SlideShare a Scribd company logo
What is Penetration Testing
• Step by Step Process & Methods
What is Penetration Testing
Step by Step Process & Methods
EC-Council
Penetration Test Means...
• A penetration test is a simulated cyber-attack against your
system to check for exploitable vulnerabilities.
• Pen testing can involve the attempted breaching of any number
of application systems, (e.g., application protocol interfaces
(APIs), frontend/backend servers, etc.) to uncover vulnerabilities,
such as Un sanitized inputs that are susceptible to code injection
attacks.
• Insights provided by the penetration test can be used to fine-
tune your WAF security policies and patch detected
vulnerabilities.
EC-Council
Penetration Testing Stages
The pen testing process can be broken down into five stages.
EC-Council
01
02
03
04
05
PENETRATION
TESTING STAGES
Planning and reconnaissance
Test goals are defined and intelligence is
gathered.
Scanning
Scanning tools are used to understand
how a target responds to intrusions.
Gaining access
Web application attacks are staged to
uncover a target's vulnerabilities.
Maintaining access
APTS are imitated to see if a
vulnerabiliy can be used to maintain
access.
Analysis and WAF
configuration
Results are used to configure
WAF settings before testing is
run again.
1. Planning and reconnaissance
The first stage involves:
• Defining the scope and goals of a test, including the
systems to be addressed and the testing methods to be
used.
• Gathering intelligence (e.g., network and domain
mail server) to better understand how a target works
and its potential vulnerabilities.
EC-Council
2. Scanning
Understand how the target application will respond to
intrusion attempts:
• Static analysis – Inspecting an application’s code to
estimate the way it behaves while running.
• Dynamic analysis – Inspecting an application’s code in a
running state.
3. Gaining Access
This stage uses web application attacks, such as cross-site
scripting, SQL injection and backdoors, to uncover a target’s
vulnerabilities. Testers then try and exploit these vulnerabilities,
typically by escalating privileges, stealing data, intercepting
traffic, etc., to understand the damage they can cause.
4. Maintaining access
The goal of this stage is to see if the vulnerability can be used to
achieve a persistent presence in the exploited system— long
enough for a bad actor to gain in-depth access. The idea is to
imitate advanced persistent threats, which often remain in a
system for months in order to steal an organization’s most
sensitive data.
EC-Council
5. Analysis
The results of the penetration test are then compiled into a report detailing:
• Specific vulnerabilities that were exploited
• Sensitive data that was accessed
• The amount of time the pen tester was able to remain in the system undetected
This information is then analyzed by security personnel to help configure an enterprise’s WAF settings and other
application security solutions to patch vulnerabilities and protect against future attacks.
EC-Council
Penetration Testing Methods
External testing:
External penetration tests target the
assets of a company that are visible
on the internet, e.g., the web
application itself, the company
website, and email and domain name
servers (DNS). The goal is to gain
access and extract valuable data.
Internal testing:
In an internal test, a tester with access
to an application behind its firewall
simulates an attack by a malicious
insider. This isn’t necessarily simulating
a rogue employee. A common
starting scenario can be an employee
whose credentials were stolen due to
a phising attack
Penetration Testing
Methods (contd.)
EC-Council
• Blind testing: In a blind test, a tester is only given the name of the
enterprise that’s being targeted. This gives security personnel a
real-time look into how an actual application assault would take
place.
• Double-blind testing: In a double-blind test, security personnel
have no prior knowledge of the simulated attack. As in the real
world, they won’t have any time to shore up their defenses before
an attempted breach.
• Targeted testing: In this scenario, both the tester and security
personnel work together and keep each other appraised of their
movements. This is a valuable training exercise that provides a
security team with real-time feedback from a hacker’s point of view.
Penetration Testing & Web
Application Firewalls
EC-Council
• Penetration testing and WAFs are exclusive, yet mutually beneficial
security measures.
• For many kinds of pen testing (except for blind and double-blind
tests), the tester is likely to use WAF data, such as logs, to locate
and exploit an application’s weak spots.
• In turn, WAF administrators can benefit from pen testing data. After
a test is completed, WAF configurations can be updated to secure
against the weak spots discovered in the test.
Thank You For Watching!
Want to learn Pentesting?
Join our next batch for penetration testing certification at EC-Council

More Related Content

PPTX
Red Team vs. Blue Team
PPTX
Skills that make network security training easy
PPTX
6 Most Popular Threat Modeling Methodologies
PDF
Ctia course outline
PDF
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
PPTX
Application Threat Modeling
PPTX
Introduction To Vulnerability Assessment & Penetration Testing
PPTX
Vulnerability Assessment
Red Team vs. Blue Team
Skills that make network security training easy
6 Most Popular Threat Modeling Methodologies
Ctia course outline
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Application Threat Modeling
Introduction To Vulnerability Assessment & Penetration Testing
Vulnerability Assessment

What's hot (20)

PPTX
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
PPTX
Vulnerability Assesment
PPT
The Security Vulnerability Assessment Process & Best Practices
PDF
Presentation on vulnerability analysis
PPTX
How to Detect a Cryptolocker Infection with AlienVault USM
PPTX
SOC Duties and Training Needs
PDF
Application Threat Modeling
PPTX
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
PDF
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
PPTX
External Attacks Against Pivileged Accounts
PPTX
Vulnerability assessment & Penetration testing Basics
PPTX
PPTX
Vulnerability assessment and penetration testing
PPTX
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
PDF
Security Testing for Test Professionals
PPTX
Threat Modeling Web Applications
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
DOCX
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
PPTX
Classification of vulnerabilities
PPTX
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
Vulnerability Assesment
The Security Vulnerability Assessment Process & Best Practices
Presentation on vulnerability analysis
How to Detect a Cryptolocker Infection with AlienVault USM
SOC Duties and Training Needs
Application Threat Modeling
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
External Attacks Against Pivileged Accounts
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment and penetration testing
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
Security Testing for Test Professionals
Threat Modeling Web Applications
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Classification of vulnerabilities
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Ad

Similar to A Brief Introduction to Penetration Testing (20)

PDF
The Art of Penetration Testing in Cybersecurity.
PDF
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
PPTX
Security Testing.pptx
PDF
Security Testing Approach for Web Application Testing.pdf
PPT
CohenNancyPresentation.ppt
PPTX
Appsec2013 assurance tagging-robert martin
DOCX
Best Practices, Types, and Tools for Security Testing in 2023.docx
PPTX
What is penetration testing
PDF
Penetration Testing Services_ Comprehensive Guide 2024.pdf
PPTX
M.Tech. IDS Lecture-Mid Term.pptx
PPTX
M.Tech. IDS Lecture by graphic era university
PPTX
PDF
Top 20 certified ethical hacker interview questions and answer
PDF
pentration testing.pdf
PPTX
Pen Testing Explained
DOCX
Black Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docx
PPTX
information system security --internet cyber security
PPTX
Enhancing Cybersecurity: Mitigating Common Threats
PDF
What is Security Testing Presentation download
PDF
Penetration Testing: An Essential Guide to Cybersecurity
The Art of Penetration Testing in Cybersecurity.
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Security Testing.pptx
Security Testing Approach for Web Application Testing.pdf
CohenNancyPresentation.ppt
Appsec2013 assurance tagging-robert martin
Best Practices, Types, and Tools for Security Testing in 2023.docx
What is penetration testing
Penetration Testing Services_ Comprehensive Guide 2024.pdf
M.Tech. IDS Lecture-Mid Term.pptx
M.Tech. IDS Lecture by graphic era university
Top 20 certified ethical hacker interview questions and answer
pentration testing.pdf
Pen Testing Explained
Black Box Pentest Uncovering Vulnerabilities in Internal Pen Tests.docx
information system security --internet cyber security
Enhancing Cybersecurity: Mitigating Common Threats
What is Security Testing Presentation download
Penetration Testing: An Essential Guide to Cybersecurity
Ad

More from EC-Council (20)

PPTX
Can Cloud Solutions Transform Network Security
PPTX
What makes blockchain secure: Key Characteristics & Security Architecture
PPTX
Journey from CCNA to Certified Network Defender v2
PDF
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
PPTX
Types of Malware (CEH v11)
PDF
Why Threat Intelligence Is a Must for Every Organization?
PDF
Why Digital Forensics as a Career?
PPTX
Cryptography in Blockchain
PPTX
Computer Hacking Forensic Investigator - CHFI
PPTX
Pasta Threat Modeling
PPTX
Blockchain: Fundamentals & Opportunities​
PPTX
Cybersecurity Audit
PPTX
Third Party Risk Management
PPTX
Types of malware threats
PPTX
What's new in​ CEHv11?
PPTX
Business Continuity & Disaster Recovery
PPTX
Threat Intelligence Data Collection & Acquisition
PPTX
Most Common Application Level Attacks
PPTX
Information Security Management
PPTX
Cyber Threat Modeling
Can Cloud Solutions Transform Network Security
What makes blockchain secure: Key Characteristics & Security Architecture
Journey from CCNA to Certified Network Defender v2
HOW TO TROUBLESHOOT SECURITY INCIDENTS IN A CLOUD ENVIRONMENT?
Types of Malware (CEH v11)
Why Threat Intelligence Is a Must for Every Organization?
Why Digital Forensics as a Career?
Cryptography in Blockchain
Computer Hacking Forensic Investigator - CHFI
Pasta Threat Modeling
Blockchain: Fundamentals & Opportunities​
Cybersecurity Audit
Third Party Risk Management
Types of malware threats
What's new in​ CEHv11?
Business Continuity & Disaster Recovery
Threat Intelligence Data Collection & Acquisition
Most Common Application Level Attacks
Information Security Management
Cyber Threat Modeling

Recently uploaded (20)

PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Open Quiz Monsoon Mind Game Prelims.pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
master seminar digital applications in india
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Introduction-to-Social-Work-by-Leonora-Serafeca-De-Guzman-Group-2.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
STATICS OF THE RIGID BODIES Hibbelers.pdf
O7-L3 Supply Chain Operations - ICLT Program
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
O5-L3 Freight Transport Ops (International) V1.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Microbial disease of the cardiovascular and lymphatic systems
Open Quiz Monsoon Mind Game Prelims.pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
master seminar digital applications in india
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Pharmacology of Heart Failure /Pharmacotherapy of CHF
01-Introduction-to-Information-Management.pdf
Microbial diseases, their pathogenesis and prophylaxis
Introduction-to-Social-Work-by-Leonora-Serafeca-De-Guzman-Group-2.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPH.pptx obstetrics and gynecology in nursing
TR - Agricultural Crops Production NC III.pdf
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Renaissance Architecture: A Journey from Faith to Humanism

A Brief Introduction to Penetration Testing

  • 1. What is Penetration Testing • Step by Step Process & Methods What is Penetration Testing Step by Step Process & Methods EC-Council
  • 2. Penetration Test Means... • A penetration test is a simulated cyber-attack against your system to check for exploitable vulnerabilities. • Pen testing can involve the attempted breaching of any number of application systems, (e.g., application protocol interfaces (APIs), frontend/backend servers, etc.) to uncover vulnerabilities, such as Un sanitized inputs that are susceptible to code injection attacks. • Insights provided by the penetration test can be used to fine- tune your WAF security policies and patch detected vulnerabilities. EC-Council
  • 3. Penetration Testing Stages The pen testing process can be broken down into five stages. EC-Council 01 02 03 04 05 PENETRATION TESTING STAGES Planning and reconnaissance Test goals are defined and intelligence is gathered. Scanning Scanning tools are used to understand how a target responds to intrusions. Gaining access Web application attacks are staged to uncover a target's vulnerabilities. Maintaining access APTS are imitated to see if a vulnerabiliy can be used to maintain access. Analysis and WAF configuration Results are used to configure WAF settings before testing is run again.
  • 4. 1. Planning and reconnaissance The first stage involves: • Defining the scope and goals of a test, including the systems to be addressed and the testing methods to be used. • Gathering intelligence (e.g., network and domain mail server) to better understand how a target works and its potential vulnerabilities. EC-Council 2. Scanning Understand how the target application will respond to intrusion attempts: • Static analysis – Inspecting an application’s code to estimate the way it behaves while running. • Dynamic analysis – Inspecting an application’s code in a running state. 3. Gaining Access This stage uses web application attacks, such as cross-site scripting, SQL injection and backdoors, to uncover a target’s vulnerabilities. Testers then try and exploit these vulnerabilities, typically by escalating privileges, stealing data, intercepting traffic, etc., to understand the damage they can cause. 4. Maintaining access The goal of this stage is to see if the vulnerability can be used to achieve a persistent presence in the exploited system— long enough for a bad actor to gain in-depth access. The idea is to imitate advanced persistent threats, which often remain in a system for months in order to steal an organization’s most sensitive data.
  • 5. EC-Council 5. Analysis The results of the penetration test are then compiled into a report detailing: • Specific vulnerabilities that were exploited • Sensitive data that was accessed • The amount of time the pen tester was able to remain in the system undetected This information is then analyzed by security personnel to help configure an enterprise’s WAF settings and other application security solutions to patch vulnerabilities and protect against future attacks.
  • 6. EC-Council Penetration Testing Methods External testing: External penetration tests target the assets of a company that are visible on the internet, e.g., the web application itself, the company website, and email and domain name servers (DNS). The goal is to gain access and extract valuable data. Internal testing: In an internal test, a tester with access to an application behind its firewall simulates an attack by a malicious insider. This isn’t necessarily simulating a rogue employee. A common starting scenario can be an employee whose credentials were stolen due to a phising attack
  • 7. Penetration Testing Methods (contd.) EC-Council • Blind testing: In a blind test, a tester is only given the name of the enterprise that’s being targeted. This gives security personnel a real-time look into how an actual application assault would take place. • Double-blind testing: In a double-blind test, security personnel have no prior knowledge of the simulated attack. As in the real world, they won’t have any time to shore up their defenses before an attempted breach. • Targeted testing: In this scenario, both the tester and security personnel work together and keep each other appraised of their movements. This is a valuable training exercise that provides a security team with real-time feedback from a hacker’s point of view.
  • 8. Penetration Testing & Web Application Firewalls EC-Council • Penetration testing and WAFs are exclusive, yet mutually beneficial security measures. • For many kinds of pen testing (except for blind and double-blind tests), the tester is likely to use WAF data, such as logs, to locate and exploit an application’s weak spots. • In turn, WAF administrators can benefit from pen testing data. After a test is completed, WAF configurations can be updated to secure against the weak spots discovered in the test.
  • 9. Thank You For Watching! Want to learn Pentesting? Join our next batch for penetration testing certification at EC-Council