BackTrack Penetration Testing Workshop

Download Report

Transcript BackTrack Penetration Testing Workshop

BackTrack Penetration Testing
Workshop
Michael Holcomb, CISSP
Upstate ISSA Chapter
Agenda






Introductions
Schedule
Workshop Format
The Attacker Methodology
Penetration Testing Execution
Standard (PTES)
Pentester Job Requirements
Disclaimer

Do not try this at home… without
permission!
Introductions




Name
Company
Position
Previous Experience



Windows & Linux
Penetration Testing
BackTrack
Schedule

Hours (9:00AM to 4:30PM)



10:20 to 10:30 - Break
11:00 to 12:30 – ISSA Chapter Meeting
2:45 to 3:00 - Break
Workshop Format



Session Materials
Practice Exercises
Workshop Survey
The Hacker Methodology





Information Gathering
Vulnerability Assessment
Exploitation
Privilege Escalation
Maintaining Access
Penetration Testing Execution
Standard (PTES)







Pre-engagement Interactions
Intelligence Gathering
Threat Modeling
Vulnerability Analysis
Exploitation
Post Exploitation
Reporting
Pentester Job Requirements






System and application scanning using
analysis tools
Validate automated testing results
Conduct manual analysis
Evaluate and communicate risk
Provide feedback and guidance
Certifications (CEH, CISA, CISSP,
OCSP)
Physical Security


Most overlooked area of Information
Security
If you can touch it, you can p0wn it!
www.securitywizardry.com/radar.htm
Bookmarks







VMware (vmware.com)
BackTrack 5 R3 (backtrack-linux.org)
Metasploitable (offensive-security.com)
Web Security Dojo (mavensecurity.com)
Pauldotcom (pauldotcom.com)
OCSP (offensive-security.com)
Katana (hackfromacave.com)