You are on page 1of 16

Penetration Testing

Ravi Dharmawan
12/8/2020
Importance of Cyber Security in Industry
1. Cyber attack can happen anytime and anywhere
2. A lot of data breach happened.
3. When a company suffers data breach, it will takes time to recover company
reputation.
Cyber Security Role in Industry
1. Offensive Security (Red Team)
○ Infosec team who focuses to do penetration testing in company and report potential vulnerabilities
to stakeholder.
2. Defensive Security (Blue Team)
○ Infosec team who focuses to build good defensive infrastructure, incident response, digital forensic.
3. Security Architect
○ Infosec team who focuses to build good security architecture.
Penetration Testing
Penetration testing is a step to stimulate attack in company. The goals of penetration
testing is to discover potential vulnerability in company’s system. Steps of penetration
testing are

1. Information Gathering
2. Vulnerability Assesment
3. Exploitation
4. Privilege Escalation
5. Maintaining Access
6. Reporting
Information Gathering
Information Gathering is a step of penetration testing which purposes to find out as
much information as possible about target which will be attacked. There are 2 type of
information gathering

1. Passive Information Gathering (GHDB, SocialSearcher etc)


2. Active Information Gathering (port scanning, fuzzing etc)
Information Gathering : Nmap
Vulnerability Assesment
Vulnerability Assesment is a step of penetration testing which purposes to discover
vulnerability in target. This is crucial step for penetration testing. There are 2 type of
Vulnerability Assesment

1. Automatic Vulnerability Assesment (Nessus, nmap)


2. Manual Vulnerability Assesment (By send request and analyze packet response)
Vulnerability Assesment : Nessus
Vulnerability Assesment : Nmap
Exploitation
Exploitation is a step of penetration testing to exploit the discovered vulnerability. The
step of exploitation is based on the discovered vulnerability. If the system is vulnerable
against SQL Injection, the exploitation step is do SQL Injection.

1. Automatic Exploitation (sqlmap, metasploit etc)


2. Manual Exploitation
Exploitation : sqlmap
Exploitation : MS17-010
Privilege Escalation
Once attacker got initial access on target, he will try to escalate his privilege to root
user if the target is Linux or NT AUTHORITY\SYSTEM if the target is Windows.
Example of privilege escalation exploit is DirtyCow (CVE-2016-5195
https://dirtycow.ninja/ ) which will escalate attacker to root user if the kernel is
vulnerable.
Privilege Escalation : Dirty Cow Exploit (CVE-2016-5195)
Maintaining Access
Maintaining Access is a step to put backdoor in target system which purposes to
maintain access although the system administrator has fix the vulnerability.
Reporting
Reporting is important step to explain vulnerability in details and risk of vulnerability.
The report of penetration testing will be send to stakeholder in order to notice the
vulnerability and convince the responsible team to fix the vulnerability.

You might also like