What is Penetration testing ?
A vulnerability scanner runs from the end point of the
person inspecting the attack, to the surface in question. The software
compares details about the target attack surface to a database of
information about known security holes in services and ports, anomalies
in packet construction, and potential paths to exploitable programs or
scripts. The scanner software attempts to exploit each vulnerability that
Importance of penetration test :
 Security Audit
 A security audit just checks whether the organization is
following a set of standard security policies and procedures
 Vulnerability Assessment
A vulnerability assessment focuses on discovering the
vulnerabilities in the information system but provides no
indication if the vulnerabilities can be exploited or the amount
of damage that may result from the successful exploitation of
Penetration Testing
Penetration testing is a methodological approach to security
assessment that encompasses the security audit and
vulnerability assessment and demonstrates if the vulnerabilities
in system can be successfully exploited by attackers
Vulnerability Assesment
 A vulnerability assessment focuses on discovering the vulnerabilities in the
information system but provides no indication if the vulnerabilities can be
exploited or the amount of damage that may result from the successful
exploitation of the vulnerability
Vulnerability scanning vs. penetration testing
 Vulnerability scanning and penetration testing are often confused, but in fact
the two security procedures are quite different and are used for different
purposes.
 At the most basic level, vulnerability scanning aims to identify any systems
that are subject to known vulnerabilities, while a penetration test aims to
identify weaknesses in specific system configurations and organizational
processes and practices that can be exploited to compromise security.
Vulnerability management process
 This vulnerability management process involves:
 Identification of vulnerabilities
 Evaluation of the risk posed by any vulnerabilities identified
 Treatment of any identified vulnerabilities
 Reporting on vulnerabilities and how they have been handled
How it works
 A vulnerability scanner runs from the end point of the person inspecting the
attack, to the surface in question. The software compares details about the
target attack surface to a database of information about known security holes
in services and ports, anomalies in packet construction, and potential paths to
exploitable programs or scripts. The scanner software attempts to exploit each
vulnerability that is discovered.
Types of Penetration testing
 Interbal and external
 Blackbox, Whitebox, Greybox
 Announced, Unannounced,
 Passive, Active scans
 Automated , Manual
Methodology
Planning
Foot printing
Exploiting
Reporting
Application Penetration Testing
 Application Penetration Testing is an "ethical attack" intended to reveal the
effectiveness of an application's security controls by highlighting risks posed by actual
exploitable vulnerabilities. Pure Hacking offers a number of application penetration
testing services including:
 Web Application Penetration Testing
 Web Services Penetration Testing
 Mobile Application Penetration Testing
 Secure Code Review
Reporting structure
From top Management
 Title page
 Executive summary
For technical workers
 Title page
 Executive summary
 Test team Details
 Summary of vulnerabilities
 References
 Glossary
Content
 Executive Summary
 Scope of work
 Project objectives
 Assumption
 Timeline
 Summary of findings
 Summary of recommendation
 Methodology
Content (contd..)
 Planning
 Exploitation
 Reporting
 Detail Findings
 Detailed systems information
 Windows server information
 References
 Appendix
Conclusion
 This presentation is meant to share the importance of penetration testing on materials
which is one of the non-destructive methods found in common.
 The impact of vulnerability assessment and its needs are broadly elaborated through
this presentation.
 The types and the methodology involved in the penetration testing are elaborated.
 In final the reporting structure of penetration testing are also deeply discussed through
this presentation.
References :
 https://www.offensive-security.com/reports/sample-penetration-testing-report.pdf
 https://partneredsolutionsit.com/importance-of-vulnerability-scans/
Books :
 Penetration testing :Ahands on introduction to hacking by Georgia Weidman, published by
John wiley & sond Inc
 Penetration Testing for dummies by Robert shimonski , No starch press, San Francisco

More Related Content

PPTX
Vulnerability assessment and penetration testing
DOCX
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
DOCX
Backtrack manual Part1
DOCX
Comprehensive Vulnerability Assessments Process _ Aardwolf Security.docx
PPTX
Pentesting vs Vulnerability Scanning What’s the Difference.pptx
PDF
penetration testing
KEY
Vulnerability Ass... Penetrate What?
PDF
Types of Vulnerability Scanning An in depth investigation.pdf
Vulnerability assessment and penetration testing
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Backtrack manual Part1
Comprehensive Vulnerability Assessments Process _ Aardwolf Security.docx
Pentesting vs Vulnerability Scanning What’s the Difference.pptx
penetration testing
Vulnerability Ass... Penetrate What?
Types of Vulnerability Scanning An in depth investigation.pdf

Similar to Penetration testing -A systeamtic approch (20)

PPTX
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PDF
Introduction to Website Pentesting.pptx.pdf
PPTX
NETWORK PENETRATION TESTING
PPTX
Vulnerability and Penetration Testing
PPTX
Introduction to cyber security
PDF
website vulnerability scanner and reporter research paper
PPTX
UNIT I PPT.pptxsdVDSVDAVDSBGVGNhfzgnnzgdngfh
PDF
How to Conduct Penetration Testing for Websites.pptx.pdf
PDF
Securing Servers: A Guide to Penetration Testing
PPTX
Vapt life cycle
PDF
Penetration Testing Services_ Comprehensive Guide 2024.pdf
PDF
What is Penetration & Penetration test ?
PPTX
Introduction Vulnerability assessment and penetration testing.pptx
PPT
M Kamens Iia Financial Services Presentation At Disney
PPTX
penetration testing.pptx
PPTX
penetration testing.pptx
PPTX
Learn more about the Penetration Services
PDF
Web app penetration testing best methods tools used
PDF
Владимир Стыран - Пентест следующего поколения, который ваша компания не може...
PDF
Next generation pentest your company cannot buy
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
Introduction to Website Pentesting.pptx.pdf
NETWORK PENETRATION TESTING
Vulnerability and Penetration Testing
Introduction to cyber security
website vulnerability scanner and reporter research paper
UNIT I PPT.pptxsdVDSVDAVDSBGVGNhfzgnnzgdngfh
How to Conduct Penetration Testing for Websites.pptx.pdf
Securing Servers: A Guide to Penetration Testing
Vapt life cycle
Penetration Testing Services_ Comprehensive Guide 2024.pdf
What is Penetration & Penetration test ?
Introduction Vulnerability assessment and penetration testing.pptx
M Kamens Iia Financial Services Presentation At Disney
penetration testing.pptx
penetration testing.pptx
Learn more about the Penetration Services
Web app penetration testing best methods tools used
Владимир Стыран - Пентест следующего поколения, который ваша компания не може...
Next generation pentest your company cannot buy
Ad

More from GANAPATHY RAMAN G V (6)

PPTX
Parking Solutions based on IoT and AI.pptx
PPTX
System Security Plan for cycber sec.pptx
PPTX
System Security Plan with various aspects.pptx
PPTX
Blogs –An Overview with the scope of.pptx
PPTX
SOFTWARE QUALITY software development-520.pptx
PPT
Data Mining Cluster Analysis: Advanced Concepts and Algorithms
Parking Solutions based on IoT and AI.pptx
System Security Plan for cycber sec.pptx
System Security Plan with various aspects.pptx
Blogs –An Overview with the scope of.pptx
SOFTWARE QUALITY software development-520.pptx
Data Mining Cluster Analysis: Advanced Concepts and Algorithms
Ad

Recently uploaded (20)

PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
Empowerment Technology for Senior High School Guide
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
IGGE1 Understanding the Self1234567891011
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Introduction to pro and eukaryotes and differences.pptx
Unit 4 Computer Architecture Multicore Processor.pptx
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Practical Manual AGRO-233 Principles and Practices of Natural Farming
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Cambridge-Practice-Tests-for-IELTS-12.docx
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Empowerment Technology for Senior High School Guide
B.Sc. DS Unit 2 Software Engineering.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
IGGE1 Understanding the Self1234567891011
AI-driven educational solutions for real-life interventions in the Philippine...
Chinmaya Tiranga quiz Grand Finale.pdf
History, Philosophy and sociology of education (1).pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf

Penetration testing -A systeamtic approch

  • 1. What is Penetration testing ? A vulnerability scanner runs from the end point of the person inspecting the attack, to the surface in question. The software compares details about the target attack surface to a database of information about known security holes in services and ports, anomalies in packet construction, and potential paths to exploitable programs or scripts. The scanner software attempts to exploit each vulnerability that
  • 2. Importance of penetration test :  Security Audit  A security audit just checks whether the organization is following a set of standard security policies and procedures  Vulnerability Assessment A vulnerability assessment focuses on discovering the vulnerabilities in the information system but provides no indication if the vulnerabilities can be exploited or the amount of damage that may result from the successful exploitation of
  • 3. Penetration Testing Penetration testing is a methodological approach to security assessment that encompasses the security audit and vulnerability assessment and demonstrates if the vulnerabilities in system can be successfully exploited by attackers
  • 4. Vulnerability Assesment  A vulnerability assessment focuses on discovering the vulnerabilities in the information system but provides no indication if the vulnerabilities can be exploited or the amount of damage that may result from the successful exploitation of the vulnerability
  • 5. Vulnerability scanning vs. penetration testing  Vulnerability scanning and penetration testing are often confused, but in fact the two security procedures are quite different and are used for different purposes.  At the most basic level, vulnerability scanning aims to identify any systems that are subject to known vulnerabilities, while a penetration test aims to identify weaknesses in specific system configurations and organizational processes and practices that can be exploited to compromise security.
  • 6. Vulnerability management process  This vulnerability management process involves:  Identification of vulnerabilities  Evaluation of the risk posed by any vulnerabilities identified  Treatment of any identified vulnerabilities  Reporting on vulnerabilities and how they have been handled
  • 7. How it works  A vulnerability scanner runs from the end point of the person inspecting the attack, to the surface in question. The software compares details about the target attack surface to a database of information about known security holes in services and ports, anomalies in packet construction, and potential paths to exploitable programs or scripts. The scanner software attempts to exploit each vulnerability that is discovered.
  • 8. Types of Penetration testing  Interbal and external  Blackbox, Whitebox, Greybox  Announced, Unannounced,  Passive, Active scans  Automated , Manual
  • 10. Application Penetration Testing  Application Penetration Testing is an "ethical attack" intended to reveal the effectiveness of an application's security controls by highlighting risks posed by actual exploitable vulnerabilities. Pure Hacking offers a number of application penetration testing services including:  Web Application Penetration Testing  Web Services Penetration Testing  Mobile Application Penetration Testing  Secure Code Review
  • 11. Reporting structure From top Management  Title page  Executive summary For technical workers  Title page  Executive summary  Test team Details  Summary of vulnerabilities  References  Glossary
  • 12. Content  Executive Summary  Scope of work  Project objectives  Assumption  Timeline  Summary of findings  Summary of recommendation  Methodology
  • 13. Content (contd..)  Planning  Exploitation  Reporting  Detail Findings  Detailed systems information  Windows server information  References  Appendix
  • 14. Conclusion  This presentation is meant to share the importance of penetration testing on materials which is one of the non-destructive methods found in common.  The impact of vulnerability assessment and its needs are broadly elaborated through this presentation.  The types and the methodology involved in the penetration testing are elaborated.  In final the reporting structure of penetration testing are also deeply discussed through this presentation.
  • 15. References :  https://www.offensive-security.com/reports/sample-penetration-testing-report.pdf  https://partneredsolutionsit.com/importance-of-vulnerability-scans/ Books :  Penetration testing :Ahands on introduction to hacking by Georgia Weidman, published by John wiley & sond Inc  Penetration Testing for dummies by Robert shimonski , No starch press, San Francisco