SlideShare a Scribd company logo
Phases of Penetration
Test
Abdul Rehman
IOC Bahauddin Zakariya University Multan
What is Penetration Test?
• A penetration test is a method of evaluating the security of a computer
system or network by simulating an attack from a malicious source.
• A penetration test target may be a ”white box” or ”black box” .
• A penetration test can help determine whether a system is vulnerable to
attack, if the defenses were sufficient and which defenses were defeated in
the penetration test.
Phases of Penetration Test
• Reconnaissance
• Scanning
• Exploitation
• Maintaining Access
Reconnaissance
• Reconnaissance refer as information gathering before attack. It is the work
of gathering information before planning attack.
• The more information we gather, our chances of success in later phases of
penetration Testing are greater.
• Abraham Lincoln Quote “if I had six hours to chop down a tree, I'd spend
the first four of them sharpening my axe.”
• Reconnaissance conducted by white hat and black hat as well as.
Main Goals and Types of Reconnaissance
Two main Goals of Reconnaissance listed below
• Gather information as much as possible
• Create a list of attachable IP addresses
Two main Types of Reconnaissance listed below
• Active Reconnaissance
• Passive Reconnaissance
Famous Tools use for Reconnaissance(I)
• HTTrack
• Google
• Harvester
• Whois
• Netcraft
Famous Tools use for Reconnaissance(II)
• Host
• Extracting information from DNS
 NS Lookup
 Dig
• Extracting information from Emails
• Metagoofill
• Social Engineering
Famous Tools use for Reconnaissance(III)
• HTTrack(Win ,B.T)
 Tool for make identical copy of the target site.
 Copy consist of Pages, Pics, links etc.
• Google
 Properly use of Google=Vital skill for penetration tester.
 Directives (Keywords, enable accurate information from Google)site, inurl, cache
Use of directive 1)name 2)colon 3)term e.g. site:bzu.edu filetype ppt
Famous Tools use for Reconnaissance(IV)
• Harvester(Win, B.T)
Use for catalog emails and subdomains that are belong to our target.
• Whois(Online, B.T)
Whois service allow us to access specific information about our target including
IP addresses ,host names ,contact info ,phone no. ,Address etc.
• Netcraft(Win, B.T)
It give us information about site report ,IP address ,OS of the web server.
Famous Tools use for Reconnaissance(V)
• Host
Use for Translate host name to IP address.
• Social Engineering
Is exploiting the “human” weakness that inherit in every organization.
Scanning
• Scanning is the process of finding the system is alive, ports and vulnerability
of the target.
• Ethical hacker use scanning tools to determine open ports and services
presence of known weaknesses on target systems.
Types of Scanning
• Types of scanning are listed below
1. System Scanning
2. Port Scanning
3. Vulnerability Scanning
System Scanning
• In system scanning we determine if the system alive and it can interact with
other machine or not.
• It is important to conduct this step and make note of any machines that
respond as alive.
• If the system is alive then the penetration test will more fruitful.
Port Scanning(I)
• Port scanning is to finding the open port. It is a process of finding the
channel from where the attack can be launched.
• The basic idea is to analysis the network port and keep information about
them so that it can be used In future.
• In port scanning we find open port and services such as FTP, Printing or e-
mail that are available.
• There are total 65536 ports on every computer may be UDP or TCP.
Port Scanning(II)
Port Number Description
1 TCP Port Service Multiplexer (TCPMUX)
20 FTP Data
21 FTP Control
53 Domain Name System (DNS)
69 Trivial File Transfer Protocol (TFTP)
115 Simple File Transfer Protocol (SFTP)
156 SQL Server
190 Gateway Access Control Protocol (GACP)
443 HTTPS
Vulnerability Scanning
• Vulnerability scanning is performed in which the weakness of target are find
out for attack.
• Usually the vulnerability scanners find operating system and version number
that is installed on target.
• Then find weakness in O.S, get information and use this information for
exploit it in future.
Tools Used for Scanning
• For System Scanning
1. Ping and ping sweeps
• For Port Scanning
1. NMap
• For Vulnerability Scanning
1. Nessus
Ping and Ping Sweep
• Special type of network packet called an ICMP packet.
• Work by sending specific types of network traffic, called ICMP echo request
packets, to the target.
• Telling us that a host is alive and accepting traffic, pings provide other
valuable information
including the total time it took for the packet to travel to the target and return.
• Ping Sweep is work with Fping, in this Ping sent to the series of IP addresses.
Ping and Ping Sweep(II)
Results of ping
NMap
• Using Nmap to perform a TCP Connect Scan
NMap
• Using Nmap to perform UDP Scans
Nessus
• Nessus is a GUI bases Vulnerability Scanning tool.
• Available for free.
• One of the key components of Nessus is the plug-ins.
• A plug-in is a small block of code that is sent to the target machine to check
for a known vulnerability. Nessus has literally thousands of plug-ins.
Nessus
Nessus
Exploitation
• Exploitation is the process of gaining control over a system.
• Exploitation is the attempt to turn the target machine into a puppet that will
execute your commands and do your bidding.
Password Cracker
• Using online password crackers, the potential for success can be
greatly
increased if you combine this attack with information gathered.
• Remote access systems employ a password throttling technique
that can limit the number of unsuccessful log-ins you are allowed.
• Medusa and Hydra are famous password cracker for exploitation.
• JOHN THE RIPPER: KING OF THE PASSWORD
CRACKERS
Medusa
• Medusa is described as a parallel log-in brute forcer that attempts to gain
access to remote authentication services.
• Medusa is capable of authenticating with a large number of remote services
including AFP, FTP, HTTP, IMAP, MS-SQl , MYSQl , NetWare NCP, NNTP
etc.
• You need several pieces of information for medusa
Target IP Address
A username or username list
A password or dictionary file containing multiple passwords
Medusa
METASPLOIT
HACKING, HUGH JACKMAN STYLE!
• Metasploit is a powerful, flexible and free tool.
• Truly open source exploit framework.
• Open Source meant that for the first time everyone could access, collaborate,
develop and share exploits for free.
• It allows you to select the target and choose from a wide variety of
payloads.
• A payload is the “additional functionality” or change in behavior that you want
to accomplish on the target machine.
MSFCONSOLE
• We focus on Menu-driven Non-GUI text-based system called msfconsole.
• msfconsole is fast, friendly and easy to use.
MSFCONSOLE
Result of Metaspoilt
SNIFFING NETWORK TRAFFIC
• Sniffing is the process of capturing and viewing traffic as it is
passed along the network.
• Popular technique that can be used to gain access to systems is
network sniffing.
• Sniffing clear text network traffic is a trivial but effective means of
gaining access to systems.
• Macof Tool is used for Sniffing
Maintaining Access
• In maintaining access, create backdoors in the Target system for future use.
• Backdoor is a piece of software that resides on the target computer and allows the
attacker to return to the machine at any time.
• In some cases, the backdoor is a hidden process that runs on the target
machine
• There are many tools now-a-days for creating backdoor e.g. netcat ,netcat cryptic
cousin ,Netbus , rootkits.
NETCAT
THE SWISS ARMY KNIFE
• A tool for communication and control network traffic flow.
• Excellent choice for a backdoor.
• Can be used to transfer files between machines.
• Conduct port scans.
• Serve as a simple instant messenger.
• even function as a simple web server.
NETCAT
THE SWISS ARMY KNIFE
• Supports sending and receiving both TCP and UDP traffic.
• Netcat can connect from any port on your local machine to any port on the
target machine.
NETBUS: A CLASSIC
• Backdoor and remote control software.
Hacker Defender
It Is Not What You Think
• Hacker defender is a Rootkit.
• Easy to understand and configure.
• There are three main files
o hxdef100.exe
o hxdef100.ini
o bdcli100.exe
Hacker Defender
DETECTING AND DEFENDING
AGAINST ROOTKITS
• Closely monitor the information you put onto the internet.
• Properly configure your firewall and other access control lists.
• Patch your systems.
• Install and use antivirus software.
• Make use of an intrusion detection system.
• Tools like rootkit revealer, Vice, and F-secure’s ,Backlight are some great
free options for revealing the presence of hidden files and rootkits.
Questions?

More Related Content

PDF
Cyber attacks
PPTX
Footprinting and reconnaissance
PPTX
DDOS ATTACK - MIRAI BOTNET
PPTX
Pen Testing Explained
PDF
Analysing Ransomware
PPTX
Metasploit
PPT
Malware Analysis Made Simple
PPTX
Wannacry
Cyber attacks
Footprinting and reconnaissance
DDOS ATTACK - MIRAI BOTNET
Pen Testing Explained
Analysing Ransomware
Metasploit
Malware Analysis Made Simple
Wannacry

What's hot (20)

PDF
PDF
What is Ransomware?
PPTX
Packet sniffing
PDF
Ch 5: Port Scanning
PDF
Stuxnet
PPTX
Cyber espionage
PPTX
Introduction to Metasploit
 
PPT
Course on Ehtical Hacking - Introduction
PPTX
Cryptographic Algorithms: DES and RSA
PPTX
NETWORK PENETRATION TESTING
PPTX
Android malware analysis
PDF
TOP 100 Vulnerabilities Step-by-Step Guide Handbook
PPTX
Threat hunting - Every day is hunting season
PPTX
Ppt on cyber security
PDF
Cybercrime In The Deep Web
PPT
Wannacry-A Ransomware Attack
PPT
Introduction to Web Application Penetration Testing
PDF
Footprinting
PPTX
Stuxnet worm
What is Ransomware?
Packet sniffing
Ch 5: Port Scanning
Stuxnet
Cyber espionage
Introduction to Metasploit
 
Course on Ehtical Hacking - Introduction
Cryptographic Algorithms: DES and RSA
NETWORK PENETRATION TESTING
Android malware analysis
TOP 100 Vulnerabilities Step-by-Step Guide Handbook
Threat hunting - Every day is hunting season
Ppt on cyber security
Cybercrime In The Deep Web
Wannacry-A Ransomware Attack
Introduction to Web Application Penetration Testing
Footprinting
Stuxnet worm
Ad

Viewers also liked (20)

PPT
Standard Penetration Test
PDF
Penetration Testing Services Technical Description Cyber51
PDF
App Penetration Test
PDF
BAIT1103 Chapter 5
ODP
Introduction To NIDS
PDF
Explain Kerberos like I'm 5
PPT
Dns protocol design attacks and security
PPT
intrusion detection system (IDS)
PPTX
Secure Software Development Life Cycle
PDF
Secure Software Development Adoption Strategy
PPTX
Cone Penetration Test
PPT
Pgp
PPTX
Secure Socket Layer
PPT
Info Security - Vulnerability Assessment
PPT
Lecture 8 mail security
PPTX
Vulnerability Assessment Presentation
PDF
Btpsec Sample Penetration Test Report
PPT
Secure Socket Layer (SSL)
PPTX
PDF
CNIT 40: 2: DNS Protocol and Architecture
Standard Penetration Test
Penetration Testing Services Technical Description Cyber51
App Penetration Test
BAIT1103 Chapter 5
Introduction To NIDS
Explain Kerberos like I'm 5
Dns protocol design attacks and security
intrusion detection system (IDS)
Secure Software Development Life Cycle
Secure Software Development Adoption Strategy
Cone Penetration Test
Pgp
Secure Socket Layer
Info Security - Vulnerability Assessment
Lecture 8 mail security
Vulnerability Assessment Presentation
Btpsec Sample Penetration Test Report
Secure Socket Layer (SSL)
CNIT 40: 2: DNS Protocol and Architecture
Ad

Similar to Phases of penetration testing (20)

DOCX
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
PPTX
Introduction To Ethical Hacking
PPTX
Web hacking 1.0
PPTX
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
PPTX
PPTX
Hacking - penetration tools
PPTX
Ethical Hacking n VAPT presentation by Suvrat jain
PDF
Computer security
PDF
Ethical hacking
PPTX
Network Penetration Testing
PPTX
DC612 Day - Hands on Penetration Testing 101
PDF
Hack Attack! An Introduction to Penetration Testing
PDF
PDF
PDF
ethical Hack
PPTX
BSIDES-PR Keynote Hunting for Bad Guys
DOCX
Security tools
PPTX
Dafgjgghhghfhjgghjhgy06-Footprinting.pptx
PPTX
Penetration Testing and Intrusion Detection System
PDF
Metasploit for Penetration Testing: Beginner Class
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Introduction To Ethical Hacking
Web hacking 1.0
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
Hacking - penetration tools
Ethical Hacking n VAPT presentation by Suvrat jain
Computer security
Ethical hacking
Network Penetration Testing
DC612 Day - Hands on Penetration Testing 101
Hack Attack! An Introduction to Penetration Testing
ethical Hack
BSIDES-PR Keynote Hunting for Bad Guys
Security tools
Dafgjgghhghfhjgghjhgy06-Footprinting.pptx
Penetration Testing and Intrusion Detection System
Metasploit for Penetration Testing: Beginner Class

Recently uploaded (20)

PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPT
What is a Computer? Input Devices /output devices
PPTX
Modernising the Digital Integration Hub
PDF
August Patch Tuesday
PDF
STKI Israel Market Study 2025 version august
PDF
Five Habits of High-Impact Board Members
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Hybrid model detection and classification of lung cancer
PPTX
The various Industrial Revolutions .pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Developing a website for English-speaking practice to English as a foreign la...
Group 1 Presentation -Planning and Decision Making .pptx
A review of recent deep learning applications in wood surface defect identifi...
Univ-Connecticut-ChatGPT-Presentaion.pdf
sustainability-14-14877-v2.pddhzftheheeeee
Enhancing emotion recognition model for a student engagement use case through...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
What is a Computer? Input Devices /output devices
Modernising the Digital Integration Hub
August Patch Tuesday
STKI Israel Market Study 2025 version august
Five Habits of High-Impact Board Members
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Web Crawler for Trend Tracking Gen Z Insights.pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Hybrid model detection and classification of lung cancer
The various Industrial Revolutions .pptx
Hindi spoken digit analysis for native and non-native speakers
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf

Phases of penetration testing

  • 1. Phases of Penetration Test Abdul Rehman IOC Bahauddin Zakariya University Multan
  • 2. What is Penetration Test? • A penetration test is a method of evaluating the security of a computer system or network by simulating an attack from a malicious source. • A penetration test target may be a ”white box” or ”black box” . • A penetration test can help determine whether a system is vulnerable to attack, if the defenses were sufficient and which defenses were defeated in the penetration test.
  • 3. Phases of Penetration Test • Reconnaissance • Scanning • Exploitation • Maintaining Access
  • 4. Reconnaissance • Reconnaissance refer as information gathering before attack. It is the work of gathering information before planning attack. • The more information we gather, our chances of success in later phases of penetration Testing are greater. • Abraham Lincoln Quote “if I had six hours to chop down a tree, I'd spend the first four of them sharpening my axe.” • Reconnaissance conducted by white hat and black hat as well as.
  • 5. Main Goals and Types of Reconnaissance Two main Goals of Reconnaissance listed below • Gather information as much as possible • Create a list of attachable IP addresses Two main Types of Reconnaissance listed below • Active Reconnaissance • Passive Reconnaissance
  • 6. Famous Tools use for Reconnaissance(I) • HTTrack • Google • Harvester • Whois • Netcraft
  • 7. Famous Tools use for Reconnaissance(II) • Host • Extracting information from DNS  NS Lookup  Dig • Extracting information from Emails • Metagoofill • Social Engineering
  • 8. Famous Tools use for Reconnaissance(III) • HTTrack(Win ,B.T)  Tool for make identical copy of the target site.  Copy consist of Pages, Pics, links etc. • Google  Properly use of Google=Vital skill for penetration tester.  Directives (Keywords, enable accurate information from Google)site, inurl, cache Use of directive 1)name 2)colon 3)term e.g. site:bzu.edu filetype ppt
  • 9. Famous Tools use for Reconnaissance(IV) • Harvester(Win, B.T) Use for catalog emails and subdomains that are belong to our target. • Whois(Online, B.T) Whois service allow us to access specific information about our target including IP addresses ,host names ,contact info ,phone no. ,Address etc. • Netcraft(Win, B.T) It give us information about site report ,IP address ,OS of the web server.
  • 10. Famous Tools use for Reconnaissance(V) • Host Use for Translate host name to IP address. • Social Engineering Is exploiting the “human” weakness that inherit in every organization.
  • 11. Scanning • Scanning is the process of finding the system is alive, ports and vulnerability of the target. • Ethical hacker use scanning tools to determine open ports and services presence of known weaknesses on target systems.
  • 12. Types of Scanning • Types of scanning are listed below 1. System Scanning 2. Port Scanning 3. Vulnerability Scanning
  • 13. System Scanning • In system scanning we determine if the system alive and it can interact with other machine or not. • It is important to conduct this step and make note of any machines that respond as alive. • If the system is alive then the penetration test will more fruitful.
  • 14. Port Scanning(I) • Port scanning is to finding the open port. It is a process of finding the channel from where the attack can be launched. • The basic idea is to analysis the network port and keep information about them so that it can be used In future. • In port scanning we find open port and services such as FTP, Printing or e- mail that are available. • There are total 65536 ports on every computer may be UDP or TCP.
  • 15. Port Scanning(II) Port Number Description 1 TCP Port Service Multiplexer (TCPMUX) 20 FTP Data 21 FTP Control 53 Domain Name System (DNS) 69 Trivial File Transfer Protocol (TFTP) 115 Simple File Transfer Protocol (SFTP) 156 SQL Server 190 Gateway Access Control Protocol (GACP) 443 HTTPS
  • 16. Vulnerability Scanning • Vulnerability scanning is performed in which the weakness of target are find out for attack. • Usually the vulnerability scanners find operating system and version number that is installed on target. • Then find weakness in O.S, get information and use this information for exploit it in future.
  • 17. Tools Used for Scanning • For System Scanning 1. Ping and ping sweeps • For Port Scanning 1. NMap • For Vulnerability Scanning 1. Nessus
  • 18. Ping and Ping Sweep • Special type of network packet called an ICMP packet. • Work by sending specific types of network traffic, called ICMP echo request packets, to the target. • Telling us that a host is alive and accepting traffic, pings provide other valuable information including the total time it took for the packet to travel to the target and return. • Ping Sweep is work with Fping, in this Ping sent to the series of IP addresses.
  • 19. Ping and Ping Sweep(II) Results of ping
  • 20. NMap • Using Nmap to perform a TCP Connect Scan
  • 21. NMap • Using Nmap to perform UDP Scans
  • 22. Nessus • Nessus is a GUI bases Vulnerability Scanning tool. • Available for free. • One of the key components of Nessus is the plug-ins. • A plug-in is a small block of code that is sent to the target machine to check for a known vulnerability. Nessus has literally thousands of plug-ins.
  • 25. Exploitation • Exploitation is the process of gaining control over a system. • Exploitation is the attempt to turn the target machine into a puppet that will execute your commands and do your bidding.
  • 26. Password Cracker • Using online password crackers, the potential for success can be greatly increased if you combine this attack with information gathered. • Remote access systems employ a password throttling technique that can limit the number of unsuccessful log-ins you are allowed. • Medusa and Hydra are famous password cracker for exploitation. • JOHN THE RIPPER: KING OF THE PASSWORD CRACKERS
  • 27. Medusa • Medusa is described as a parallel log-in brute forcer that attempts to gain access to remote authentication services. • Medusa is capable of authenticating with a large number of remote services including AFP, FTP, HTTP, IMAP, MS-SQl , MYSQl , NetWare NCP, NNTP etc. • You need several pieces of information for medusa Target IP Address A username or username list A password or dictionary file containing multiple passwords
  • 29. METASPLOIT HACKING, HUGH JACKMAN STYLE! • Metasploit is a powerful, flexible and free tool. • Truly open source exploit framework. • Open Source meant that for the first time everyone could access, collaborate, develop and share exploits for free. • It allows you to select the target and choose from a wide variety of payloads. • A payload is the “additional functionality” or change in behavior that you want to accomplish on the target machine.
  • 30. MSFCONSOLE • We focus on Menu-driven Non-GUI text-based system called msfconsole. • msfconsole is fast, friendly and easy to use.
  • 32. SNIFFING NETWORK TRAFFIC • Sniffing is the process of capturing and viewing traffic as it is passed along the network. • Popular technique that can be used to gain access to systems is network sniffing. • Sniffing clear text network traffic is a trivial but effective means of gaining access to systems. • Macof Tool is used for Sniffing
  • 33. Maintaining Access • In maintaining access, create backdoors in the Target system for future use. • Backdoor is a piece of software that resides on the target computer and allows the attacker to return to the machine at any time. • In some cases, the backdoor is a hidden process that runs on the target machine • There are many tools now-a-days for creating backdoor e.g. netcat ,netcat cryptic cousin ,Netbus , rootkits.
  • 34. NETCAT THE SWISS ARMY KNIFE • A tool for communication and control network traffic flow. • Excellent choice for a backdoor. • Can be used to transfer files between machines. • Conduct port scans. • Serve as a simple instant messenger. • even function as a simple web server.
  • 35. NETCAT THE SWISS ARMY KNIFE • Supports sending and receiving both TCP and UDP traffic. • Netcat can connect from any port on your local machine to any port on the target machine.
  • 36. NETBUS: A CLASSIC • Backdoor and remote control software.
  • 37. Hacker Defender It Is Not What You Think • Hacker defender is a Rootkit. • Easy to understand and configure. • There are three main files o hxdef100.exe o hxdef100.ini o bdcli100.exe
  • 39. DETECTING AND DEFENDING AGAINST ROOTKITS • Closely monitor the information you put onto the internet. • Properly configure your firewall and other access control lists. • Patch your systems. • Install and use antivirus software. • Make use of an intrusion detection system. • Tools like rootkit revealer, Vice, and F-secure’s ,Backlight are some great free options for revealing the presence of hidden files and rootkits.