130 likes | 349 Views
BackTrack Penetration Testing Workshop. Michael Holcomb, CISSP Upstate ISSA Chapter. Agenda. Introductions Schedule Workshop Format The Attacker Methodology Penetration Testing Execution Standard (PTES) Pentester Job Requirements. Disclaimer. Do not try this at home… without permission!.
E N D
BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter
Agenda • Introductions • Schedule • Workshop Format • The Attacker Methodology • Penetration Testing Execution Standard (PTES) • Pentester Job Requirements
Disclaimer • Do not try this at home… without permission!
Introductions • Name • Company • Position • Previous Experience • Windows & Linux • Penetration Testing • BackTrack
Schedule • Hours (9:00AM to 4:30PM) • 10:20 to 10:30 - Break • 11:00 to 12:30 – ISSA Chapter Meeting • 2:45 to 3:00 - Break
Workshop Format • Session Materials • Practice Exercises • Workshop Survey
The Hacker Methodology • Information Gathering • Vulnerability Assessment • Exploitation • Privilege Escalation • Maintaining Access
Penetration Testing Execution Standard (PTES) • Pre-engagement Interactions • Intelligence Gathering • Threat Modeling • Vulnerability Analysis • Exploitation • Post Exploitation • Reporting
Pentester Job Requirements • System and application scanning using analysis tools • Validate automated testing results • Conduct manual analysis • Evaluate and communicate risk • Provide feedback and guidance • Certifications (CEH, CISA, CISSP, OCSP)
Physical Security • Most overlooked area of Information Security • If you can touch it, you can p0wn it!
Bookmarks • VMware (vmware.com) • BackTrack 5 R3 (backtrack-linux.org) • Metasploitable (offensive-security.com) • Web Security Dojo (mavensecurity.com) • Pauldotcom (pauldotcom.com) • OCSP (offensive-security.com) • Katana (hackfromacave.com)