1 / 13

Penetration testing and types

Penetration tests are generally executed by using manual or automated technologies to systematically compromise endpoints, server, web applications, network devices, wireless networks, mobile devices and other expected points of exposure.<br><br>Visit for more information...https://hackercombat.com/penetration-testing-performed-software/

Download Presentation

Penetration testing and types

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PENETRATION TESTING TYPES OF PENETRATION TESTS H C

  2. PENETRATION TESTING A penetration test, or pen-test, is an effort to measure the security of an IT infrastructure by safely attempting to exploit vulnerabilities.Info about any security measures vulnerabilities is successfully worked through penetration testing. It is generally combined and exhibited to IT and network system managers to help professionals take important decisions and prioritize associated remediation causes.

  3. TYPES OF PENETRATION TESTS Network services test Web application test Wireless security test Social engineering test

  4. NETWORK SERVICES TEST Network services test is one of the most common types of penetration tests, it’s about finding target systems on the network, looking for openings in base operating systems and other available network services, and exploit them remotely.

  5. WEB APPLICATION TEST This tests look for security vulnerabilities in the web-based applications and programs deployed and installed on the target environment.

  6. WIRELESS SECURITY TEST These penetration tests involve discovering a target’s physical environment to find unauthorized wireless access points with security weaknesses.

  7. SOCIAL ENGINEERING TEST This type of test involves a user into revealing sensitive information such as a password or any other sensitive data.This techniques to include all methods of phone, Internet-based, and onsite engagements.

  8. PENETRATION TESTING SOFTWARE Metasploit NMap John the Ripper Wireshark

  9. METASPLOIT It is a package of different Pen Testing tools. It is essentially a framework, which is constantly evolving to keep up with the modern-day threat. Used worldwide by Cybersecurity professionals even Certified Ethical Hackers.

  10. NMAP The Network Mapper as the name implies, this tool is primarily for discovering about the kind of weaknesses or holes in the network environment of a corporation.

  11. JOHN THE RIPPER One of the biggest Cyber Security threat is the inherent weaknesses of the traditional password. This is one of the hottest areas in Pen Testing. One of the best-known tools is “John the Ripper” commonly abbreviated as “JTR.”

  12. WIRESHARK This tool is an actual network protocol and a data packet analyzer which analyze the Security weaknesses of the traffic.

  13. THANK YOU Find here for more information about hacker combat H C

More Related