.c
om
cu
u
du
o
ng
th
an
co
ng
Introduction To Penetration Testing
CuuDuongThanCong.com
/>
Introduction to Penetration testing.
an
The objects of Penetration testing.
co
ng
Types of Penetration testing.
.c
om
Contents
ng
th
Benefits of Penetration Testing.
du
o
The locations of Penetration testing.
cu
u
Penetration test Process overview.
Penetration testing standards.
Setting up virtual lab.
CuuDuongThanCong.com
/>
.c
om
cu
u
du
o
ng
th
an
co
ng
1. Introduction to Penetration testing
CuuDuongThanCong.com
/>
.c
om
How to improve your system security?
ng
Vulnerability Assessment
cu
u
du
o
ng
th
an
co
Penetration Testing
CuuDuongThanCong.com
/>
.c
om
Vulnerability Assessment
A vulnerability is an assessment where you identify areas in the
co
ng
configuration that make your system vulnerable to an attack or security
th
an
incident.
du
o
ng
Using tools: Nessus, Nexpose, Microsoft Baseline Security Analyzer, …
The software is not performing attacks on the system, it simply checks the
cu
u
configuration of the system => Passive Assessment
CuuDuongThanCong.com
/>
.c
om
Vulnerability Assessment
ng
Vulnerability assessment for Operating system:
co
Unused accounts
cu
u
Unpatched software
du
o
ng
Unpatched operating system
th
an
Administrative accounts
Vulnerability software
CuuDuongThanCong.com
/>
.c
om
Characteristics of vulnerability assessment
Passively testing security controls: you are not actually trying to hack
co
ng
into the system or exploit it.
th
an
Identify vulnerability: identify vulnerabilities, or weaknesses
du
o
ng
Identify lack of security controls: when performing a vulnerability
assessment, you are looking to identify of there are any security controls
cu
u
that should be used that are not currently being used
CuuDuongThanCong.com
/>
ng
Identify common misconfigurations
.c
om
Characteristics of vulnerability assessment
co
False positive: somethings that is being reported as a vulnerability, but it
cu
u
du
o
ng
th
an
is not.
CuuDuongThanCong.com
/>
.c
om
Penetration Testing
Penetration testing or pentesting: involves simulating real attacks to
co
ng
assess the risk associated with potential security breaches.
th
an
Using many tools and techniques, the penetration tester attempts to exploit
cu
u
du
o
ng
critical systems and gain access to sensitive data.
CuuDuongThanCong.com
/>
.c
om
Penetration Testing characteristics
ng
Verify a threat exists
an
cu
u
du
o
ng
Exploiting vulnerabilities
th
Actively test security control
co
Bypass security controls
CuuDuongThanCong.com
/>
.c
om
Difference: Penetration Testing vs Vulnerability Assessment?
Penetration Testing
ng
Vulnerability Assessment:
Identify, rank, and report vulnerabilities Identify ways to exploit vulnerabilities
but does not exploit them
Tools
Automated
th
an
co
Purpose
Price
du
o
ng
Difficult Administrator or inexperienced security
level
professional
cu
Time
u
Vulnerability Assessment:
CuuDuongThanCong.com
manual
Penetration tester (higher skill level)
Higher
longer
/>
.c
om
Penetration Testing vs Vulnerability Assessment
ng
Vulnerability Assessment is not Penetration Testing
cu
u
du
o
ng
th
an
co
Penetration testing expands upon vulnerability assessment
CuuDuongThanCong.com
/>
.c
om
Penetration Testing vs Vulnerability Assessment
ng
Example:
co
Vulnerability Assessment: using Acunetix tool to discover SQL injection
du
o
ng
th
an
link.
cu
database
u
Penetration Testing: Using the result of vulnerability assessment to exploit
CuuDuongThanCong.com
/>
.c
om
cu
u
du
o
ng
th
an
co
ng
2. Types of Penetration testing.
CuuDuongThanCong.com
/>
.c
om
Black-box testing
Penetration Tester is performed with no knowledge of the target system
cu
u
du
o
ng
th
an
co
ng
and tester must perform their own reconnaissance.
CuuDuongThanCong.com
/>
.c
om
White-box testing
Penetration Tester is given access to the source code and other relevant
cu
u
du
o
ng
th
an
co
ng
information that the company provides.
CuuDuongThanCong.com
/>
.c
om
Gray-box testing
du
o
ng
th
an
co
ng
Gray means partial knowledge
cu
u
Black box White box Gray box
CuuDuongThanCong.com
/>
.c
om
cu
u
du
o
ng
th
an
co
ng
3. The objects of Penetration testing
CuuDuongThanCong.com
/>
.c
om
The objects of penetration testing
ng
Network Penetration Testing
co
Application Penetration Testing
cu
u
Social Engineering
du
o
ng
Physical Penetration Testing
th
an
Web Application Penetration Testing
CuuDuongThanCong.com
/>
.c
om
cu
u
du
o
ng
th
an
co
ng
4. Benefits of Penetration Testing
CuuDuongThanCong.com
/>
.c
om
4. Benefits of Penetration Testing
ng
Penetration testing lists a set of vulnerabilities.
co
Penetration testing shows the real risk of vulnerabilities.
th
an
It tests your cyber-defense capability.
du
o
ng
It offers a third party expert opinion.
cu
u
It helps comply with regulations and certifications
CuuDuongThanCong.com
/>
.c
om
cu
u
du
o
ng
th
an
co
ng
5. The locations of penetration testing
CuuDuongThanCong.com
/>
.c
om
Internal Penetration testing
Internal Penetration Test is to determine what systems a malicious insider
cu
u
du
o
ng
th
an
co
ng
would be able to access from within the internal structure of the network
CuuDuongThanCong.com
/>
.c
om
External Penetration testing
External penetration testing is to identify vulnerabilities that are present
co
ng
for connections that have been established through the organization
cu
u
du
o
ng
th
an
connected to the internet
CuuDuongThanCong.com
/>
.c
om
cu
u
du
o
ng
th
an
co
ng
6. Penetration test Process overview
CuuDuongThanCong.com
/>