Module 6 – Penetration  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification ○ Penetration.

Slides:



Advertisements
Similar presentations
Are We Cool? A Unit Portfolio Presentation in Mathematics.
Advertisements

ETHICAL HACKING A LICENCE TO HACK
and Mitigations Brady Bloxham
PROCESS FRAMEWORK Lecture - 3. Topics covered PROCESS FRAMEWORK PROCESS MODELS DIFFERENCE.
Network Mapping  Identify Live Hosts  Determine running Services TCP Port Scanning UDP Port Scanning Banner Grabbing ARP Discovery  Identify Perimeter.
Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
Module 2 – PenTest Overview
Risk Management a Case Study DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
Penetration Testing Anand Sudula, CISA,CISSP SSA Global Technologies, India Anand Sudula, CISA,CISSP SSA Global Technologies, India.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Rochester Institute of Technology Secure IT 2007 Security Auditing Course Development Rochester Institute of Technology Yin Pan
Network Security Testing Techniques Presented By:- Sachin Vador.
BSBPMG507A Manage Project Communications Manage Project Communications Unit Guide Diploma of Project Management Qualification Code BSB51507 Unit.
Vulnerability Assessment & Penetration Testing By: Michael Lassiter Jr.
Detailed Design Review of Magnetic Field Centering Device Project # P08028 “Develop a Design and Methodology to Ensure the Concentricity between the Magnetic.
1 Presentation ISS Security Scanner & Retina by Adnan Khairi
Penetration Testing Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA 16802
The Business of Penetration Testing
Penetration Testing.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Mapping The Penetration Tester’s Mind 0 to Root in 60 Min #MappingThePenTestersMind 1.
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
Website Hardening HUIT IT Security | Sep
Performing a Penetration Test.  Penetration Tester  Attempts to reveal potential consequences of a real attack  Security Audit / Vulnerability Assessment.
BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter.
 Jonathan Trull, Deputy State Auditor, Colorado Office of the State Auditor  Travis Schack, Colorado’s Information Security Officer  Chris Ingram,
BSBPMG406A Apply Communications Management Techniques Apply Communications Management Techniques Unit Guide C ertificate IV in Project Management
Penetration Testing Training Day Penetration Testing Tools and Techniques – pt 1 Mike Westmacott, IRM plc Supported by.
Module 8 – What's Next?  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification ○ Penetration.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
AASSA Conference 2012 Quito, Ecuador March 16 th 2012 All the rights reserved.Instructor: Francisco Bolaños, Ing. InterAmerican Academy Ethical Hacking.
Professionalizing Penetration Tests CORE SECURITY TECHNOLOGIES © 2002  Professionalizing Penetration Testing.
Module 3 – Information Gathering  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
HP World September 2002 Scott S. Blake, CISSP Vice President, Information Security BindView Corporation Vulnerability Assessment and Action.
Chapter 6: THE EIGHT STEP PROCESS FOCUS: This chapter provides a description of the application of customer-driven project management.
Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.
1 Tactics and Penetration Testing. Overview Tactics: A procedure or set of maneuvers engaged in to achieve an end, an aim, or a goal. Tactics Penetration.
Module 5 – Vulnerability Identification  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
The Goal: To Climb Above The Competition Copyright 2005: I Lead Projects, L.L.C. Course Description Project Process Workplates Project Process Workplates.
Mantra – Security Framework Free and Open Source Browser based Security Framework.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Software Project Management Iterative Model & Spiral Model.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
O Identify the impacts and dependencies of business operations on biodiversity in agricultural landscapes o Assess and prioritise the risks and opportunities.
Filip Chytrý Everyone of you in here can help us improve online security....
 Computer Network Attack  “… actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
CSCE 548 Secure Software Development Penetration Testing.
Professionalizing Penetration Testing
Topic 5 Penetration Testing 滲透測試
Seminar On Ethical Hacking Submitted To: Submitted By:
Penetration Testing: Concepts,Attacks and Defence Stratagies
Security Testing Methods
BA Continuum India Pvt Ltd
Secure Software Confidentiality Integrity Data Security Authentication
Rootkit Detection and Mitigation
Project Management Processes
Intelligence Driven Defense, The Next Generation SOC
NEED OF JAILBREAKING IN IOS PENETRATION TESTING
Lifecycle Services for Advanced Wireless LAN (LCSAWLAN) practice-questions.html.
PT0-001 Dumps PDF CompTIA PenTest+ Exam Exam Code Exam Name.
Security Essentials for Small Businesses
Project Management Processes
How hackers do it Ron Woerner Security Administrator CSG Systems, Inc.
Scientific Method.
PT0-001 Exam Questions 2019
Ethical Hacker Pro IT Fundamentals Pro
Engineering Secure Software
Presentation transcript:

Module 6 – Penetration  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification ○ Penetration ○ Gaining Access & Privilege Escalation ○ Enumerating Further ○ Compromise Remote Users/Sites ○ Maintaining Access ○ Cover the Tracks Heorot.net

Penetration  Purpose behind Penetration To provide proof of vulnerabilities or exploits Conducted in an isolated environment (lab)‏ High risk to continued operation of target  Not necessary for “Blue Team” hacking  Requires higher level of programming skill and TCP/IP stack knowledge Heorot.net

Penetration  Find proof of concept code/tool  Develop tools/scripts  Test proof of concept code/tool  Customize proof of concept code/tool  Test proof of concept code/tool in an isolated environment  Use proof of concept code against target  Verify or disprove the existence of vulnerabilities Heorot.net

Penetration  Find proof of concept code/tool OR  Develop tools/scripts  PenTest Lab Test proof of concept code/tool Customize proof of concept code/tool  Development Lab Test proof of concept code/tool in an isolated environment  Production System Use proof of concept code against target  Verify or disprove the existence of vulnerabilities Heorot.net

Module 6 – Conclusion  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Penetration Find proof of concept code/tool Develop tools/scripts Test -PenTest Lab -Development Lab -Production System Verify or disprove the existence of vulnerabilities Heorot.net