presentation
Ixia Customer PresentationIxia Customer Presentation
Ixia Customer Presentation
 
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo Nixu
 
Android ieee project titles 2015 2016
Android ieee project titles 2015 2016Android ieee project titles 2015 2016
Android ieee project titles 2015 2016
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile Devices
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure! OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure!
 
apidays LIVE Singapore - Why verifying user identity Is not enough In 2021 by...
apidays LIVE Singapore - Why verifying user identity Is not enough In 2021 by...apidays LIVE Singapore - Why verifying user identity Is not enough In 2021 by...
apidays LIVE Singapore - Why verifying user identity Is not enough In 2021 by...
 
Opportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataOpportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big Data
 
Mobile Application Assessment - Don't Cheat Yourself
Mobile Application Assessment - Don't Cheat YourselfMobile Application Assessment - Don't Cheat Yourself
Mobile Application Assessment - Don't Cheat Yourself
 

More from Ammar WK

Vvdp-fgd-bssn
Vvdp-fgd-bssnVvdp-fgd-bssn
Vvdp-fgd-bssnAmmar WK
 
Pen-testing is Dead?
Pen-testing is Dead?Pen-testing is Dead?
Pen-testing is Dead?Ammar WK
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsAmmar WK
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!Ammar WK
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryAmmar WK
 
Bugbounty vs-0day
Bugbounty vs-0dayBugbounty vs-0day
Bugbounty vs-0dayAmmar WK
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent ThreatAmmar WK
 
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareMobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareAmmar WK
 
Hacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteHacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteAmmar WK
 
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingIntroduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingAmmar WK
 
Burp suite
Burp suiteBurp suite
Burp suiteAmmar WK
 
Web Hacking (basic)
Web Hacking (basic)Web Hacking (basic)
Web Hacking (basic)Ammar WK
 
Network Packet Analysis
Network Packet AnalysisNetwork Packet Analysis
Network Packet AnalysisAmmar WK
 
Packet analysis (Basic)
Packet analysis (Basic)Packet analysis (Basic)
Packet analysis (Basic)Ammar WK
 
Information Security Professional
Information Security ProfessionalInformation Security Professional
Information Security ProfessionalAmmar WK
 
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsHandout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsAmmar WK
 
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationLayer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationAmmar WK
 
How To Become A Hacker
How To Become A HackerHow To Become A Hacker
How To Become A HackerAmmar WK
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?Ammar WK
 
idsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkidsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkAmmar WK
 

More from Ammar WK (20)

Vvdp-fgd-bssn
Vvdp-fgd-bssnVvdp-fgd-bssn
Vvdp-fgd-bssn
 
Pen-testing is Dead?
Pen-testing is Dead?Pen-testing is Dead?
Pen-testing is Dead?
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
 
Bugbounty vs-0day
Bugbounty vs-0dayBugbounty vs-0day
Bugbounty vs-0day
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent Threat
 
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareMobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
 
Hacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteHacker? : it's not about Black or White
Hacker? : it's not about Black or White
 
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingIntroduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration Testing
 
Burp suite
Burp suiteBurp suite
Burp suite
 
Web Hacking (basic)
Web Hacking (basic)Web Hacking (basic)
Web Hacking (basic)
 
Network Packet Analysis
Network Packet AnalysisNetwork Packet Analysis
Network Packet Analysis
 
Packet analysis (Basic)
Packet analysis (Basic)Packet analysis (Basic)
Packet analysis (Basic)
 
Information Security Professional
Information Security ProfessionalInformation Security Professional
Information Security Professional
 
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsHandout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dips
 
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationLayer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigation
 
How To Become A Hacker
How To Become A HackerHow To Become A Hacker
How To Become A Hacker
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
 
idsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkidsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 network
 

Recently uploaded

Global Lighthouse Network - 2019
Global Lighthouse Network - 2019Global Lighthouse Network - 2019
Global Lighthouse Network - 2019Marcio Venturelli
 
ITSP Lesson 5 - Intellectual Property Rights.pdf
ITSP Lesson 5 - Intellectual Property Rights.pdfITSP Lesson 5 - Intellectual Property Rights.pdf
ITSP Lesson 5 - Intellectual Property Rights.pdfROWELL MARQUINA
 
Analysis of algorithms
Analysis of algorithmsAnalysis of algorithms
Analysis of algorithmsAsen Bozhilov
 
UX Challenge User Interview - Check it out.pdf
UX Challenge User Interview - Check it out.pdfUX Challenge User Interview - Check it out.pdf
UX Challenge User Interview - Check it out.pdfsamsung664872
 
Leveraging logging for threat detection.pptx
Leveraging logging for threat detection.pptxLeveraging logging for threat detection.pptx
Leveraging logging for threat detection.pptxChristian Bassey
 
Global Lighthouse Network - 2022
Global Lighthouse Network - 2022Global Lighthouse Network - 2022
Global Lighthouse Network - 2022Marcio Venturelli
 
Salesforce Developer Toolkit - Salesforce Impact Hackathon
Salesforce Developer Toolkit - Salesforce Impact HackathonSalesforce Developer Toolkit - Salesforce Impact Hackathon
Salesforce Developer Toolkit - Salesforce Impact Hackathonrohitasare71
 
Global Lighthouse Network - 2023
Global Lighthouse Network - 2023Global Lighthouse Network - 2023
Global Lighthouse Network - 2023Marcio Venturelli
 
Breakthrough in Long-Range Drone Inspection.pdf
Breakthrough in Long-Range Drone Inspection.pdfBreakthrough in Long-Range Drone Inspection.pdf
Breakthrough in Long-Range Drone Inspection.pdfveroniquelapierre
 
Fundamentals of BI Report Testing - Module 2
Fundamentals of BI Report Testing - Module 2Fundamentals of BI Report Testing - Module 2
Fundamentals of BI Report Testing - Module 2MichaelCalabrese20
 
Fundamentals of BI Report Testing - Module 3
Fundamentals of BI Report Testing - Module 3Fundamentals of BI Report Testing - Module 3
Fundamentals of BI Report Testing - Module 3MichaelCalabrese20
 
Custom Software Development Company in California | Ditstek
Custom Software Development Company in California | DitstekCustom Software Development Company in California | Ditstek
Custom Software Development Company in California | DitstekDitstekInnovations
 
ML Paper Tutorial - Video Face Manipulation Detection Through Ensemble of CNN...
ML Paper Tutorial - Video Face Manipulation Detection Through Ensemble of CNN...ML Paper Tutorial - Video Face Manipulation Detection Through Ensemble of CNN...
ML Paper Tutorial - Video Face Manipulation Detection Through Ensemble of CNN...Pei-Yuan Chien
 
3 Pitfalls Everyone Should Avoid with Cloud Native Observability
3 Pitfalls Everyone Should Avoid with Cloud Native Observability3 Pitfalls Everyone Should Avoid with Cloud Native Observability
3 Pitfalls Everyone Should Avoid with Cloud Native ObservabilityEric D. Schabell
 
Webinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project Management
Webinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project ManagementWebinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project Management
Webinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project ManagementInflectra
 
Fundamentals of BI Report Testing - Module 7
Fundamentals of BI Report Testing - Module 7Fundamentals of BI Report Testing - Module 7
Fundamentals of BI Report Testing - Module 7MichaelCalabrese20
 
Upgrade to 3.1 Planning.pdf
Upgrade to 3.1 Planning.pdfUpgrade to 3.1 Planning.pdf
Upgrade to 3.1 Planning.pdfMarna Walle
 
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...corphedge274
 
Forms for All: Building Accessibility into UiPath App Design
Forms for All: Building Accessibility into UiPath App DesignForms for All: Building Accessibility into UiPath App Design
Forms for All: Building Accessibility into UiPath App DesignDianaGray10
 

Recently uploaded (20)

Global Lighthouse Network - 2019
Global Lighthouse Network - 2019Global Lighthouse Network - 2019
Global Lighthouse Network - 2019
 
ITSP Lesson 5 - Intellectual Property Rights.pdf
ITSP Lesson 5 - Intellectual Property Rights.pdfITSP Lesson 5 - Intellectual Property Rights.pdf
ITSP Lesson 5 - Intellectual Property Rights.pdf
 
Analysis of algorithms
Analysis of algorithmsAnalysis of algorithms
Analysis of algorithms
 
UX Challenge User Interview - Check it out.pdf
UX Challenge User Interview - Check it out.pdfUX Challenge User Interview - Check it out.pdf
UX Challenge User Interview - Check it out.pdf
 
Leveraging logging for threat detection.pptx
Leveraging logging for threat detection.pptxLeveraging logging for threat detection.pptx
Leveraging logging for threat detection.pptx
 
Global Lighthouse Network - 2022
Global Lighthouse Network - 2022Global Lighthouse Network - 2022
Global Lighthouse Network - 2022
 
Salesforce Developer Toolkit - Salesforce Impact Hackathon
Salesforce Developer Toolkit - Salesforce Impact HackathonSalesforce Developer Toolkit - Salesforce Impact Hackathon
Salesforce Developer Toolkit - Salesforce Impact Hackathon
 
Global Lighthouse Network - 2023
Global Lighthouse Network - 2023Global Lighthouse Network - 2023
Global Lighthouse Network - 2023
 
Breakthrough in Long-Range Drone Inspection.pdf
Breakthrough in Long-Range Drone Inspection.pdfBreakthrough in Long-Range Drone Inspection.pdf
Breakthrough in Long-Range Drone Inspection.pdf
 
Fundamentals of BI Report Testing - Module 2
Fundamentals of BI Report Testing - Module 2Fundamentals of BI Report Testing - Module 2
Fundamentals of BI Report Testing - Module 2
 
Fundamentals of BI Report Testing - Module 3
Fundamentals of BI Report Testing - Module 3Fundamentals of BI Report Testing - Module 3
Fundamentals of BI Report Testing - Module 3
 
Custom Software Development Company in California | Ditstek
Custom Software Development Company in California | DitstekCustom Software Development Company in California | Ditstek
Custom Software Development Company in California | Ditstek
 
ML Paper Tutorial - Video Face Manipulation Detection Through Ensemble of CNN...
ML Paper Tutorial - Video Face Manipulation Detection Through Ensemble of CNN...ML Paper Tutorial - Video Face Manipulation Detection Through Ensemble of CNN...
ML Paper Tutorial - Video Face Manipulation Detection Through Ensemble of CNN...
 
3 Pitfalls Everyone Should Avoid with Cloud Native Observability
3 Pitfalls Everyone Should Avoid with Cloud Native Observability3 Pitfalls Everyone Should Avoid with Cloud Native Observability
3 Pitfalls Everyone Should Avoid with Cloud Native Observability
 
Webinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project Management
Webinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project ManagementWebinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project Management
Webinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project Management
 
Fundamentals of BI Report Testing - Module 7
Fundamentals of BI Report Testing - Module 7Fundamentals of BI Report Testing - Module 7
Fundamentals of BI Report Testing - Module 7
 
Upgrade to 3.1 Planning.pdf
Upgrade to 3.1 Planning.pdfUpgrade to 3.1 Planning.pdf
Upgrade to 3.1 Planning.pdf
 
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
 
Tools for kubernetes network debugging
Tools for kubernetes network debuggingTools for kubernetes network debugging
Tools for kubernetes network debugging
 
Forms for All: Building Accessibility into UiPath App Design
Forms for All: Building Accessibility into UiPath App DesignForms for All: Building Accessibility into UiPath App Design
Forms for All: Building Accessibility into UiPath App Design
 

Penetration testing

  • 1. SECURITY PENETRATION TESTING TEKNIS PELATIHAN KEAMANAN INFORMASI AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 2. AGENDA SECURITY ASSESSMENT VULNERABILITY ASSESSMENT SECURITY AUDIT PENETRATION TESTING VA V.S PENTEST PENTEST V.S SYSTEM AUDIT AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 3. AGENDA PENETRATION TESTING TYPE SCOPE (AREA) LIMITATIONS PENETRATION TESTING METHODOLOGIES WELL KNOWN STANDARD AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 4. SECURITY ASSESSMENT IS A WAY TO VALIDATE/CHECK THE LEVEL OF SECURITY ON EVERY ASPECT OF IT INFRASTRUCTURE. ALSO TO ENSURE THAT NECESSARY SECURITY CONTROLS ARE INTEGRATED INTO THE DESIGN AND IMPLEMENTATION. TO PREPARE FOR BETTER ENHANCEMENT AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 5. SECURITY ASSESSMENT VULNERABILITY ASSESSMENT A VULNERABILITY ASSESSMENT IS USUALLY CARRIED OUT BY SECURITY VULNERABILITY SCANNER APPLICATION. MOST OF THE PRODUCT TEST TYPE OF OPERATING SYSTEM, APPLICATION, PATCH LEVEL, USER ACCOUNT AND ELSE. VULNERABILITY SCANNER IDENTIFY COMMON SECURITY CONFIGURATION MISTAKES AND COMMON ATTACK AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 6. SECURITY ASSESSMENT SECURITY AUDIT MOST PART ARE CHECKLIST-BASED (CORPORATE SECURITY POLICICES OR REGULATION STANDARDS (ISO) OR PBI) IMPORTANT FOR BEING COMPLIED WITH SECURITY POLICIES, LEGISLATION AND STANDARDS E.G: IS THERE ANY BACKUPS? ANTIVIRUS? AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 7. SECURITY ASSESSMENT PENETRATION TESTING IS WHEN A “HACKER” DO THE ATTACKER WORK. THE ONLY GOAL IS TO GET AS MUCH AS POSSIBLE AND AS DEEP AS POSSIBLE TO BREAK INTO THE SYSTEM. AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 8. VA V.S PENTEST VULNERABILITY ASSESSMENT IDENTIFIES THE “POSSIBLE” VULNERABILITIES (ALSO FALSE POSITIVE) PENETRATION TESTING VALIDATES THE VULNERABILITY AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 9. PENTEST V.S SECURITY AUDITS SECURITY AUDITS IMPORTANT FOR BEING COMPLIED WITH SECURITY POLICIES, LEGISLATION AND STANDARDS PENTEST COMPLEMENT SYSTEM AUDITS AND HELP TO FIX SECURITY THREAT BEFORE AN ATTACKER DISCOVERS IT AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 10. PENETRATION TESTING CHECK SENSITIVE INFORMATION AVAILABLE CHECK WHAT KIND OF PRIVILEGES PENTESTER GAIN CHECK IF POSSIBLE TO ESCALATE PRIVILEGES CHECK IF VULNERABILITY CAN LEAD TO MORE EXPLOITS (ANOTHER APPLICATION, SYSTEM, OR SERVER) AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 11. PENETRATION TESTING TYPE OF PENETRATION TESTING: BLACK BOX: 0 INFORMATION ABOUT THE SYSTEM, MAYBE ONLY THE IP/DOMAIN NAME. FULL ATTACKER PERSPECTIVE GRAY BOX: PARTIAL INFORMATION ABOUT A SYSTEM, SIMULATE ATTACK BY EMPLOYEE, VENDORS. WHITE BOX: SIGNIFICANT INFORMATION ABOUT A SYSTEM, SOURCE CODE/CONFIGURATION REVIEW. AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 12. PENETRATION TESTING NETWORK INFRASTRUCTURE PENTEST WIFI, VOIP, TELEPHONE APPLICATION INFRASTRUCTURE PENTEST WEB, MOBILE SYSTEM INFRASTRUCTURE PENTEST PHYSICAL SECURITY SOCIAL ENGINEETING (PEOPLE) AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 13. PENETRATION TESTING MOST LIMITATIONS TIME SKILLED ACCESS TO EQUIPMENT AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 14. PENETRATION TESTING METHODOLOGY A GUIDELINE FOR SOLVING A PROBLEM, WITH SPECIFIC COMPONENTS SUCH AS PHASES, TASKS, METHODS, TECHNIQUES AND TOOLS AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 15. PENETRATION TESTING WELL KNOWN STANDARD ! AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 16. PENETRATION TESTING SOURCE: ISSAF AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 17. PENETRATION TESTING INFORMATION GATHERING : USING ALL RESOURCES (INTERNET) TO FIND ALL THE INFORMATION ABOUT TARGET, USING TECHNICAL AND NON-TEHCNICAL METHODS SOURCE: ISSAF AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 18. INFORMATION GATHERING NON TECHNICAL SEARCH COMPANY INFO ON SOCIAL NETWORK : LINKEDIN.COM, FACEBOOK SEARCH KEY PERSONAL ACTIVITY: ADMINISTRATOR, PROGRAMMER GOOGLE HACKING AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 19. HANDS ON INFORMATION GATHERING VIA SOCIAL NETWORK INFORMATION GATHERING VIA GOOGLE HACKING AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 20. INFORMATION GATHERING TECHNICAL USING DIG. NSLOOKUP, WHOIS TO FIND INFORMATION AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 21. HANDS ON INFORMATION GATHERING USING DIG INFORMATION GATHERING USING WHOIS AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 22. PENETRATION TESTING NETWORK MAPPING: FOOTPRINT THE NETWORK AND RESOURCES THAT ALREADY GATHER FROM INFORMATION GATHERING. E.G: FIND LIVE HOST, PORT AND SERVICE, NETWORK PERIMETER, OS AND SERVICE FINGERPRINTING SOURCE: ISSAF AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 23. NETWORK MAPPING TOOLS: NMAP, TRACEROUTE, PING MENCOBA NMAP, TRACEROUTE SOURCE: ISSAF AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 24. HANDS ON AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 25. HANDS ON AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 26. PENETRATION TESTING VULNERABILITY IDENTIFICATION : IDENTIFY ALL SERVICES VULNERABILITY (BASED ON VERSION/ BANNER), USING VULNERABILITY SCAN, IDENTIFY ATTACK PATH TOOLS: NMAP, NESSUS SOURCE: ISSAF AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 27. HANDS ON NMAP -SV (DETECT OPEN PORT WITH SERVICE INFO (VERSION)) NMAP -O (DETECT POSSIBLE OS) AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 28. PENETRATION TESTING PENETRATION: TRY TO GAIN UNAUTHORIZED ACCESS BY CIRCUMVENTING THE SECURITY MEASURES TO GET ACCESS,. E.G: FIND POC, CREATE TOOLS, TESTING SOURCE: ISSAF AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 29. PENETRATION TESTING GAINING ACCESS AND PRIVILEGES : GAINING LEAST PRIVILEGE BY DEFAULT USER OR PASSWORD, DEFAULT SETTINGS, PUBLIC SERVICES, TRY TO ESCALATE PRIVILEGES TO SUPERIOR LEVEL (ADMINISTRATOR/ ROOT) USING/CREATING EXPLOIT OR METASPLOIT (FREE) , IMMUNITY CANVAS, CORE IMPACT SOURCE: ISSAF AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 30. HANDS ON USING METASPLOIT USING LOCAL EXPLOIT TO GAIN HIGHER LEVEL PRIVILEGES AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 31. PENETRATION TESTING ENUMERATING FURTHER: OBTAIN PASSWORD (PASSWORD FILE (/ETC/SHADOW, SAM), USER DATABASE), SNIFFING NETWORK, MAPPING INTERNAL NETWORK SOURCE: ISSAF AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 32. HANDS ON CRACKING PASSWORD FILE AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 33. PENETRATION TESTING COMPROMISE REMOTE USERS/SITES: (IF POSSIBLE) TRY TO COMPROMISE REMOTE USER (VPN USERS) TO GET PRIVILEGE TO INTERNAL NETWORK SOURCE: ISSAF AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 34. PENETRATION TESTING MAINTAINING ACCESS: OFTEN NOT PERFORM COVERING TRACKS: OFTEN NOT PERFORM SOURCE: ISSAF AHMAD MUAMMAR !(C)2011 | @Y3DIPS
  • 35. PENETRATION TESTING VALUE IS ON THE REPORT PENETRATION TESTING SERVICE LEVEL AGREEMENT NON DISCLOSURE AGREEMENT THERE ARE ALWAYS A RISK, E.G : SYSTEM DOWN/ CRASH DURING PENTEST, SLOWDOWN NETWORK AHMAD MUAMMAR !(C)2011 | @Y3DIPS