SlideShare a Scribd company logo
PENETRATION TESTING 
From: Sumtrix 
(A Cyber Security Consultancy) 
By: Mayank Singh
About PENETRATION TESTING 
▪ A Penetration Testing, also known as a Pen Test is a legal attempt at gaining access 
to your protected computer systems or networks, often conducted by a third party 
organization. The purpose of the test is to identify security vulnerabilities and then 
attempt to successfully exploit them in order to gain some form of access to the 
network or computer system. 
▪ Two of the more common types of penetration tests are black box and white box 
penetration testing. 
In a black box test, no prior knowledge of the corporate system is given to the 
third party tester. This is often the most preferred test as it is an accurate 
simulation of how an outsider/hacker would see the network and attempt to break 
into it. 
A white box test on the other hand is when the third party organisation is given 
full IP information, network diagrams and source code files to the software, 
networks and systems, in a bid to find weaknesses from any of the available 
information. 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
PENETRATION TESTING- SOFTWARE'S / TOOLS 
/ UTILITIES 
▪ Exploitation 
▪ Framework 
▪ Social Engineering Attack Tools 
▪ SQL Injection Detection Tools 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
EXPLOITATION TOOL 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
EXPLOITATION TOOL 
Continue… 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
FRAMEWORK 
▪ Metasploit 
▪ Mercury 
▪ OpenSCAP 
▪ rsif 
▪ Phemail.py 
▪ Xenotix XSS Exploit Framework 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
SOCIAL ENGINEERING ATTACK TOOLS 
• Social-Engineering Toolkit (SET) 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
SQL INJECTION DETECTION TOOLS 
▪ CAT.NET 
▪ Dotdefender 
▪ Microsoft Url Scan 
▪ GreenSql 
▪ HP Scrawlr 
▪ Sqlstripes 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
ThankYou 
Be Secure Always 
For more Updates: 
www.sumtrix.com 
www.facebook.com/sumtrix14 
Email:info@sumtrix.com 
Sumtrix 
A Cyber Security Consultancy 
WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh

More Related Content

PPTX
Social engineering presentation
PDF
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
PDF
Footprinting
PDF
What is Penetration & Penetration test ?
PPTX
Digital security
PPTX
Rotor machine,subsitution technique
PDF
Incident Response
PPTX
Introduction To Vulnerability Assessment & Penetration Testing
Social engineering presentation
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
Footprinting
What is Penetration & Penetration test ?
Digital security
Rotor machine,subsitution technique
Incident Response
Introduction To Vulnerability Assessment & Penetration Testing

What's hot (20)

PPTX
Advanced persistent threat (apt)
PPTX
Cyber security
PPTX
Network Penetration Testing
PPTX
When Cyber Security Meets Machine Learning
PPTX
Physical security
PPTX
case study on cyber crime
PDF
Hacking ético [Pentest]
PDF
Vulnerability Management
PDF
Social Engineering Basics
PPTX
Vulnerability assessment and penetration testing
PDF
Initial Response and Forensic Duplication
PDF
Tipos de Ataques Informaticos
PDF
Social engineering attacks
PPTX
Cyber Terrorism
PDF
The Rise of the Purple Team
PPTX
Social engineering-Attack of the Human Behavior
PPTX
Cyber security
PPTX
Red Team vs. Blue Team
PPT
AN INTRUSION DETECTION SYSTEM
PDF
Securing Industrial Control System
Advanced persistent threat (apt)
Cyber security
Network Penetration Testing
When Cyber Security Meets Machine Learning
Physical security
case study on cyber crime
Hacking ético [Pentest]
Vulnerability Management
Social Engineering Basics
Vulnerability assessment and penetration testing
Initial Response and Forensic Duplication
Tipos de Ataques Informaticos
Social engineering attacks
Cyber Terrorism
The Rise of the Purple Team
Social engineering-Attack of the Human Behavior
Cyber security
Red Team vs. Blue Team
AN INTRUSION DETECTION SYSTEM
Securing Industrial Control System
Ad

Viewers also liked (20)

PPTX
Penetration And its Tool
PPT
Microsoft Powerpoint Presentation- Charity Hope Ponce C Fund 1-H
PPTX
Atl 12 fi̇zi̇hi̇n dogasi bi̇lal şahi̇n
PPTX
Creating your-first-product-in-click bank
PPTX
continental theory and plate tectonic
PPT
Microsoft Powerpoint Presentation- Charity Hope Ponce Cfund 1-H
PPTX
Making Strong Security Easier
PDF
Peace - Niño Josele (Guitar Cover)
PPTX
Bolestifull
PPT
Exim process pp1
DOC
Hsg anh. vong 1.2012 2013
PDF
Livio Gianola Ejercicio n° 1, 2, 3 - arr.: Alfonso Rubio Rodríguez
PDF
Operating Docker
PDF
Ida e Volta (Cover Alfonso Rubio Rodríguez)
PPT
OSSIM and OMAR in the DoD/IC
PPTX
Whats New in OSSIM v2.2?
PPTX
Integrated Tools in OSSIM
PPTX
Solving the Open Source Security Puzzle
PDF
Linux Hardening
Penetration And its Tool
Microsoft Powerpoint Presentation- Charity Hope Ponce C Fund 1-H
Atl 12 fi̇zi̇hi̇n dogasi bi̇lal şahi̇n
Creating your-first-product-in-click bank
continental theory and plate tectonic
Microsoft Powerpoint Presentation- Charity Hope Ponce Cfund 1-H
Making Strong Security Easier
Peace - Niño Josele (Guitar Cover)
Bolestifull
Exim process pp1
Hsg anh. vong 1.2012 2013
Livio Gianola Ejercicio n° 1, 2, 3 - arr.: Alfonso Rubio Rodríguez
Operating Docker
Ida e Volta (Cover Alfonso Rubio Rodríguez)
OSSIM and OMAR in the DoD/IC
Whats New in OSSIM v2.2?
Integrated Tools in OSSIM
Solving the Open Source Security Puzzle
Linux Hardening
Ad

Similar to Penetration Testing (20)

PPTX
Hacking and Penetration Testing - a beginners guide
PPTX
Ethical hacking and cyber security intro
PPT
Ethical Hacking
PPTX
How to hack or what is ethical hacking
PPTX
Introduction ethical hacking
PPT
Footprintig (Haching)
PPT
Footprintig(Haching)
PPTX
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
PDF
What is ethical hacking and complete cyber security presentation on this file
PDF
Network Penetration Testing Service
PDF
Ethical Hacking Interview Questions and Answers.pdf
PPTX
Ethical Hacking
PPTX
Ethical Hacking justvamshi .pptx
PDF
Practical White Hat Hacker Training - Introduction to Cyber Security
PPTX
Malware Analysis
PPTX
Ehtical hacking
PPTX
Web hacking 1.0
PPTX
Password Stealing & Enhancing User Authentication Using Opass Protocol
DOCX
Hacking
DOCX
Hacking
Hacking and Penetration Testing - a beginners guide
Ethical hacking and cyber security intro
Ethical Hacking
How to hack or what is ethical hacking
Introduction ethical hacking
Footprintig (Haching)
Footprintig(Haching)
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
What is ethical hacking and complete cyber security presentation on this file
Network Penetration Testing Service
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking
Ethical Hacking justvamshi .pptx
Practical White Hat Hacker Training - Introduction to Cyber Security
Malware Analysis
Ehtical hacking
Web hacking 1.0
Password Stealing & Enhancing User Authentication Using Opass Protocol
Hacking
Hacking

Penetration Testing

  • 1. PENETRATION TESTING From: Sumtrix (A Cyber Security Consultancy) By: Mayank Singh
  • 2. About PENETRATION TESTING ▪ A Penetration Testing, also known as a Pen Test is a legal attempt at gaining access to your protected computer systems or networks, often conducted by a third party organization. The purpose of the test is to identify security vulnerabilities and then attempt to successfully exploit them in order to gain some form of access to the network or computer system. ▪ Two of the more common types of penetration tests are black box and white box penetration testing. In a black box test, no prior knowledge of the corporate system is given to the third party tester. This is often the most preferred test as it is an accurate simulation of how an outsider/hacker would see the network and attempt to break into it. A white box test on the other hand is when the third party organisation is given full IP information, network diagrams and source code files to the software, networks and systems, in a bid to find weaknesses from any of the available information. WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 3. PENETRATION TESTING- SOFTWARE'S / TOOLS / UTILITIES ▪ Exploitation ▪ Framework ▪ Social Engineering Attack Tools ▪ SQL Injection Detection Tools WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 4. EXPLOITATION TOOL WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 5. EXPLOITATION TOOL Continue… WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 6. FRAMEWORK ▪ Metasploit ▪ Mercury ▪ OpenSCAP ▪ rsif ▪ Phemail.py ▪ Xenotix XSS Exploit Framework WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 7. SOCIAL ENGINEERING ATTACK TOOLS • Social-Engineering Toolkit (SET) WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 8. SQL INJECTION DETECTION TOOLS ▪ CAT.NET ▪ Dotdefender ▪ Microsoft Url Scan ▪ GreenSql ▪ HP Scrawlr ▪ Sqlstripes WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh
  • 9. ThankYou Be Secure Always For more Updates: www.sumtrix.com www.facebook.com/sumtrix14 Email:info@sumtrix.com Sumtrix A Cyber Security Consultancy WWW.SUMTRIX.COM Email:info@sumtrix.com November 2014 Mayank SIngh