Académique Documents
Professionnel Documents
Culture Documents
s
K
n
o
w
l
e
d
g
e
o
f
A
t
t
a
c
k
Double
Gray Box
Black Box
Red team
White Box
Blue team
Penetration Testing Process
Planning Discovery Attack
Additional Discovery
Reporting
(NIST SP 800-42, 2003)
Reconnaissance
Scanning
Enumerating
Gaining Access
Escalating Privilege
System Browsing
Actions
Lack of Security Policy
Poorly Enforced Policy
Misconfiguration
Software reliability
Failure to apply patches
Footprinting Port Scanning
Enumerating
Whois
SmartWhois
NsLookup
Sam Spade
NMap
Ping
Traceroute
Superscan
Determine the
Network Range
Identify
Active Machines
Discover Open Ports
and Access Points
Fingerprint the
Operating System
Uncover
Services on Ports
Map the
Network
Gather Initial
Information
Discovery Phase of PT
Netcat
NeoTrace
Visual Route
Attack Phase Steps with Loopback
Discovery
Phase
Gaining
Access
Escalating
Privilege
System
Browsing
Install
Add. Test
Software
Enough data has
been gathered in
the discovery
phase to make an
informed attempt
to access the target
If only user-level
access was
obtained in the last
step, the tester will
now seek to gain
complete control
of the system
The information-
gathering
process begins
again to identify
mechanisms to
gain access to
trusted systems
Types of Penetration Test
Penetration
Test
External
Test
Internal
Test
Black Box
White Box
Gray Box
Curious Employee
Disgruntled End User
Disgruntled Administrator
When is Testing Necessary?
Penetration Testing was
traditionally done once or
twice a year due to high
cost of service.
Automated Penetration
Testing software is
enabling organizations
today to test more often.
Upgrade
New
Attack
Quality
Assurance
Rollout
Test
Test
T
e
s
t
T
e
s
t
Periodic
Testing
Become Certified