240 likes | 1.34k Views
( ** Cyber Security Training: https://www.edureka.co/cybersecurity-certification-training ** ) <br>This Edureka PPT on "Penetration Testing" will help you understand all about penetration testing, its methodologies, and tools. Below is the list of topics covered in this session: <br>What is Penetration Testing? <br>Phases of Penetration Testing <br>Penetration Testing Types <br>Penetration Testing Tools <br>How to perform Penetration Testing on Kali Linux? <br><br>Cyber Security Playlist: https://bit.ly/2N2jlNN <br>Cyber Security Blog Series: https://bit.ly/2AuULkP <br><br>Instagram: https://www.instagram.com/edureka_lea... <br>Facebook: https://www.facebook.com/edurekaIN/ <br>Twitter: https://twitter.com/edurekain <br>LinkedIn: https://www.linkedin.com/company/edureka
E N D
Outline Penetration Testing Tools Phases of Penetration Testing 05 03 01 04 04 02 What is Penetration Testing? Penetration Testing Types Metasploit Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
What is penetration testing? Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Vulnerabilities Design & implementation Poor system configuration Technology Insecure network System complexity Human errors Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
What is Penetration Testing? Penetration testing is an attempt to exploit the vulnerabilities to determine whether unauthorized access or other malicious activity is possible Purpose Discover vulnerabilities Test for security compliance Verify staff awareness Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Phase of Penetration Testing? Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Penetration Testing Phases 03 05 01 Report Generation Planning & Reconnaissance Exploitation Risk Analysis & Suggestions Scanning & Discovery 02 04 Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Project Management Phases 01 Planning Phase Activities involved in this phase Scanning phase Defining goals & scope of a test 02 03 Execution Phase Gathering Intelligence Analysis Phase Deciding on testing methods to be use 04 05 Output Phase Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Project Management Phases 01 Planning Phase Mapping the attack vectors & identifying vulnerabilities Scanning phase Static Analysis Dynamic Analysis Dynamic Analysis 02 03 Execution Phase Inspecting application code logic, functions etc Inspecting application code in running state running state Inspecting application code in Analysis Phase 04 05 Output Phase Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Project Management Phases 01 Planning Phase Crucial phase where actual damage is done Scanning phase PEN TESTING 02 03 Execution Phase Analysis Phase 04 05 Output Phase Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Project Management Phases 01 Planning Phase Activities involved in this phase Scanning phase Collect the evidence of exploited vulnerabilities 02 03 Execution Phase Categorize the risks to – Critical, High, Medium & Low Analysis Phase Reporting results to executive management 04 05 Output Phase Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Project Management Phases Results of penetration testing are complied into detailed report 01 Planning Phase Recommended solutions Exploited vulnerabilities Scanning phase 02 03 Execution Phase Analysis Phase Summary of test Risks 04 discovered 05 Output Phase Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Penetration Testing Types Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Penetration Testing Types 01 03 05 Social Engineering Web Application 02 04 Network Services Wireless Client Side Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Types of Penetration Testing TEST CASE - INPUT White – Box Testing Black – Box Testing Grey – Box Testing Zero Knowledge Full Knowledge Some Knowledge TEST CASE - OUTPUT Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Penetration Testing Strategies NETWORK SERVICES INTERNAL WIRELESS BLIND EXTERNAL PENETRATION TESTING TARGETED WEB APPLICATIONS CLIENT D-BLIND Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Penetration Testing Tools Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Penetration Testing Tools Why do we need penetration tools? Popular penetration tools Saves time & effort Accurate results Advanced analysis Gather bulk data Automate manual tasks Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training
Demo – Exploring Metasploit Copyright © 2018, edureka and/or its affiliates. All rights reserved.
Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training