12
BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter

BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter

Embed Size (px)

Citation preview

Page 1: BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter

BackTrack Penetration Testing Workshop

Michael Holcomb, CISSP

Upstate ISSA Chapter

Page 2: BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter

Agenda

Introductions Schedule Workshop Format The Attacker Methodology Penetration Testing Execution

Standard (PTES) Pentester Job Requirements

Page 3: BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter

Disclaimer

Do not try this at home… without permission!

Page 4: BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter

Introductions

Name Company Position Previous Experience

Windows & Linux Penetration Testing BackTrack

Page 5: BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter

Schedule

Hours (9:00AM to 4:30PM) 10:20 to 10:30 - Break 11:00 to 12:30 – ISSA Chapter Meeting 2:45 to 3:00 - Break

Page 6: BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter

Workshop Format

Session Materials Practice Exercises Workshop Survey

Page 7: BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter

The Hacker Methodology

Information Gathering Vulnerability Assessment Exploitation Privilege Escalation Maintaining Access

Page 8: BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter

Penetration Testing Execution Standard (PTES)

Pre-engagement Interactions Intelligence Gathering Threat Modeling Vulnerability Analysis Exploitation Post Exploitation Reporting

Page 9: BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter

Pentester Job Requirements

System and application scanning using analysis tools

Validate automated testing results Conduct manual analysis Evaluate and communicate risk Provide feedback and guidance Certifications (CEH, CISA, CISSP,

OCSP)

Page 10: BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter

Physical Security

Most overlooked area of Information Security

If you can touch it, you can p0wn it!

Page 11: BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter

www.securitywizardry.com/radar.htm

Page 12: BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter

Bookmarks

VMware (vmware.com) BackTrack 5 R3 (backtrack-linux.org) Metasploitable (offensive-security.com) Web Security Dojo (mavensecurity.com) Pauldotcom (pauldotcom.com) OCSP (offensive-security.com) Katana (hackfromacave.com)