BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter.

Slides:



Advertisements
Similar presentations
By Bruce Ellis Western Governors University. Demonstrate the need for updating information systems Build security awareness Inform management of the risk.
Advertisements

Presented by Heorot.net. Your instructor Course material Structure of the course Individual Penetration Test Effort (PTE)
PhoenixPro Procurement. technology. contracts. projects.
ETHICAL HACKING.
PENETRATION TESTING Presenters:Chakrit Sanbuapoh Sr. Information Security MFEC.
Protection of Information Assets I. Joko Dewanto 1.
Armitage and Metasploit Penetration Testing Lab
Module 2 – PenTest Overview
Chapter 1 Ethical Hacking Overview. Who Am I?  Kevin Riley  Systems / Network Analyst Orange Coast College   Phone
Offensive Security Part 1 Basics of Penetration Testing
A Complete Tool For System Penetration Testing Presented By:- Mahesh Kumar Sharma B.Tech IV Year Computer Science Roll No. :- CS09047.
Penetration Testing Presented by: Elham Hojati Advisor: Dr. Akbar Namin July 2014.
Penetration Testing Anand Sudula, CISA,CISSP SSA Global Technologies, India Anand Sudula, CISA,CISSP SSA Global Technologies, India.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Information System Security. Outline  Oracle Vulnerabilities  Oracle Security Assessment 2 Information System Security - Week 10.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Hands-On Ethical Hacking and Network Defense
Red Team “You keep using that word, I do not think it means what you think it means” – Inigo Montoya.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
The Business of Penetration Testing
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Mapping The Penetration Tester’s Mind 0 to Root in 60 Min #MappingThePenTestersMind 1.
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Performing a Penetration Test.  Penetration Tester  Attempts to reveal potential consequences of a real attack  Security Audit / Vulnerability Assessment.
Lixin Tao, Li-Chiou Chen & Chienting Lin Pace University
Pen testing to ensure your security
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Network Security Testing— Are There Really Different Types of Testing? July 28, 2015 Start Time: 9 am US Pacific / 12 noon US Eastern / 5 pm London Time.
7-Oct-15 System Auditing. AUDITING Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic.
Nata Raju Gurrapu Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Penetration Testing Training Day Penetration Testing Tools and Techniques – pt 1 Mike Westmacott, IRM plc Supported by.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Module 3 – Information Gathering  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
Penetration Testing 101 (Boot-camp)
23 July 2003 PM-ITTS TSMOTSMO Information Assessment Test Tool (IATT) for IO/IW Briefing by: Darrell L Quarles Program Director U.S. Army Threat Systems.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Module 5 – Vulnerability Identification  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
Risk (Vulnerability) Assessment & Penetration Test Approach 1VA PT Approach Confidential.
MVHS Career Night 2015 Information Security. Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Module 6 – Penetration  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification ○ Penetration.
Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning.
Introduction to Security Dr. John P. Abraham Professor UTPA.
{ Kali Linux Pen testing to ensure your security.
Introducing the Smartphone Pentesting Framework Georgia Weidman Bulb Security LLC Approved for Public Release, Distribution Unlimited.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
1 © 1998, Cisco Systems, Inc.Cisco Country Page Web Editor Workshop EMEA 1998/Dec/11-12.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Vulnerability Analysis Dr. X. Computer system Design Implementation Maintenance Operation.
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
You can easily passed the GPEN Penetration tester exam by the help of exams4sure.com exams4sure.com Get Complete File From
1 Web Time Entry Information Session August 3, 2007.
Vulnerability Assessment 2012 BackTrack Workshop Upstate ISSA Chapter.
King William High School. Cyber Security Curriculum 4 year high school curriculum Up to 5 technology certifications upon successful completion of each.
Defining your requirements for a successful security (and compliance
Penetration Testing in Financial Institutions
Penetration Testing Presented by: Elham Hojati
Penetration Testing Presented by: Elham Hojati
Pentesting with Powershell
Joaquin Fuentes MBA, CEH, CPT, CISSP, CISA, NACA
Mobile Pen Testing w/ drozer
Penetration Testing Computer Science and Software Engineering
Carbon footprint training
Computer Security Fundamentals
Metasploit assignment – Arkadiy Kantor – Mis-5212
Presentation transcript:

BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter

Agenda Introductions Schedule Workshop Format The Attacker Methodology Penetration Testing Execution Standard (PTES) Pentester Job Requirements

Disclaimer Do not try this at home… without permission!

Introductions Name Company Position Previous Experience  Windows & Linux  Penetration Testing  BackTrack

Schedule Hours (9:00AM to 4:30PM)  10:20 to 10:30 - Break  11:00 to 12:30 – ISSA Chapter Meeting  2:45 to 3:00 - Break

Workshop Format Session Materials Practice Exercises Workshop Survey

The Hacker Methodology Information Gathering Vulnerability Assessment Exploitation Privilege Escalation Maintaining Access

Penetration Testing Execution Standard (PTES) Pre-engagement Interactions Intelligence Gathering Threat Modeling Vulnerability Analysis Exploitation Post Exploitation Reporting

Pentester Job Requirements System and application scanning using analysis tools Validate automated testing results Conduct manual analysis Evaluate and communicate risk Provide feedback and guidance Certifications (CEH, CISA, CISSP, OCSP)

Physical Security Most overlooked area of Information Security If you can touch it, you can p0wn it!

Bookmarks VMware (vmware.com) BackTrack 5 R3 (backtrack-linux.org) Metasploitable (offensive-security.com) Web Security Dojo (mavensecurity.com) Pauldotcom (pauldotcom.com) OCSP (offensive-security.com) Katana (hackfromacave.com)