penetration test

26
• Penetration Test https://store.theartofservice.com/the-penetration-test- toolkit.html

Upload: brooke-brooks

Post on 13-Jan-2016

233 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Penetration Test

• Penetration Test

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 2: Penetration Test

ELearnSecurity Certified Professional Penetration Tester

1 ELearnSecurity Certified

Professional Penetration Tester

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 3: Penetration Test

ELearnSecurity Certified Professional Penetration Tester

1 eLearnSecurity Certified Professional Penetration Tester (eCPPT) is an Ethical

Hacking and Penetration Testing Professional certification offered by eLearnSecurity. The eCPPT exam requires the student to carry out a real penetration test against a target

and to build a penetration testing report. The eCPPT is part of a growing trend of

Professional certifications requiring practical portions demonstrating competency in

performing the tested duties.

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 4: Penetration Test

ELearnSecurity Certified Professional Penetration Tester - Penetration Testing Course - Professional

1 The eCPPT exam can be taken within 120 days from the date of enrollment

in the Penetration Testing Course - Professional.

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 5: Penetration Test

ELearnSecurity Certified Professional Penetration Tester - Penetration Testing Course - Professional

1 Penetration Testing Course is the distance learning course delivered in e-learning

format.

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 6: Penetration Test

Penetration test

1 A penetration test, occasionally pentest, is a method of evaluating computer and network security by

simulating an attack on a computer system or network from external and

internal threats

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 7: Penetration Test

Penetration test

1 Security issues uncovered through the penetration test are presented to

the system's owner. Effective penetration tests will couple this

information with an accurate assessment of the potential impacts

to the organization and outline a range of technical and procedural countermeasures to reduce risks.

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 8: Penetration Test

Penetration test

1 Penetration tests are valuable for several

reasons:

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 9: Penetration Test

Penetration test

1 Penetration tests are a component of a full security audit. For example, the Payment Card Industry Data Security Standard (PCI DSS), and security and

auditing standard, requires both annual and ongoing penetration testing (after system changes).

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 10: Penetration Test

Penetration test - History

1 Penetration testing is one of the oldest methods for assessing the security of a computer system. In the early 1970s, the Department of Defense used this method to demonstrate the security

weaknesses in computer systems and to initiate the development of programs to create more

secure systems. Penetration testing is increasingly used by organizations to assure the security of Information systems and services, so

that security weaknesses can be fixed before they get exposed.

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 11: Penetration Test

Penetration test - Standards and certification

1 The Information Assurance Certification Review Board (IACRB) manages a

penetration testing certification known as the Certified Penetration Tester (CPT).

The CPT requires that the exam candidate pass a traditional multiple

choice exam, as well as pass a practical exam that requires the candidate to perform a penetration test against

servers in a virtual machine environment.

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 12: Penetration Test

Penetration test - Specialized OS distributions

1 This is useful because the penetration tester does not have to hunt down a tool when it is

required

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 13: Penetration Test

Penetration Testing

1 A 'penetration test', or the short form pentest, is an attack on a computer system with the intention of finding

security weaknesses, potentially gaining access to it, its functionality

and data

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 14: Penetration Test

Penetration Testing

1 A penetration test will advise if a system is vulnerable to attack, if the defenses were sufficient and which defenses (if any) were defeated in

the penetration test.

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 15: Penetration Test

Penetration Testing

1 This is where the difference lay between a vulnerability assessment

and penetration test - the vulnerability assessment is everything that you may be

susceptible to, the penetration test is based on if your defense can be

defeated.

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 16: Penetration Test

Penetration Testing

1 Penetration tests are a component of a full Information technology security audit|security audit. For example, the Payment Card Industry Data Security Standard (PCI DSS), and security and

auditing standard, requires both annual and ongoing penetration testing (after system changes).

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 17: Penetration Test

Penetration Testing - History

1 In addition, a number of the RAND analysts insisted that the penetration

test exercises all offered several benefits that justified its continued

use

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 18: Penetration Test

Penetration Testing - History

1 As Hunt suggests in a recent paper on the history of penetration testing, the defense establishment ultimately

created many of the tools used in modern day cyberwarfare, as it

carefully defined and researched the many ways in which computer

penetrators could hack into targeted systems.Hunt (2012), p

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 19: Penetration Test

Penetration Testing - Specialized OS distributions

1 There are several operating system distributions, which are geared towards

performing penetration testing. Distributions typically contains pre-packaged and pre-

configured set of tools. This is useful because the penetration tester does not have to hunt

down a tool when it is required. This may in turn lead to further complications such as compile

errors, dependencies issues, configuration errors, or simply acquiring additional tools may

not be practical in the tester's context.

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 20: Penetration Test

Penetration Testing - Specialized OS distributions

1 Popular examples are Kali Linux (replacing Backtrack as of December 2012) based on Debian Linux, Pentoo

based on Gentoo Linux and WHAX based on Slackware Linux. There are

many other specialized operating systems for penetration testing, each more or less dedicated to a specific

field of penetration testing.

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 21: Penetration Test

Cone penetration test - History and development

1 One advantage of CPT over the Standard Penetration Test (SPT) is a

more continuous profile of soil parameters, with CPTU data recorded

typically at 20cm intervals.

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 22: Penetration Test

Cone penetration test - Additional in situ testing parameters

1 Use of Piezometric Cone Penetration Testing with Electrical Conductivity

Measurements (CPTU-EC) for Detection of Hydrocarbon

Contamination in Saturated Granular Soils

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 23: Penetration Test

Cone penetration test - Standards and use

1 Use of the Piezometric Cone Penetration Test and Penetrometer Groundwater Sampling for Volatile

Organic Contaminant Plume Detection

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 24: Penetration Test

Standard penetration test

1 The 'standard penetration test' (SPT) is an in-situ dynamic penetration test designed to provide information on

the geotechnical engineering properties of Soil mechanics|soil

https://store.theartofservice.com/the-penetration-test-toolkit.html

Page 25: Penetration Test

Standard penetration test - Purpose

1 Although this is not a standard penetration test, and should not be regarded as such, it may at least

give an indication as to whether the deposit is really as loose as the

standard test may indicate.

https://store.theartofservice.com/the-penetration-test-toolkit.html