SlideShare a Scribd company logo
PENETRATION TESTING
A BRIEF INSIGHT INTO
PENETRATION TESTING
CONTENTS
• INTRODUCTION
• PURPOSE
• HOW IS PENETRATION TESTING CONDUCTED
• PENETRATION TESTING TOOLS
• TYPES OF PENETRATION TESTS
• PENETRATION TESTING STAGES
INTRODUCTION
• Penetration testing is also called as Ethical Hacking
• Testing is done to find out security vulnerabilities
• It is done to identify possible entry points, attempting to break in -- either virtually
or for real -- and reporting back the findings
• Can be done from software's or manually
• Check security policies are properly implemented or not,
PURPOSE
• It measures the compliance of organization security policy
• Identify weak spots of the system
• Prevent from security disasters
• Help application developers create more secure apps
• Minimize errors in the future
HOW IS PENETRATION TESTING CONDUCTED
• It is conducted once in a year. However, it also depends upon the nature of the system
• Smaller organization does penetration test once every two years
• Penetration tests may also be conducted whenever an organization:
 Adds new network infrastructure or applications, significant upgrades or modifications to its
applications or infrastructure
 Establishes offices in new locations
 Applies security patches
 Modifies end-user policies.
PENETRATION TESTING TOOLS
Wireshark
Nmap
Metasploit Project John The Ripper
A Brief Insight into Penetration Testing
PENETRATION TESTING STAGES
Pre- engagement Reconnaissance Threat modelling
Exploitation Post-Exploitation Reporting
Re-testing
For more information about penetration testing and to kickstart your career, enroll now for penetration testing course!

More Related Content

PPTX
What is penetration testing and career path
PPTX
Introduction to Penetration testing and tools
PPTX
What is penetration testing
PDF
The Basics of Hacking and Penetration Testing Tools
PDF
What is pentest
PPTX
Vapt pci dss methodology ppt v1.0
PDF
Penetration testing & Ethical Hacking
PPTX
Ethical hacking/ Penetration Testing
What is penetration testing and career path
Introduction to Penetration testing and tools
What is penetration testing
The Basics of Hacking and Penetration Testing Tools
What is pentest
Vapt pci dss methodology ppt v1.0
Penetration testing & Ethical Hacking
Ethical hacking/ Penetration Testing

What's hot (20)

PPTX
Vulnerability assessment and penetration testing
PDF
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
PPTX
Vapt( vulnerabilty and penetration testing ) services
PDF
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
PDF
Penetration Testing Services, Penetration Testing
PDF
Security testing-What can we do - Trinh Minh Hien
PPTX
Agile and Secure SDLC
PPTX
Managing Open Source in Application Security and Software Development Lifecycle
PPTX
OTG - Practical Hands on VAPT
PDF
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
PPTX
Security Testing
PPTX
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
PPTX
Security testing fundamentals
PPTX
Penetration testing overview
PDF
SAST vs. DAST: What’s the Best Method For Application Security Testing?
PDF
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
PDF
What is Penetration & Penetration test ?
PPTX
What is Penetration Testing?
PPTX
Agile and Secure Development
PDF
Open Source Security for Newbies - Best Practices
Vulnerability assessment and penetration testing
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
Vapt( vulnerabilty and penetration testing ) services
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
Penetration Testing Services, Penetration Testing
Security testing-What can we do - Trinh Minh Hien
Agile and Secure SDLC
Managing Open Source in Application Security and Software Development Lifecycle
OTG - Practical Hands on VAPT
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
Security Testing
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Security testing fundamentals
Penetration testing overview
SAST vs. DAST: What’s the Best Method For Application Security Testing?
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
What is Penetration & Penetration test ?
What is Penetration Testing?
Agile and Secure Development
Open Source Security for Newbies - Best Practices
Ad

Similar to A Brief Insight into Penetration Testing (20)

PPTX
Penetration testing
PPTX
Security Testing.pptx
PDF
The Art of Penetration Testing in Cybersecurity.
PPTX
CISSP - Security Assessment
PDF
Top Security Challenges Facing Credit Unions Today
PPTX
Module 6.pptx
PPTX
Cyber-Security-Unit-4.pptx
PPTX
Penentration testing
PDF
BAIT1103 Chapter 7
PDF
Nessus Assesment Vulnerability Management.pdf
PPTX
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
PPTX
Vulnerability and Penetration Testing
PPTX
S.E Unit 6colorcolorcolorcolorcolorcolor.pptx
PPTX
Vulnerability assessment & Penetration testing Basics
PDF
Is Your Business Safe from Cyber Threats? VAPT Can Help!
PDF
VAPT testinVAPT Testing (Vulnerability Assessment and Penetration)g .pdf
PDF
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
PDF
CNIT 125 7. Security Assessment and Testing
PDF
CISSP Prep: Ch 7. Security Assessment and Testing
PPTX
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
Penetration testing
Security Testing.pptx
The Art of Penetration Testing in Cybersecurity.
CISSP - Security Assessment
Top Security Challenges Facing Credit Unions Today
Module 6.pptx
Cyber-Security-Unit-4.pptx
Penentration testing
BAIT1103 Chapter 7
Nessus Assesment Vulnerability Management.pdf
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Vulnerability and Penetration Testing
S.E Unit 6colorcolorcolorcolorcolorcolor.pptx
Vulnerability assessment & Penetration testing Basics
Is Your Business Safe from Cyber Threats? VAPT Can Help!
VAPT testinVAPT Testing (Vulnerability Assessment and Penetration)g .pdf
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
CNIT 125 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and Testing
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
Ad

More from Vikram Khanna (9)

PPTX
What is social engineering & why it is important
PPTX
What is network security and Types
PPTX
Red team and blue team in ethical hacking
PPTX
Introduction to ethical hacking
PPTX
Firewalls in network security
PPTX
What is Ethereum 2.0
PPT
Blockchain Explained
PPTX
Top 5 blockchain certification course
PPTX
Types of Blockchains
What is social engineering & why it is important
What is network security and Types
Red team and blue team in ethical hacking
Introduction to ethical hacking
Firewalls in network security
What is Ethereum 2.0
Blockchain Explained
Top 5 blockchain certification course
Types of Blockchains

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Cloud computing and distributed systems.
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
KodekX | Application Modernization Development
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Machine learning based COVID-19 study performance prediction
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Approach and Philosophy of On baking technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation theory and applications.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Big Data Technologies - Introduction.pptx
Cloud computing and distributed systems.
Advanced methodologies resolving dimensionality complications for autism neur...
KodekX | Application Modernization Development
20250228 LYD VKU AI Blended-Learning.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Machine learning based COVID-19 study performance prediction
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Encapsulation_ Review paper, used for researhc scholars
Approach and Philosophy of On baking technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Unlocking AI with Model Context Protocol (MCP)
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation theory and applications.pdf

A Brief Insight into Penetration Testing

  • 1. PENETRATION TESTING A BRIEF INSIGHT INTO PENETRATION TESTING
  • 2. CONTENTS • INTRODUCTION • PURPOSE • HOW IS PENETRATION TESTING CONDUCTED • PENETRATION TESTING TOOLS • TYPES OF PENETRATION TESTS • PENETRATION TESTING STAGES
  • 3. INTRODUCTION • Penetration testing is also called as Ethical Hacking • Testing is done to find out security vulnerabilities • It is done to identify possible entry points, attempting to break in -- either virtually or for real -- and reporting back the findings • Can be done from software's or manually • Check security policies are properly implemented or not,
  • 4. PURPOSE • It measures the compliance of organization security policy • Identify weak spots of the system • Prevent from security disasters • Help application developers create more secure apps • Minimize errors in the future
  • 5. HOW IS PENETRATION TESTING CONDUCTED • It is conducted once in a year. However, it also depends upon the nature of the system • Smaller organization does penetration test once every two years • Penetration tests may also be conducted whenever an organization:  Adds new network infrastructure or applications, significant upgrades or modifications to its applications or infrastructure  Establishes offices in new locations  Applies security patches  Modifies end-user policies.
  • 8. PENETRATION TESTING STAGES Pre- engagement Reconnaissance Threat modelling Exploitation Post-Exploitation Reporting Re-testing
  • 9. For more information about penetration testing and to kickstart your career, enroll now for penetration testing course!