Tải bản đầy đủ (.pdf) (41 trang)

Slide kiểm thử xâm nhập chương 1 introduction to penetration testing

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (796.42 KB, 41 trang )

.c
om

cu

u

du
o

ng

th

an

co

ng

Introduction To Penetration Testing

CuuDuongThanCong.com

/>

 Introduction to Penetration testing.

an

 The objects of Penetration testing.



co

ng

 Types of Penetration testing.

.c
om

Contents

ng

th

 Benefits of Penetration Testing.

du
o

 The locations of Penetration testing.

cu

u

 Penetration test Process overview.

 Penetration testing standards.

 Setting up virtual lab.
CuuDuongThanCong.com

/>

.c
om

cu

u

du
o

ng

th

an

co

ng

1. Introduction to Penetration testing

CuuDuongThanCong.com

/>


.c
om

How to improve your system security?

ng

 Vulnerability Assessment

cu

u

du
o

ng

th

an

co

 Penetration Testing

CuuDuongThanCong.com

/>


.c
om

Vulnerability Assessment
 A vulnerability is an assessment where you identify areas in the

co

ng

configuration that make your system vulnerable to an attack or security

th

an

incident.

du
o

ng

 Using tools: Nessus, Nexpose, Microsoft Baseline Security Analyzer, …
 The software is not performing attacks on the system, it simply checks the

cu

u


configuration of the system => Passive Assessment

CuuDuongThanCong.com

/>

.c
om

Vulnerability Assessment

ng

Vulnerability assessment for Operating system:

co

 Unused accounts

cu

u

 Unpatched software

du
o

ng


 Unpatched operating system

th

an

 Administrative accounts

 Vulnerability software

CuuDuongThanCong.com

/>

.c
om

Characteristics of vulnerability assessment
 Passively testing security controls: you are not actually trying to hack

co

ng

into the system or exploit it.

th

an


 Identify vulnerability: identify vulnerabilities, or weaknesses

du
o

ng

 Identify lack of security controls: when performing a vulnerability

assessment, you are looking to identify of there are any security controls

cu

u

that should be used that are not currently being used

CuuDuongThanCong.com

/>

ng

 Identify common misconfigurations

.c
om

Characteristics of vulnerability assessment


co

 False positive: somethings that is being reported as a vulnerability, but it

cu

u

du
o

ng

th

an

is not.

CuuDuongThanCong.com

/>

.c
om

Penetration Testing
 Penetration testing or pentesting: involves simulating real attacks to


co

ng

assess the risk associated with potential security breaches.

th

an

 Using many tools and techniques, the penetration tester attempts to exploit

cu

u

du
o

ng

critical systems and gain access to sensitive data.

CuuDuongThanCong.com

/>

.c
om


Penetration Testing characteristics

ng

 Verify a threat exists

an

cu

u

du
o

ng

 Exploiting vulnerabilities

th

 Actively test security control

co

 Bypass security controls

CuuDuongThanCong.com

/>


.c
om

Difference: Penetration Testing vs Vulnerability Assessment?
Penetration Testing

ng

Vulnerability Assessment:

Identify, rank, and report vulnerabilities Identify ways to exploit vulnerabilities
but does not exploit them

Tools

Automated

th

an

co

Purpose

Price

du
o


ng

Difficult Administrator or inexperienced security
level
professional

cu

Time

u

 Vulnerability Assessment:

CuuDuongThanCong.com

manual
Penetration tester (higher skill level)
Higher
longer

/>

.c
om

Penetration Testing vs Vulnerability Assessment

ng


 Vulnerability Assessment is not Penetration Testing

cu

u

du
o

ng

th

an

co

 Penetration testing expands upon vulnerability assessment

CuuDuongThanCong.com

/>

.c
om

Penetration Testing vs Vulnerability Assessment

ng


Example:

co

 Vulnerability Assessment: using Acunetix tool to discover SQL injection

du
o

ng

th

an

link.

cu

database

u

 Penetration Testing: Using the result of vulnerability assessment to exploit

CuuDuongThanCong.com

/>


.c
om

cu

u

du
o

ng

th

an

co

ng

2. Types of Penetration testing.

CuuDuongThanCong.com

/>

.c
om

Black-box testing

 Penetration Tester is performed with no knowledge of the target system

cu

u

du
o

ng

th

an

co

ng

and tester must perform their own reconnaissance.

CuuDuongThanCong.com

/>

.c
om

White-box testing
 Penetration Tester is given access to the source code and other relevant


cu

u

du
o

ng

th

an

co

ng

information that the company provides.

CuuDuongThanCong.com

/>

.c
om

Gray-box testing

du

o

ng

th

an

co

ng

 Gray means partial knowledge

cu

u

Black box White box Gray box

CuuDuongThanCong.com

/>

.c
om

cu

u


du
o

ng

th

an

co

ng

3. The objects of Penetration testing

CuuDuongThanCong.com

/>

.c
om

The objects of penetration testing

ng

 Network Penetration Testing

co


 Application Penetration Testing

cu

u

 Social Engineering

du
o

ng

 Physical Penetration Testing

th

an

 Web Application Penetration Testing

CuuDuongThanCong.com

/>

.c
om

cu


u

du
o

ng

th

an

co

ng

4. Benefits of Penetration Testing

CuuDuongThanCong.com

/>

.c
om

4. Benefits of Penetration Testing

ng

 Penetration testing lists a set of vulnerabilities.


co

 Penetration testing shows the real risk of vulnerabilities.

th

an

 It tests your cyber-defense capability.

du
o

ng

 It offers a third party expert opinion.

cu

u

 It helps comply with regulations and certifications

CuuDuongThanCong.com

/>

.c
om


cu

u

du
o

ng

th

an

co

ng

5. The locations of penetration testing

CuuDuongThanCong.com

/>

.c
om

Internal Penetration testing
 Internal Penetration Test is to determine what systems a malicious insider


cu

u

du
o

ng

th

an

co

ng

would be able to access from within the internal structure of the network

CuuDuongThanCong.com

/>

.c
om

External Penetration testing
 External penetration testing is to identify vulnerabilities that are present

co


ng

for connections that have been established through the organization

cu

u

du
o

ng

th

an

connected to the internet

CuuDuongThanCong.com

/>

.c
om

cu

u


du
o

ng

th

an

co

ng

6. Penetration test Process overview

CuuDuongThanCong.com

/>

×