1 / 21

Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Training | Edureka

( ** Cyber Security Training: https://www.edureka.co/cybersecurity-certification-training ** ) <br>This Edureka PPT on "Penetration Testing" will help you understand all about penetration testing, its methodologies, and tools. Below is the list of topics covered in this session: <br>What is Penetration Testing? <br>Phases of Penetration Testing <br>Penetration Testing Types <br>Penetration Testing Tools <br>How to perform Penetration Testing on Kali Linux? <br><br>Cyber Security Playlist: https://bit.ly/2N2jlNN <br>Cyber Security Blog Series: https://bit.ly/2AuULkP <br><br>Instagram: https://www.instagram.com/edureka_lea... <br>Facebook: https://www.facebook.com/edurekaIN/ <br>Twitter: https://twitter.com/edurekain <br>LinkedIn: https://www.linkedin.com/company/edureka

EdurekaIN
Download Presentation

Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Training | Edureka

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Outline Penetration Testing Tools Phases of Penetration Testing 05 03 01 04 04 02 What is Penetration Testing? Penetration Testing Types Metasploit Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  2. What is penetration testing? Copyright © 2018, edureka and/or its affiliates. All rights reserved.

  3. Vulnerabilities Design & implementation Poor system configuration Technology Insecure network System complexity Human errors Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  4. What is Penetration Testing? Penetration testing is an attempt to exploit the vulnerabilities to determine whether unauthorized access or other malicious activity is possible Purpose Discover vulnerabilities Test for security compliance Verify staff awareness Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  5. Phase of Penetration Testing? Copyright © 2018, edureka and/or its affiliates. All rights reserved.

  6. Penetration Testing Phases 03 05 01 Report Generation Planning & Reconnaissance Exploitation Risk Analysis & Suggestions Scanning & Discovery 02 04 Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  7. Project Management Phases 01 Planning Phase Activities involved in this phase Scanning phase Defining goals & scope of a test 02 03 Execution Phase Gathering Intelligence Analysis Phase Deciding on testing methods to be use 04 05 Output Phase Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  8. Project Management Phases 01 Planning Phase Mapping the attack vectors & identifying vulnerabilities Scanning phase Static Analysis Dynamic Analysis Dynamic Analysis 02 03 Execution Phase Inspecting application code logic, functions etc Inspecting application code in running state running state Inspecting application code in Analysis Phase 04 05 Output Phase Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  9. Project Management Phases 01 Planning Phase Crucial phase where actual damage is done Scanning phase PEN TESTING 02 03 Execution Phase Analysis Phase 04 05 Output Phase Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  10. Project Management Phases 01 Planning Phase Activities involved in this phase Scanning phase Collect the evidence of exploited vulnerabilities 02 03 Execution Phase Categorize the risks to – Critical, High, Medium & Low Analysis Phase Reporting results to executive management 04 05 Output Phase Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  11. Project Management Phases Results of penetration testing are complied into detailed report 01 Planning Phase Recommended solutions Exploited vulnerabilities Scanning phase 02 03 Execution Phase Analysis Phase Summary of test Risks 04 discovered 05 Output Phase Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  12. Penetration Testing Types Copyright © 2018, edureka and/or its affiliates. All rights reserved.

  13. Penetration Testing Types 01 03 05 Social Engineering Web Application 02 04 Network Services Wireless Client Side Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  14. Types of Penetration Testing TEST CASE - INPUT White – Box Testing Black – Box Testing Grey – Box Testing Zero Knowledge Full Knowledge Some Knowledge TEST CASE - OUTPUT Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  15. Penetration Testing Strategies NETWORK SERVICES INTERNAL WIRELESS BLIND EXTERNAL PENETRATION TESTING TARGETED WEB APPLICATIONS CLIENT D-BLIND Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  16. Penetration Testing Tools Copyright © 2018, edureka and/or its affiliates. All rights reserved.

  17. Penetration Testing Tools Why do we need penetration tools? Popular penetration tools Saves time & effort Accurate results Advanced analysis Gather bulk data Automate manual tasks Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

  18. Demo – Exploring Metasploit Copyright © 2018, edureka and/or its affiliates. All rights reserved.

  19. Cybersecurity Certification Training www.edureka.co/cybersecurity-certification-training

More Related