BackTrack Penetration Testing Workshop

12
BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter

description

BackTrack Penetration Testing Workshop. Michael Holcomb, CISSP Upstate ISSA Chapter. Agenda. Introductions Schedule Workshop Format The Attacker Methodology Penetration Testing Execution Standard (PTES) Pentester Job Requirements. Disclaimer. Do not try this at home… without permission!. - PowerPoint PPT Presentation

Transcript of BackTrack Penetration Testing Workshop

Page 1: BackTrack Penetration Testing Workshop

BackTrack Penetration Testing Workshop

Michael Holcomb, CISSP

Upstate ISSA Chapter

Page 2: BackTrack Penetration Testing Workshop

Agenda

Introductions Schedule Workshop Format The Attacker Methodology Penetration Testing Execution

Standard (PTES) Pentester Job Requirements

Page 3: BackTrack Penetration Testing Workshop

Disclaimer

Do not try this at home… without permission!

Page 4: BackTrack Penetration Testing Workshop

Introductions

Name Company Position Previous Experience

Windows & Linux Penetration Testing BackTrack

Page 5: BackTrack Penetration Testing Workshop

Schedule

Hours (9:00AM to 4:30PM) 10:20 to 10:30 - Break 11:00 to 12:30 – ISSA Chapter Meeting 2:45 to 3:00 - Break

Page 6: BackTrack Penetration Testing Workshop

Workshop Format

Session Materials Practice Exercises Workshop Survey

Page 7: BackTrack Penetration Testing Workshop

The Hacker Methodology

Information Gathering Vulnerability Assessment Exploitation Privilege Escalation Maintaining Access

Page 8: BackTrack Penetration Testing Workshop

Penetration Testing Execution Standard (PTES)

Pre-engagement Interactions Intelligence Gathering Threat Modeling Vulnerability Analysis Exploitation Post Exploitation Reporting

Page 9: BackTrack Penetration Testing Workshop

Pentester Job Requirements

System and application scanning using analysis tools

Validate automated testing results Conduct manual analysis Evaluate and communicate risk Provide feedback and guidance Certifications (CEH, CISA, CISSP,

OCSP)

Page 10: BackTrack Penetration Testing Workshop

Physical Security

Most overlooked area of Information Security

If you can touch it, you can p0wn it!

Page 11: BackTrack Penetration Testing Workshop

www.securitywizardry.com/radar.htm

Page 12: BackTrack Penetration Testing Workshop

Bookmarks

VMware (vmware.com) BackTrack 5 R3 (backtrack-linux.org) Metasploitable (offensive-security.com) Web Security Dojo (mavensecurity.com) Pauldotcom (pauldotcom.com) OCSP (offensive-security.com) Katana (hackfromacave.com)