Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
16Activity
0 of .
Results for:
No results containing your search query
P. 1
Penetration Testing Presentation

Penetration Testing Presentation

Ratings: (0)|Views: 364|Likes:
Published by Arif Zina

More info:

Categories:Types, Research
Published by: Arif Zina on May 14, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less

09/07/2011

pdf

text

original

 
 
Penetration TestingPenetration Testingfrom Analystsfrom Analystsperspectiveperspective
Computer Forensics and SecurityComputer Forensics and SecurityBC Institute of TechnologyBC Institute of TechnologyPrepared by Arif ZinaPrepared by Arif Zina
 
 
Presentation OutlinePresentation Outline
What is penetration TestingWhat is penetration Testing
 The process and Methodology The process and Methodology
Planning and preparationPlanning and preparation
Information gathering and analysisInformation gathering and analysis
Vulnerability detectionVulnerability detection
Penetration AttemptPenetration Attempt
Analysis and reportingAnalysis and reporting
Cleaning upCleaning up
Limitation of Penetration TestingLimitation of Penetration Testing
ConclusionConclusion
 
 
What is penetration testingWhat is penetration testing
Identify vulnerabilities that exist in a system that hasIdentify vulnerabilities that exist in a system that hassecuritysecuritymeasuresmeasuresin place.in place.
Involves the attacking methods conducted by trustedInvolves the attacking methods conducted by trustedindividuals.individuals.
Scanning of IP addresses to identify machines that areScanning of IP addresses to identify machines that areoffering services with known vulneribilities.offering services with known vulneribilities.
Exploiting known vulnerabilities that exist in an unpatchedExploiting known vulnerabilities that exist in an unpatchedsystem.system.
Increase upper managements awareness of security issuesIncrease upper managements awareness of security issuesand decision making.and decision making.
Serious consequences on the network if tests notSerious consequences on the network if tests notconducted properly.conducted properly.

Activity (16)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
januali liked this
Rahul Tyagi liked this
Acharya liked this
mario liked this
arnaudkokou liked this
Manoj Kumar Jha liked this
hassan_dj liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->