9
PENETRATION TESTING From: Sumtrix (A Cyber Security Consultancy) By: Mayank Singh

Penetration And its Tool

Embed Size (px)

Citation preview

Page 1: Penetration And its Tool

PENETRATION TESTING

From: Sumtrix(A Cyber Security Consultancy)

By: Mayank Singh

Page 2: Penetration And its Tool

About PENETRATION TESTING

▪ A Penetration Testing, also known as a Pen Test is a legal attempt at gaining access to your protected computer systems or networks, often conducted by a third party organization. The purpose of the test is to identify security vulnerabilities and then attempt to successfully exploit them in order to gain some form of access to the network or computer system.

▪ Two of the more common types of penetration tests are black box and white box penetration testing.

In a black box test, no prior knowledge of the corporate system is given to the third party tester. This is often the most preferred test as it is an accurate simulation of how an outsider/hacker would see the network and attempt to break into it.

A white box test on the other hand is when the third party organisation is given full IP information, network diagrams and source code files to the software, networks and systems, in a bid to find weaknesses from any of the available information.

November 2014WWW.SUMTRIX.COM Email:[email protected] Mayank SIngh

Page 3: Penetration And its Tool

PENETRATION TESTING- SOFTWARE'S / TOOLS / UTILITIES

November 2014WWW.SUMTRIX.COM Email:[email protected] Mayank SIngh

▪ Exploitation

▪ Framework

▪ Social Engineering Attack Tools

▪ SQL Injection Detection Tools

Page 4: Penetration And its Tool

November 2014WWW.SUMTRIX.COM Email:[email protected] Mayank SIngh

EXPLOITATION TOOL

Page 5: Penetration And its Tool

Continue…

November 2014WWW.SUMTRIX.COM Email:[email protected] Mayank SIngh

EXPLOITATION TOOL

Page 6: Penetration And its Tool

▪ Metasploit

▪ Mercury

▪ OpenSCAP

▪ rsif

▪ Phemail.py

▪ Xenotix XSS Exploit Framework

November 2014WWW.SUMTRIX.COM Email:[email protected] Mayank SIngh

FRAMEWORK

Page 7: Penetration And its Tool

• Social-Engineering Toolkit (SET)

November 2014WWW.SUMTRIX.COM Email:[email protected] Mayank SIngh

SOCIAL ENGINEERING ATTACK TOOLS

Page 8: Penetration And its Tool

▪ CAT.NET

▪ Dotdefender

▪ Microsoft Url Scan

▪ GreenSql

▪ HP Scrawlr

▪ Sqlstripes

November 2014WWW.SUMTRIX.COM Email:[email protected] Mayank SIngh

SQL INJECTION DETECTION TOOLS

Page 9: Penetration And its Tool

ThankYouBe Secure Always

For more Updates:

www.sumtrix.com

www.facebook.com/sumtrix14

Email:[email protected]

November 2014WWW.SUMTRIX.COM Email:[email protected] Mayank SIngh

SumtrixA Cyber Security Consultancy