PENETRATION TESTING 
From: Sumtrix 
(A Cyber Security Consultancy) 
By: Mayank Singh
About PENETRATION TESTING 
▪ A Penetration Testing, also known as a Pen Test is a legal attempt at gaining access 
to your protected computer systems or networks, often conducted by a third party 
organization. The purpose of the test is to identify security vulnerabilities and then 
attempt to successfully exploit them in order to gain some form of access to the 
network or computer system. 
▪ Two of the more common types of penetration tests are black box and white box 
penetration testing. 
In a black box test, no prior knowledge of the corporate system is given to the 
third party tester. This is often the most preferred test as it is an accurate 
simulation of how an outsider/hacker would see the network and attempt to break 
into it. 
A white box test on the other hand is when the third party organisation is given 
full IP information, network diagrams and source code files to the software, 
networks and systems, in a bid to find weaknesses from any of the available 
information. 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
PENETRATION TESTING- SOFTWARE'S / TOOLS 
/ UTILITIES 
▪ Exploitation 
▪ Framework 
▪ Social Engineering Attack Tools 
▪ SQL Injection Detection Tools 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
EXPLOITATION TOOL 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
EXPLOITATION TOOL 
Continue… 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
FRAMEWORK 
▪ Metasploit 
▪ Mercury 
▪ OpenSCAP 
▪ rsif 
▪ Phemail.py 
▪ Xenotix XSS Exploit Framework 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
SOCIAL ENGINEERING ATTACK TOOLS 
• Social-Engineering Toolkit (SET) 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
SQL INJECTION DETECTION TOOLS 
▪ CAT.NET 
▪ Dotdefender 
▪ Microsoft Url Scan 
▪ GreenSql 
▪ HP Scrawlr 
▪ Sqlstripes 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
ThankYou 
Be Secure Always 
For more Updates: 
www.sumtrix.com 
www.facebook.com/sumtrix14 
Email:info@sumtrix.com 
Sumtrix 
A Cyber Security Consultancy 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh

More Related Content

PPTX
Pen Testing Explained
PPTX
Ethical Hacking & Penetration Testing
PPTX
Penetration Testing
PPTX
What is Penetration Testing?
PPT
Networking and penetration testing
PPTX
Vulnerability and Assessment Penetration Testing
PDF
Penetration testing & Ethical Hacking
PPTX
Penetration testing reporting and methodology
Pen Testing Explained
Ethical Hacking & Penetration Testing
Penetration Testing
What is Penetration Testing?
Networking and penetration testing
Vulnerability and Assessment Penetration Testing
Penetration testing & Ethical Hacking
Penetration testing reporting and methodology

What's hot (20)

PPTX
Ethical Hacking n VAPT presentation by Suvrat jain
PPT
Penetration Testing Basics
PPTX
Vulnerability assessment and penetration testing
PPTX
VAPT, Ethical Hacking and Laws in India by prashant mali
PDF
Penetration Testing Services
PDF
VAPT Services by prime
PDF
Penetration Testing Services, Penetration Testing
PDF
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
PPTX
Vulnerability assessment & Penetration testing Basics
PPTX
Security testing fundamentals
PPTX
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
PPT
Ethical Hacking and Penetration Testing
PDF
Introduction to penetration testing
PDF
Introduction to Security Testing
PPTX
MITRE ATT&CK framework
PPTX
OTG - Practical Hands on VAPT
PDF
Threats, Threat Modeling and Analysis
PPTX
What is security testing and why it is so important?
PDF
Leveraging red for defense
PDF
The Rise of the Purple Team
Ethical Hacking n VAPT presentation by Suvrat jain
Penetration Testing Basics
Vulnerability assessment and penetration testing
VAPT, Ethical Hacking and Laws in India by prashant mali
Penetration Testing Services
VAPT Services by prime
Penetration Testing Services, Penetration Testing
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Vulnerability assessment & Penetration testing Basics
Security testing fundamentals
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
Ethical Hacking and Penetration Testing
Introduction to penetration testing
Introduction to Security Testing
MITRE ATT&CK framework
OTG - Practical Hands on VAPT
Threats, Threat Modeling and Analysis
What is security testing and why it is so important?
Leveraging red for defense
The Rise of the Purple Team
Ad

Similar to Penetration And its Tool (20)

PDF
Why Penetration Testing is Crucial for Cybersecurity
PDF
What is penetration testing, and why does your business need it.
PDF
The Fundamentals of Penetration Testing.pptx (1).pdf
PPTX
Introduction to penetration testing
PDF
How to Conduct Penetration Testing for Websites.pptx.pdf
PPTX
Introduction To Vulnerability Assessment & Penetration Testing
PDF
Understanding the Basics of Penetration Testing Services.pdf
PDF
Types _of_ Penetration_ Testing_ Training
PPTX
WTF is Penetration Testing v.2
PDF
01_Metasploit - The Elixir of Network Security
PDF
1. penetration-testing-cyber51
PDF
Why Penetration Testing is Important- digitdefence
PPTX
Introduction To Ethical Hacking
PDF
Vulnerability Assessment.pdf Vulnerability Assessment
PDF
Common Tools Used in Penetration Testing.pptx (1).pdf
PDF
What is Penetration Testing.presentatio.pdf
PPTX
Access control attacks
PDF
Vulnerability Assessment and Penetration Testing Report
PDF
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
PPTX
Why Penetration Testing is Crucial for Cybersecurity
What is penetration testing, and why does your business need it.
The Fundamentals of Penetration Testing.pptx (1).pdf
Introduction to penetration testing
How to Conduct Penetration Testing for Websites.pptx.pdf
Introduction To Vulnerability Assessment & Penetration Testing
Understanding the Basics of Penetration Testing Services.pdf
Types _of_ Penetration_ Testing_ Training
WTF is Penetration Testing v.2
01_Metasploit - The Elixir of Network Security
1. penetration-testing-cyber51
Why Penetration Testing is Important- digitdefence
Introduction To Ethical Hacking
Vulnerability Assessment.pdf Vulnerability Assessment
Common Tools Used in Penetration Testing.pptx (1).pdf
What is Penetration Testing.presentatio.pdf
Access control attacks
Vulnerability Assessment and Penetration Testing Report
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
Ad

Recently uploaded (20)

PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
Empowerment Technology for Senior High School Guide
PDF
International_Financial_Reporting_Standa.pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Trump Administration's workforce development strategy
PPTX
20th Century Theater, Methods, History.pptx
PDF
IGGE1 Understanding the Self1234567891011
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
Computer Architecture Input Output Memory.pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
202450812 BayCHI UCSC-SV 20250812 v17.pptx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Virtual and Augmented Reality in Current Scenario
Empowerment Technology for Senior High School Guide
International_Financial_Reporting_Standa.pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Trump Administration's workforce development strategy
20th Century Theater, Methods, History.pptx
IGGE1 Understanding the Self1234567891011
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Computer Architecture Input Output Memory.pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Hazard Identification & Risk Assessment .pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Paper A Mock Exam 9_ Attempt review.pdf.
Uderstanding digital marketing and marketing stratergie for engaging the digi...

Penetration And its Tool

  • 1. PENETRATION TESTING From: Sumtrix (A Cyber Security Consultancy) By: Mayank Singh
  • 2. About PENETRATION TESTING ▪ A Penetration Testing, also known as a Pen Test is a legal attempt at gaining access to your protected computer systems or networks, often conducted by a third party organization. The purpose of the test is to identify security vulnerabilities and then attempt to successfully exploit them in order to gain some form of access to the network or computer system. ▪ Two of the more common types of penetration tests are black box and white box penetration testing. In a black box test, no prior knowledge of the corporate system is given to the third party tester. This is often the most preferred test as it is an accurate simulation of how an outsider/hacker would see the network and attempt to break into it. A white box test on the other hand is when the third party organisation is given full IP information, network diagrams and source code files to the software, networks and systems, in a bid to find weaknesses from any of the available information. WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 3. PENETRATION TESTING- SOFTWARE'S / TOOLS / UTILITIES ▪ Exploitation ▪ Framework ▪ Social Engineering Attack Tools ▪ SQL Injection Detection Tools WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 4. EXPLOITATION TOOL WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 5. EXPLOITATION TOOL Continue… WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 6. FRAMEWORK ▪ Metasploit ▪ Mercury ▪ OpenSCAP ▪ rsif ▪ Phemail.py ▪ Xenotix XSS Exploit Framework WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 7. SOCIAL ENGINEERING ATTACK TOOLS • Social-Engineering Toolkit (SET) WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 8. SQL INJECTION DETECTION TOOLS ▪ CAT.NET ▪ Dotdefender ▪ Microsoft Url Scan ▪ GreenSql ▪ HP Scrawlr ▪ Sqlstripes WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 9. ThankYou Be Secure Always For more Updates: www.sumtrix.com www.facebook.com/sumtrix14 Email:info@sumtrix.com Sumtrix A Cyber Security Consultancy WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh