SlideShare a Scribd company logo
Penetration Testing
Execution Standard
         Iftach Ian Amit
   VP Consulting - Security Art
        Founder - PTES
             DC9723
          March 22nd, 2011
Agenda

• Why?
• Who?
• How?

• You!
PTES - Why?
PTES - Why?

RAPE!
PTES - Why?

RAPE!

          Someone call the police...
PTES

• Common language for organizations and
  service providers
• Set the bar for a common standard to be
  used
• Eliminate hacks (as in run Nessus, generate
  report, send to customer, charge $10,000)
PTES - Who?
• As always - started during a long night of
  drinking...
• Nickerson (@indi303), Kennedy (author of
  SET), me (@iiamit), Gates
  (@carnal0wnage),Val (@attackresearch),
  Nick (@c7five), Robin (@digininja), Wim
  (@wimremes), Stefan (@stfn42), lots
  more... www.pentest-standard.org
PTES - How?
•   Basically, define the basic 7 elements of a pentest:
    •   Pre-engagement
    •   Intelligence gathering
    •   Threat modeling
    •   Vulnerability Analysis
    •   Exploitation
    •   Post exploitation
    •   Reporting
PTES - How?
•   Basically, define the basic 7 elements of a pentest:
    •   Pre-engagement
    •   Intelligence gathering
    •   Threat modeling
    •   Vulnerability Analysis
    •   Exploitation
    •   Post exploitation
    •   Reporting
PTES - How?
•   Basically, define the basic 7 elements of a pentest:
    •   Pre-engagement
    •   Intelligence gathering
    •   Threat modeling
    •   Vulnerability Analysis
                                 “old” pentesting scope
    •   Exploitation
    •   Post exploitation
    •   Reporting
Pre-Engagement
Pre-Engagement
Pre-Engagement
Intelligence Gathering
Intelligence Gathering
Intelligence Gathering
Threat Modeling
Threat Modeling
Vulnerability Analysis
Vulnerability Analysis
Exploitation
Exploitation
Post-Explotation
Post-Explotation
Reporting
Reporting
Reporting
PTES - initial reactions
PTES - initial reactions
• You have to be kidding me
PTES - initial reactions
• You have to be kidding me
• No one does that
PTES - initial reactions
• You have to be kidding me
• No one does that
• I can’t do this all by myself
PTES - initial reactions
• You have to be kidding me
• No one does that
• I can’t do this all by myself
• This is a lot of work
PTES - initial reactions
• You have to be kidding me
• No one does that
• I can’t do this all by myself
• This is a lot of work
• Is this going into PCI/ISO/[someStandard]?
PTES - initial reactions
• You have to be kidding me
• No one does that
• I can’t do this all by myself
• This is a lot of work
• Is this going into PCI/ISO/[someStandard]?
• We already do that
Now what?
Now what?


  YOU!
Now what?


  YOU!
  Yes, you...
Roadmap
Roadmap
• Catch up on all the “official” news at
  www.pentest-standard.org
Roadmap
• Catch up on all the “official” news at
  www.pentest-standard.org
• Volunteer! (we need working hands...)
Roadmap
• Catch up on all the “official” news at
  www.pentest-standard.org
• Volunteer! (we need working hands...)
• Previous milestone - Shmoocon (Feb 2011)
Roadmap
• Catch up on all the “official” news at
  www.pentest-standard.org
• Volunteer! (we need working hands...)
• Previous milestone - Shmoocon (Feb 2011)
• Next milestone - ph-neutral (May 2011)
Roadmap
• Catch up on all the “official” news at
  www.pentest-standard.org
• Volunteer! (we need working hands...)
• Previous milestone - Shmoocon (Feb 2011)
• Next milestone - ph-neutral (May 2011)
• Drop the bomb - BlackHat?

More Related Content

PPT
Inverno boneco.de.neve
PPT
Xico,o campeão-da-reciclagem
PPS
A viagem da castanha1
PPT
Dona carmo
PPTX
Halloween
ZIP
historia sim-_o e a noite de natal
PPT
O palhaco-tristoleto
PDF
Beijinhos Beijinhos
Inverno boneco.de.neve
Xico,o campeão-da-reciclagem
A viagem da castanha1
Dona carmo
Halloween
historia sim-_o e a noite de natal
O palhaco-tristoleto
Beijinhos Beijinhos

What's hot (20)

PPT
A Formiga E A Neve
PDF
Quem da prenda ao pai natal
PPT
A Flor Rosalina
PPT
O comboio das formas
PPT
O ruca-na-escola
PPT
Um bocadinho de inverno
PPT
A pequena-folha-amarela[1]
PPSX
A Bruxa Mimi
PPT
História do inverno (1)
PPT
O sapo encontra um amigo
PPT
Animais que hibernam
PPTX
A palavra feia de Alberto
PPTX
The gruffalo
PDF
Que grande abóbora mimi! valerie thomas e korky paul
PPT
O inverno
PDF
Clarice lispector quase de verdade (pdf)(rev)
PDF
O boneco-de-neve-que-queria-ir-para-a-escola
PPS
Lagartinha comilona
PPT
Os melhores beijinhos
PPS
Uma estranha dor barriga
A Formiga E A Neve
Quem da prenda ao pai natal
A Flor Rosalina
O comboio das formas
O ruca-na-escola
Um bocadinho de inverno
A pequena-folha-amarela[1]
A Bruxa Mimi
História do inverno (1)
O sapo encontra um amigo
Animais que hibernam
A palavra feia de Alberto
The gruffalo
Que grande abóbora mimi! valerie thomas e korky paul
O inverno
Clarice lispector quase de verdade (pdf)(rev)
O boneco-de-neve-que-queria-ir-para-a-escola
Lagartinha comilona
Os melhores beijinhos
Uma estranha dor barriga
Ad

Similar to Penetration Testing Execution Standard (20)

PDF
Sexy defense
PDF
WTF is Penetration Testing
PPTX
DefCamp 2013 - MSF Into The Worm Hole
PDF
[2010 CodeEngn Conference 04] passket - Taint analysis for vulnerability disc...
PPTX
The DevOps Panel - Innotech Austin CD Summit
PDF
PyData Texas 2015 Keynote
PDF
Just the basics_strata_2013
PPTX
Vulnerability management and threat detection by the numbers
PPTX
Vulnerability management and threat detection by the numbers
PDF
Dev secops opsec, devsec, devops ?
PPTX
Network Forensics Backwards and Forwards
PDF
Technical Vulnerabilities of Electronic Health Records
PPTX
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
PDF
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
PDF
Владимир Стыран - Пентест следующего поколения, который ваша компания не може...
PDF
Next generation pentest your company cannot buy
PDF
ISACA Ethical Hacking Presentation 10/2011
PPTX
Future of BI Deck
PPT
cps270_intro artificial intelligence.ppt
PDF
IT security for all. Bootcamp slides
Sexy defense
WTF is Penetration Testing
DefCamp 2013 - MSF Into The Worm Hole
[2010 CodeEngn Conference 04] passket - Taint analysis for vulnerability disc...
The DevOps Panel - Innotech Austin CD Summit
PyData Texas 2015 Keynote
Just the basics_strata_2013
Vulnerability management and threat detection by the numbers
Vulnerability management and threat detection by the numbers
Dev secops opsec, devsec, devops ?
Network Forensics Backwards and Forwards
Technical Vulnerabilities of Electronic Health Records
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
Владимир Стыран - Пентест следующего поколения, который ваша компания не може...
Next generation pentest your company cannot buy
ISACA Ethical Hacking Presentation 10/2011
Future of BI Deck
cps270_intro artificial intelligence.ppt
IT security for all. Bootcamp slides
Ad

More from Iftach Ian Amit (20)

PPTX
Cyber Risk Quantification - CyberTLV
PDF
Devsecops at Cimpress
PPTX
BSidesTLV Closing Keynote
PDF
Social Media Risk Metrics
PDF
ISTS12 Keynote
PDF
From your Pocket to your Heart and Back
PDF
Painting a Company Red and Blue
PDF
"Cyber" security - all good, no need to worry?
PDF
Armorizing applications
PDF
Seeing Red In Your Future?
PPTX
Hacking cyber-iamit
PDF
Passwords good badugly181212-2
PDF
PDF
Cyber state
PDF
Advanced Data Exfiltration - the way Q would have done it
PDF
Infecting Python Bytecode
PDF
Exploiting Second life
PDF
Dtmf phreaking
PDF
Cheating in Computer Games
PDF
Telecommunication basics dc9723
Cyber Risk Quantification - CyberTLV
Devsecops at Cimpress
BSidesTLV Closing Keynote
Social Media Risk Metrics
ISTS12 Keynote
From your Pocket to your Heart and Back
Painting a Company Red and Blue
"Cyber" security - all good, no need to worry?
Armorizing applications
Seeing Red In Your Future?
Hacking cyber-iamit
Passwords good badugly181212-2
Cyber state
Advanced Data Exfiltration - the way Q would have done it
Infecting Python Bytecode
Exploiting Second life
Dtmf phreaking
Cheating in Computer Games
Telecommunication basics dc9723

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Getting Started with Data Integration: FME Form 101
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
A Presentation on Artificial Intelligence
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
1. Introduction to Computer Programming.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Mushroom cultivation and it's methods.pdf
NewMind AI Weekly Chronicles - August'25-Week II
A comparative study of natural language inference in Swahili using monolingua...
Getting Started with Data Integration: FME Form 101
A novel scalable deep ensemble learning framework for big data classification...
Heart disease approach using modified random forest and particle swarm optimi...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A Presentation on Artificial Intelligence
cloud_computing_Infrastucture_as_cloud_p
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Zenith AI: Advanced Artificial Intelligence
DP Operators-handbook-extract for the Mautical Institute
TLE Review Electricity (Electricity).pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Unlocking AI with Model Context Protocol (MCP)
Encapsulation_ Review paper, used for researhc scholars
SOPHOS-XG Firewall Administrator PPT.pptx
1. Introduction to Computer Programming.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Mushroom cultivation and it's methods.pdf

Penetration Testing Execution Standard