SlideShare a Scribd company logo
29/11/2016 Penetration Testing (1)
file:///home/firefly/meetup/metasploit.html#(1) 1/12
Penetration Testing
ASHOKKUMAR
Last updated 2016­11­29 09:38:58 IST
29/11/2016 Penetration Testing (1)
file:///home/firefly/meetup/metasploit.html#(1) 2/12
Contents
Introduction
Need of pen test
Pen test Phases
Tranditional Pen test
About Metasploit
Key Terms of Metasploit
Walkthrough of Metasploit
29/11/2016 Penetration Testing (1)
file:///home/firefly/meetup/metasploit.html#(1) 3/12
Introduction
Pen Testing­ Testing a computer system, network or Web application to find 
vulnerabilities that an attacker could exploit.
These vulnerabilities may exist in operating systems, service and application flaws, 
improper configurations, or risky end­user behavior.
Overt Pen Testing ­ Security testing performed with the knowledge of the organization.
Covert Pen Testing ­ Security testing performed without the knowledge of the organization.
29/11/2016 Penetration Testing (1)
file:///home/firefly/meetup/metasploit.html#(1) 4/12
Need of pen test
Protect critical infrastructure to prevent data breaches.
Pen Test is the effective ways to identify weaknesses and deficiencies.
29/11/2016 Penetration Testing (1)
file:///home/firefly/meetup/metasploit.html#(1) 5/12
Pen test Phases
Intelligence Gathering
Threat Modeling
Vulnerability Analysis
Exploitation
Reporting
29/11/2016 Penetration Testing (1)
file:///home/firefly/meetup/metasploit.html#(1) 6/12
Tranditional Pen test
Public Exploit Gathering
Change Offset
Replace Shellcode
29/11/2016 Penetration Testing (1)
file:///home/firefly/meetup/metasploit.html#(1) 7/12
About Metasploit
The Metasploit Framework is a program and sub­project developed by Metasploit LLC.
Initially created in 2003 in the Perl programming language, then re­written in the 
Ruby Programming Language.
An Open source platform for writing security tools and exploits
29/11/2016 Penetration Testing (1)
file:///home/firefly/meetup/metasploit.html#(1) 8/12
Key Terms of Metasploit
System exploitation ­ Scanning for a computer that can be compromised.
Payload­ Code that to be executed in the Targeted machine.
Listening ­ Component within Metasploit that waits for an incoming connection.
29/11/2016 Penetration Testing (1)
file:///home/firefly/meetup/metasploit.html#(1) 9/12
» Metasploit Interfaces
Msfconsole
Msfcli
Armitage
29/11/2016 Penetration Testing (1)
file:///home/firefly/meetup/metasploit.html#(1) 10/12
Walkthrough of Metasploit
Load Metasploit
Use exploit
SET Payload
Execute
29/11/2016 Penetration Testing (1)
file:///home/firefly/meetup/metasploit.html#(1) 11/12
References
Metasploit ­ The Penetration Tester’s Guide by David Kennedy, Jim O’Gorman, 
Devon Kearns, and Mati Aharoni.
http://www.dafthack.com/basic­exploit­mod­part­2
https://www.offensive­security.com/community­projects/the­exploit­database
29/11/2016 Penetration Testing (1)
file:///home/firefly/meetup/metasploit.html#(1) 12/12
Thank you

More Related Content

PDF
Metaploit
PPTX
Metasploit
PPTX
Introduction To Exploitation & Metasploit
PPT
Automated Penetration Testing With The Metasploit Framework
PPTX
Metasploit framwork
PDF
iCrOSS 2013_Pentest
PPTX
Metasploit
PDF
Lightning Talk: Security matters @ploneconf 2014
Metaploit
Metasploit
Introduction To Exploitation & Metasploit
Automated Penetration Testing With The Metasploit Framework
Metasploit framwork
iCrOSS 2013_Pentest
Metasploit
Lightning Talk: Security matters @ploneconf 2014

What's hot (14)

PDF
Pentest with Metasploit
PPTX
Metasploit For Beginners
PDF
Metasploit for Penetration Testing: Beginner Class
PPTX
Metasploit
PPT
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
PPTX
Metasploit (Module-1) - Getting Started With Metasploit
PDF
Pen-Testing with Metasploit
PDF
SSMF (Security Scope Metasploit Framework) - Course Syllabus
PDF
Metasploit Humla for Beginner
PPTX
NIC 2017 - Attack and detection in Windows Environments
PPTX
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
Pentest with Metasploit
Metasploit For Beginners
Metasploit for Penetration Testing: Beginner Class
Metasploit
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
Metasploit (Module-1) - Getting Started With Metasploit
Pen-Testing with Metasploit
SSMF (Security Scope Metasploit Framework) - Course Syllabus
Metasploit Humla for Beginner
NIC 2017 - Attack and detection in Windows Environments
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
Ad

Viewers also liked (20)

PPTX
kevin's powerpoint chapt 6
PPTX
Entropy and denial of service attacks
PDF
Penetration testing the cloud - vlad gostom
PDF
Managing Jenkins with Python
DOCX
Research Paper
PDF
Trabalho Multidisciplinar com Africanidade e Cultura Indígena
PPTX
Social media (data) strategies
PDF
[Mobile Day HCM] Lessons Learn from Top Mobile App in Vietnam
PPTX
mapa conceptual
PDF
Introduction VAUUM, Freezing, XID wraparound
PDF
Getting it Right: What You Need to Know about Nonprofit Executive Compensation
PPS
Aula taller
PDF
Regulamento Bom pra tudo
PDF
VESTIBULAR UPE SSA 1 - PRIMEIRO DIA ABSTENÇÃO
DOCX
ORIG Client SMHRSI
PPTX
Reglamento Estudiantil UPC
PDF
Google in education_uk_summit_2013
PPT
M1 PPT
PPTX
Job Hunting
kevin's powerpoint chapt 6
Entropy and denial of service attacks
Penetration testing the cloud - vlad gostom
Managing Jenkins with Python
Research Paper
Trabalho Multidisciplinar com Africanidade e Cultura Indígena
Social media (data) strategies
[Mobile Day HCM] Lessons Learn from Top Mobile App in Vietnam
mapa conceptual
Introduction VAUUM, Freezing, XID wraparound
Getting it Right: What You Need to Know about Nonprofit Executive Compensation
Aula taller
Regulamento Bom pra tudo
VESTIBULAR UPE SSA 1 - PRIMEIRO DIA ABSTENÇÃO
ORIG Client SMHRSI
Reglamento Estudiantil UPC
Google in education_uk_summit_2013
M1 PPT
Job Hunting
Ad

Similar to Penetration testing (20)

PPTX
pen testing with msf.pptx
PPTX
Penetration testing using metasploit
PDF
01_Metasploit - The Elixir of Network Security
PDF
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
PDF
Pentesting with Metasploit
PDF
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
PPTX
Introduction to Metasploit
 
PPTX
Introduction to metasploit
 
PPTX
Penetration Testing.pptx
PPTX
Introduction To Ethical Hacking
PDF
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
PDF
Penetration testing tools and phases
PPTX
Metaploit
PDF
Metasploit Computer security testing tool
PDF
Metasploitdemoin cybersecurity demonstartion.pdf
PDF
The Art of Penetration Testing in Cybersecurity.
PPTX
Introduction to penetration testing
PDF
DEF CON 23 - Wesley McGrew - i hunt penetration testers
PPTX
Pentesting with linux
PDF
What is Penetration & Penetration test ?
pen testing with msf.pptx
Penetration testing using metasploit
01_Metasploit - The Elixir of Network Security
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
Pentesting with Metasploit
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Introduction to Metasploit
 
Introduction to metasploit
 
Penetration Testing.pptx
Introduction To Ethical Hacking
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Penetration testing tools and phases
Metaploit
Metasploit Computer security testing tool
Metasploitdemoin cybersecurity demonstartion.pdf
The Art of Penetration Testing in Cybersecurity.
Introduction to penetration testing
DEF CON 23 - Wesley McGrew - i hunt penetration testers
Pentesting with linux
What is Penetration & Penetration test ?

Recently uploaded (20)

PPT
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
UNIT - 3 Total quality Management .pptx
PPTX
Safety Seminar civil to be ensured for safe working.
PPT
introduction to datamining and warehousing
PPTX
UNIT 4 Total Quality Management .pptx
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PPTX
Current and future trends in Computer Vision.pptx
PPTX
introduction to high performance computing
PPTX
Nature of X-rays, X- Ray Equipment, Fluoroscopy
PDF
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPTX
Artificial Intelligence
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
Abrasive, erosive and cavitation wear.pdf
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Fundamentals of safety and accident prevention -final (1).pptx
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
UNIT - 3 Total quality Management .pptx
Safety Seminar civil to be ensured for safe working.
introduction to datamining and warehousing
UNIT 4 Total Quality Management .pptx
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Current and future trends in Computer Vision.pptx
introduction to high performance computing
Nature of X-rays, X- Ray Equipment, Fluoroscopy
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
Artificial Intelligence
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
Exploratory_Data_Analysis_Fundamentals.pdf
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Abrasive, erosive and cavitation wear.pdf

Penetration testing

  • 1. 29/11/2016 Penetration Testing (1) file:///home/firefly/meetup/metasploit.html#(1) 1/12 Penetration Testing ASHOKKUMAR Last updated 2016­11­29 09:38:58 IST
  • 2. 29/11/2016 Penetration Testing (1) file:///home/firefly/meetup/metasploit.html#(1) 2/12 Contents Introduction Need of pen test Pen test Phases Tranditional Pen test About Metasploit Key Terms of Metasploit Walkthrough of Metasploit
  • 3. 29/11/2016 Penetration Testing (1) file:///home/firefly/meetup/metasploit.html#(1) 3/12 Introduction Pen Testing­ Testing a computer system, network or Web application to find  vulnerabilities that an attacker could exploit. These vulnerabilities may exist in operating systems, service and application flaws,  improper configurations, or risky end­user behavior. Overt Pen Testing ­ Security testing performed with the knowledge of the organization. Covert Pen Testing ­ Security testing performed without the knowledge of the organization.
  • 4. 29/11/2016 Penetration Testing (1) file:///home/firefly/meetup/metasploit.html#(1) 4/12 Need of pen test Protect critical infrastructure to prevent data breaches. Pen Test is the effective ways to identify weaknesses and deficiencies.
  • 5. 29/11/2016 Penetration Testing (1) file:///home/firefly/meetup/metasploit.html#(1) 5/12 Pen test Phases Intelligence Gathering Threat Modeling Vulnerability Analysis Exploitation Reporting
  • 6. 29/11/2016 Penetration Testing (1) file:///home/firefly/meetup/metasploit.html#(1) 6/12 Tranditional Pen test Public Exploit Gathering Change Offset Replace Shellcode
  • 7. 29/11/2016 Penetration Testing (1) file:///home/firefly/meetup/metasploit.html#(1) 7/12 About Metasploit The Metasploit Framework is a program and sub­project developed by Metasploit LLC. Initially created in 2003 in the Perl programming language, then re­written in the  Ruby Programming Language. An Open source platform for writing security tools and exploits
  • 8. 29/11/2016 Penetration Testing (1) file:///home/firefly/meetup/metasploit.html#(1) 8/12 Key Terms of Metasploit System exploitation ­ Scanning for a computer that can be compromised. Payload­ Code that to be executed in the Targeted machine. Listening ­ Component within Metasploit that waits for an incoming connection.
  • 9. 29/11/2016 Penetration Testing (1) file:///home/firefly/meetup/metasploit.html#(1) 9/12 » Metasploit Interfaces Msfconsole Msfcli Armitage
  • 10. 29/11/2016 Penetration Testing (1) file:///home/firefly/meetup/metasploit.html#(1) 10/12 Walkthrough of Metasploit Load Metasploit Use exploit SET Payload Execute
  • 11. 29/11/2016 Penetration Testing (1) file:///home/firefly/meetup/metasploit.html#(1) 11/12 References Metasploit ­ The Penetration Tester’s Guide by David Kennedy, Jim O’Gorman,  Devon Kearns, and Mati Aharoni. http://www.dafthack.com/basic­exploit­mod­part­2 https://www.offensive­security.com/community­projects/the­exploit­database
  • 12. 29/11/2016 Penetration Testing (1) file:///home/firefly/meetup/metasploit.html#(1) 12/12 Thank you