Penetration Testing & Tools
Penetration Testing Execution Standard (PTES)
PTES, baseline fundamentals for performing a penetration test –
http://www.pentest-standard.org/
2
PTES Phases
3
Pre-Engagement
4
Intelligence Gathering
Note: perform scans from an IP address range that cannot be traced back to you or your team. The initial probing can be performed from anywhere (except at your team’s office!).
5
Threat Modeling
6
Vulnerability Analysis
7
Exploitation
8
Post Exploitation
9
Post Exploitation
10
Reporting
11
Types of Penetration Tests
12
Vulnerability Scanners
13
PTES Methodology
14
Penetration Testing Tools
1. Information Gathering and Reconnaissance
15
Penetration Testing Tools
2. Vulnerability Scanning
16
Penetration Testing Tools
3. Web Application Testing
17
Penetration Testing Tools
4. Exploitation
18
Penetration Testing Tools
5. Wireless Network Testing
19
Penetration Testing Tools
6. Password Cracking and Hash Cracking
20
Penetration Testing Tools
7. Post-Exploitation
21
Penetration Testing Tools
8. Reverse Engineering
22
Penetration Testing Tools
9. Social Engineering
23
Penetration Testing Tools
10. Other Tools
24
Thank You
25