SlideShare a Scribd company logo
WTF is Penetration Testing?
An Overview of Who, What, Where, When, and Why
Scott Sutherland
Ryan Wakeham
• Scott Sutherland
Principle Security Consultant
NetSPI
• Ryan Wakeham
Director of Consulting
NetSPI
Who are we?
Presentation Overview
• What is a “pen test”?
• Why do companies “pen test”?
• Who does “pen testing”?
• What skills are required?
‒ Non Technical Skillset
‒ Basic Technical Skillset
‒ Offensive and Defensive Knowledge
• What are some Common Tools?
• Pen Testing as a Career
• Attack Demo: SQL Inject World
• Questions
What is Penetration Testing?
Our Definition:
“The process of evaluating systems,
applications, and protocols with the intent
of identifying vulnerabilities from the
perspective of an unprivileged or
anonymous user to determine the real
world impact…”
“…legally and under contract”
Why do Companies Pen Test?
• Compliance Requirements
• Validate Existing Controls
• Identify Unknown Security Gaps
• Prioritize Existing Security Initiatives
• Prevent Data Breaches
• Test IDS / IPS / IRP
What are the Technical Objectives?
• Client specific objectives first
• Identify and verify all entry points
• Identify critical escalation points
• Gain unauthorized access to:
‒ Application functionality
‒ Critical systems
‒ Sensitive data
Assessment VS. Penetration
• Vulnerability Assessment and
Penetration Testing Answer:
‒ What are my system layer vulnerabilities?
‒ Where are my system layer vulnerabilities?
‒ How wide spread are my system layer
vulnerabilities?
‒ Can I identify attacks?
‒ How do I fix my vulnerabilities?
Assessment VS. Penetration
• Penetration Testing Answers:
‒ What are my high impact network layer issues?
‒ What are my high impact application layer
issues?
‒ Can an attacker gain unauthorized access to:
• critical infrastructure that provides
privileged access or cause service disruptions
• critical application functionality that the
business depends on
• sensitive data that the business would be
required to report on if a breach occurs
‒ Can an attacker bypass our IPS / WAF?
‒ Can an attacker pivot from environment A to
environment B?
Common Penetration Test Approach
• Kickoff: Scope, cost, testing windows, risks etc
• Information Gathering
• Vulnerability Enumeration
• Penetration
• Escalation
• Evidence Gathering (Pilfering)
• Clean up
• Report Creation
• Report Delivery and Review
• Remediation
Who Conducts Pen Testing?
• Internal Employees
• Security Analyst
• Security Consultant
• Third Parties
• Audit Firms
• Security Consultants
Rules of Engagement
• Have fun, but…Hack Responsibly!
• Written permission
• Stay in scope
• No DoS
• Don’t change major state
• Restore state
• Clear communication
What Skills are Needed?
• Non Technical
• Basic Technical
• Offensive
• Defensive
• Common Tools
Non Technical Skillset
• Written and Verbal Communications
• Emails/phone calls
• Report development
• Small and large group presentations
• Professionalism
• Respecting others, setting, and
meeting expectations
• Troubleshooting Mindset
• Never give up, never surrender
• Where there is a will, there is a way
• Ethics
• Don’t do bad things
• Pros (career) vs. Cons (jail)
• Hack responsibly
Basic Technical Skillset
• Windows Desktop Administration
• Windows Domain Administration
• Linux and Unix Administration
• Network Infrastructure Administration
• Application Development
• Scripting (Ruby, Python, PHP, Bash, PS, Batch)
• Managed languages (.Net, Java, Davlik)
• Unmanaged languages (C, C++)
Offensive and Defensive Knowledge
• System enumeration and service
fingerprinting
• Linux system exploitation and escalation
• Windows system exploitation and escalation
• Network system exploitation and escalation
• Protocol exploitation
• Web application exploitation (OWASP)
• Reverse engineering client-server
applications + AV Evasion
• Social engineering techniques (onsite,
phone, email)
Common Tools
There are hundreds of “hacker” tools.
Generally, you need to have enough
knowledge to know what tool or tool(s) is
right for the task at hand….
…and if one doesn’t exist, then create it.
Common Tools
That being said…
Common Tools
• Knowledge > Tools
• Understand the core technologies
• Understand the core offensive techniques
• Understand the core defensive techniques
• Network Penetration Testing
• BT, CAIN, YERSINIA, NCAT, NMAP, NESSUS,
NEXPOSE, WCE, MIMIKATZ, AirCrack-ng,
METASPLOIT… and NATIVE TOOLS!
• Application Penetration Testing
• BURP, ZAP, NIKTO, DIRBUSTER, SQLMAP, SQL
Ninja, and BEEF…. and commercial tools
Pen Testing as a Career: Common Paths
• Internal Paths
• Help Desk
• IT Support
• IT Admin
• Security Analyst
• Senior Security Analyst
• Internal Consultant
• CISO
• Security Consulting Paths
• Internship
• Consultant
• Senior Consultant
• Principle Consultant
• Team Lead
• Director
Security consultants
often end up in
malware research or
exploit
development, but
some go corporate.
Internal employees
often stay internal.
Pen Testing as a Career: How to Start
• Read and learn! – There is no “end”
• Tap into the community!
• Research and Development
• Contribute to open source projects
• Present research at conferences
• Training and Certifications
• Community: DC612, OWASP, Conferences, etc
• Professional ($): SANS, OffSec, CISSP, etc
• Volunteer
• Internships
BE SAFE and
HACK RESPONSIBLY
Questions
Questions,
comments, curses?

More Related Content

PPT
Thick client application security assessment
PDF
Application Risk Prioritization - Overview - Secure360 2015 - Part 1 of 2
PDF
Client-Side Penetration Testing Presentation
PPTX
NETWORK PENETRATION TESTING
PDF
Ch 6: Attacking Authentication
PPTX
Security hole #5 application security science or quality assurance
PPTX
Static Analysis Security Testing for Dummies... and You
PPT
Penetration testing, What’s this?
Thick client application security assessment
Application Risk Prioritization - Overview - Secure360 2015 - Part 1 of 2
Client-Side Penetration Testing Presentation
NETWORK PENETRATION TESTING
Ch 6: Attacking Authentication
Security hole #5 application security science or quality assurance
Static Analysis Security Testing for Dummies... and You
Penetration testing, What’s this?

What's hot (20)

PDF
The Web Application Hackers Toolchain
PDF
The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZA...
PPTX
Automated tools for penetration testing
PDF
Ethical Hacking & Penetration Testing
PPTX
External to DA, the OS X Way
PDF
Defcon 22-tim-mcguffin-one-man-shop
PPTX
Secure Coding 101 - OWASP University of Ottawa Workshop
PPTX
Lateral Movement - Phreaknik 2016
PDF
Lateral Movement: How attackers quietly traverse your Network
PPT
Web attacks
PDF
Shmoocon 2015 - httpscreenshot
PDF
PDF
PCI and Vulnerability Assessments - What’s Missing
PDF
Malware collection and analysis
PDF
When the internet bleeded : RootConf 2014
PDF
Defcon 22-gregory-pickett-abusing-software-defined-networks
PDF
The Dark Side of PowerShell by George Dobrea
PDF
Myths and Misperceptions of Open Source Security
PDF
Real World Application Threat Modelling By Example
PDF
RIoT (Raiding Internet of Things) by Jacob Holcomb
The Web Application Hackers Toolchain
The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZA...
Automated tools for penetration testing
Ethical Hacking & Penetration Testing
External to DA, the OS X Way
Defcon 22-tim-mcguffin-one-man-shop
Secure Coding 101 - OWASP University of Ottawa Workshop
Lateral Movement - Phreaknik 2016
Lateral Movement: How attackers quietly traverse your Network
Web attacks
Shmoocon 2015 - httpscreenshot
PCI and Vulnerability Assessments - What’s Missing
Malware collection and analysis
When the internet bleeded : RootConf 2014
Defcon 22-gregory-pickett-abusing-software-defined-networks
The Dark Side of PowerShell by George Dobrea
Myths and Misperceptions of Open Source Security
Real World Application Threat Modelling By Example
RIoT (Raiding Internet of Things) by Jacob Holcomb
Ad

Viewers also liked (18)

PDF
Thick Application Penetration Testing - A Crash Course
PDF
Introduction to Windows Dictionary Attacks
PDF
Declaration of Mal(WAR)e
PDF
Thick Application Penetration Testing: Crash Course
PDF
All You Need is One - A ClickOnce Love Story - Secure360 2015
PDF
Fuzzing and You: Automating Whitebox Testing
PDF
Beyond the Scan: The Value Proposition of Vulnerability Assessment
PDF
Attack All the Layers - What's Working in Penetration Testing
PPTX
Extracting Credentials From Windows
PPTX
GPU Cracking - On the Cheap
PDF
What is pentest
PDF
System of security controls
PDF
Attack All The Layers - What's Working in Penetration Testing
PDF
Penetration testing & Ethical Hacking
PPT
Open Source Tools & Data Science Competitions
PPTX
1114 sasaki-metadata
PDF
Convegno “ Stress, molestie lavorative e organizzative del lavoro: aspetti pr...
PPT
Como Planejar sua Campanha Promocional com Brindes | Apresentação 2 de 3
Thick Application Penetration Testing - A Crash Course
Introduction to Windows Dictionary Attacks
Declaration of Mal(WAR)e
Thick Application Penetration Testing: Crash Course
All You Need is One - A ClickOnce Love Story - Secure360 2015
Fuzzing and You: Automating Whitebox Testing
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Attack All the Layers - What's Working in Penetration Testing
Extracting Credentials From Windows
GPU Cracking - On the Cheap
What is pentest
System of security controls
Attack All The Layers - What's Working in Penetration Testing
Penetration testing & Ethical Hacking
Open Source Tools & Data Science Competitions
1114 sasaki-metadata
Convegno “ Stress, molestie lavorative e organizzative del lavoro: aspetti pr...
Como Planejar sua Campanha Promocional com Brindes | Apresentação 2 de 3
Ad

Similar to WTF is Penetration Testing (20)

PDF
WTF is Penetration Testing
PDF
Application Lecurity Lectures by professor
PPTX
Career In Information security
PDF
The What, Why, and How of DevSecOps
PDF
AppSec in an Agile World
PPTX
WTF is Penetration Testing v.2
PPTX
What is penetration testing and career path
PPTX
Assessing a pen tester: Making the right choice when choosing a third party P...
PDF
What Every Developer And Tester Should Know About Software Security
PPTX
Assessing System Risk the Smart Way
PDF
Top Security Challenges Facing Credit Unions Today
PPTX
Cybersecurity Frameworks and You: The Perfect Match
PPTX
Vulnerability assessment and penetration testing
PPTX
Just Trust Everyone and We Will Be Fine, Right?
PPTX
For Business's Sake, Let's focus on AppSec
PDF
Apidays Helsinki & North 2024 - Security Vulnerabilities in your APIs by Luká...
PDF
The_Pentester_Blueprint.pdf
PPTX
Starting your Career in Information Security
PPT
Security Outsourcing - Couples Counseling - Atif Ghauri
PPTX
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
WTF is Penetration Testing
Application Lecurity Lectures by professor
Career In Information security
The What, Why, and How of DevSecOps
AppSec in an Agile World
WTF is Penetration Testing v.2
What is penetration testing and career path
Assessing a pen tester: Making the right choice when choosing a third party P...
What Every Developer And Tester Should Know About Software Security
Assessing System Risk the Smart Way
Top Security Challenges Facing Credit Unions Today
Cybersecurity Frameworks and You: The Perfect Match
Vulnerability assessment and penetration testing
Just Trust Everyone and We Will Be Fine, Right?
For Business's Sake, Let's focus on AppSec
Apidays Helsinki & North 2024 - Security Vulnerabilities in your APIs by Luká...
The_Pentester_Blueprint.pdf
Starting your Career in Information Security
Security Outsourcing - Couples Counseling - Atif Ghauri
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Electronic commerce courselecture one. Pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
MYSQL Presentation for SQL database connectivity
Unlocking AI with Model Context Protocol (MCP)
The Rise and Fall of 3GPP – Time for a Sabbatical?
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Per capita expenditure prediction using model stacking based on satellite ima...
Network Security Unit 5.pdf for BCA BBA.
Electronic commerce courselecture one. Pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Digital-Transformation-Roadmap-for-Companies.pptx
Programs and apps: productivity, graphics, security and other tools
The AUB Centre for AI in Media Proposal.docx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Review of recent advances in non-invasive hemoglobin estimation
NewMind AI Weekly Chronicles - August'25 Week I
MYSQL Presentation for SQL database connectivity

WTF is Penetration Testing

  • 1. WTF is Penetration Testing? An Overview of Who, What, Where, When, and Why Scott Sutherland Ryan Wakeham
  • 2. • Scott Sutherland Principle Security Consultant NetSPI • Ryan Wakeham Director of Consulting NetSPI Who are we?
  • 3. Presentation Overview • What is a “pen test”? • Why do companies “pen test”? • Who does “pen testing”? • What skills are required? ‒ Non Technical Skillset ‒ Basic Technical Skillset ‒ Offensive and Defensive Knowledge • What are some Common Tools? • Pen Testing as a Career • Attack Demo: SQL Inject World • Questions
  • 4. What is Penetration Testing? Our Definition: “The process of evaluating systems, applications, and protocols with the intent of identifying vulnerabilities from the perspective of an unprivileged or anonymous user to determine the real world impact…” “…legally and under contract”
  • 5. Why do Companies Pen Test? • Compliance Requirements • Validate Existing Controls • Identify Unknown Security Gaps • Prioritize Existing Security Initiatives • Prevent Data Breaches • Test IDS / IPS / IRP
  • 6. What are the Technical Objectives? • Client specific objectives first • Identify and verify all entry points • Identify critical escalation points • Gain unauthorized access to: ‒ Application functionality ‒ Critical systems ‒ Sensitive data
  • 7. Assessment VS. Penetration • Vulnerability Assessment and Penetration Testing Answer: ‒ What are my system layer vulnerabilities? ‒ Where are my system layer vulnerabilities? ‒ How wide spread are my system layer vulnerabilities? ‒ Can I identify attacks? ‒ How do I fix my vulnerabilities?
  • 8. Assessment VS. Penetration • Penetration Testing Answers: ‒ What are my high impact network layer issues? ‒ What are my high impact application layer issues? ‒ Can an attacker gain unauthorized access to: • critical infrastructure that provides privileged access or cause service disruptions • critical application functionality that the business depends on • sensitive data that the business would be required to report on if a breach occurs ‒ Can an attacker bypass our IPS / WAF? ‒ Can an attacker pivot from environment A to environment B?
  • 9. Common Penetration Test Approach • Kickoff: Scope, cost, testing windows, risks etc • Information Gathering • Vulnerability Enumeration • Penetration • Escalation • Evidence Gathering (Pilfering) • Clean up • Report Creation • Report Delivery and Review • Remediation
  • 10. Who Conducts Pen Testing? • Internal Employees • Security Analyst • Security Consultant • Third Parties • Audit Firms • Security Consultants
  • 11. Rules of Engagement • Have fun, but…Hack Responsibly! • Written permission • Stay in scope • No DoS • Don’t change major state • Restore state • Clear communication
  • 12. What Skills are Needed? • Non Technical • Basic Technical • Offensive • Defensive • Common Tools
  • 13. Non Technical Skillset • Written and Verbal Communications • Emails/phone calls • Report development • Small and large group presentations • Professionalism • Respecting others, setting, and meeting expectations • Troubleshooting Mindset • Never give up, never surrender • Where there is a will, there is a way • Ethics • Don’t do bad things • Pros (career) vs. Cons (jail) • Hack responsibly
  • 14. Basic Technical Skillset • Windows Desktop Administration • Windows Domain Administration • Linux and Unix Administration • Network Infrastructure Administration • Application Development • Scripting (Ruby, Python, PHP, Bash, PS, Batch) • Managed languages (.Net, Java, Davlik) • Unmanaged languages (C, C++)
  • 15. Offensive and Defensive Knowledge • System enumeration and service fingerprinting • Linux system exploitation and escalation • Windows system exploitation and escalation • Network system exploitation and escalation • Protocol exploitation • Web application exploitation (OWASP) • Reverse engineering client-server applications + AV Evasion • Social engineering techniques (onsite, phone, email)
  • 16. Common Tools There are hundreds of “hacker” tools. Generally, you need to have enough knowledge to know what tool or tool(s) is right for the task at hand…. …and if one doesn’t exist, then create it.
  • 18. Common Tools • Knowledge > Tools • Understand the core technologies • Understand the core offensive techniques • Understand the core defensive techniques • Network Penetration Testing • BT, CAIN, YERSINIA, NCAT, NMAP, NESSUS, NEXPOSE, WCE, MIMIKATZ, AirCrack-ng, METASPLOIT… and NATIVE TOOLS! • Application Penetration Testing • BURP, ZAP, NIKTO, DIRBUSTER, SQLMAP, SQL Ninja, and BEEF…. and commercial tools
  • 19. Pen Testing as a Career: Common Paths • Internal Paths • Help Desk • IT Support • IT Admin • Security Analyst • Senior Security Analyst • Internal Consultant • CISO • Security Consulting Paths • Internship • Consultant • Senior Consultant • Principle Consultant • Team Lead • Director Security consultants often end up in malware research or exploit development, but some go corporate. Internal employees often stay internal.
  • 20. Pen Testing as a Career: How to Start • Read and learn! – There is no “end” • Tap into the community! • Research and Development • Contribute to open source projects • Present research at conferences • Training and Certifications • Community: DC612, OWASP, Conferences, etc • Professional ($): SANS, OffSec, CISSP, etc • Volunteer • Internships
  • 21. BE SAFE and HACK RESPONSIBLY