1 / 7

Chapter 15

Chapter 15. Performing a Penetration Test. Defining Security Assessments. Penetration Tester Attempts to reveal potential consequences of a real attack Security Audit / Vulnerability Assessment Scan IP networks / hosts for weaknesses Do not try to gain access Penetration (Pen) test

sitara
Download Presentation

Chapter 15

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 15 Performing a Penetration Test

  2. Defining Security Assessments • Penetration Tester • Attempts to reveal potential consequences of a real attack • Security Audit / Vulnerability Assessment • Scan IP networks / hosts for weaknesses • Do not try to gain access • Penetration (Pen) test • Try to gain access

  3. Penetration Testing • Two types • External • Uses publicly available information • Conduct network scanning and enumeration • Run exploits from outside the perimeter network • Internal • Performed from within the organization • Categories of knowledge • Black-box / zero-knowledge • Gray-box / partial-knowledge • White-box / complete-knowledge

  4. Penetration Testing Steps • Phase 1: Preattack Phase • Reconnaissance / data gathering • Phase 2: Attack Phase • Penetrating the Perimeter • Acquiring the Target • Escalating Privileges • Executing, Implanting, and Retracing • Phase 3: Postattack Phase • Restore the system / clear logs / leave no trace

  5. Penetration Testing Steps - cont • Phase 3: Postattack Phase • Remove all files uploaded onto the system • Cleaning all registry entries • Remove vulnerabilities created • Reversing all file and setting manipulations • Reversing all changes in privileges and user settings • Removing all tools & exploits from the tested systems • Restoring the network to the pretest stage • Documenting & capturing all logs • Analyzing results and making presentations

  6. Making Pen Testing Legal • Signed documents include • Scope of work • Nondisclosure agreement • Liability release

  7. Automated Pen Testing Tools • Nessus • LFI LANguard • SARA • MBSA • Metasploit Framework

More Related