SlideShare a Scribd company logo
WTF is Penetration Testing?
An Overview of Who, What, Where, When, and Why
Scott Sutherland
Ryan Wakeham
• Scott Sutherland
Principle Security Consultant
NetSPI
• Ryan Wakeham
Director of Consulting
NetSPI
Who are we?
Presentation Overview
• What is a “pen test”?
• Why do companies “pen test”?
• Who does “pen testing”?
• What skills are required?
‒ Non Technical Skillset
‒ Basic Technical Skillset
‒ Offensive and Defensive Knowledge
• What are some Common Tools?
• Pen Testing as a Career
• Attack Demo: SQL Inject World
• Questions
What is Penetration Testing?
Our Definition:
“The process of evaluating systems,
applications, and protocols with the intent
of identifying vulnerabilities from the
perspective of an unprivileged or
anonymous user to determine the real
world impact…”
“…legally and under contract”
Why do Companies Pen Test?
• Compliance Requirements
• Validate Existing Controls
• Identify Unknown Security Gaps
• Prioritize Existing Security Initiatives
• Prevent Data Breaches
• Test IDS / IPS / IRP
What are the Technical Objectives?
• Client specific objectives first
• Identify and verify all entry points
• Identify critical escalation points
• Gain unauthorized access to:
‒ Application functionality
‒ Critical systems
‒ Sensitive data
Assessment VS. Penetration
• Vulnerability Assessment and
Penetration Testing Answer:
‒ What are my system layer vulnerabilities?
‒ Where are my system layer vulnerabilities?
‒ How wide spread are my system layer
vulnerabilities?
‒ Can I identify attacks?
‒ How do I fix my vulnerabilities?
Assessment VS. Penetration
• Penetration Testing Answers:
‒ What are my high impact network layer issues?
‒ What are my high impact application layer
issues?
‒ Can an attacker gain unauthorized access to:
• critical infrastructure that provides
privileged access or cause service disruptions
• critical application functionality that the
business depends on
• sensitive data that the business would be
required to report on if a breach occurs
‒ Can an attacker bypass our IPS / WAF?
‒ Can an attacker pivot from environment A to
environment B?
Common Penetration Test Approach
• Kickoff: Scope, cost, testing windows, risks etc
• Information Gathering
• Vulnerability Enumeration
• Penetration
• Escalation
• Evidence Gathering (Pilfering)
• Clean up
• Report Creation
• Report Delivery and Review
• Remediation
Who Conducts Pen Testing?
• Internal Employees
• Security Analyst
• Security Consultant
• Third Parties
• Audit Firms
• Security Consultants
Rules of Engagement
• Have fun, but…Hack Responsibly!
• Written permission
• Stay in scope
• No DoS
• Don’t change major state
• Restore state
• Clear communication
What Skills are Needed?
• Non Technical
• Basic Technical
• Offensive
• Defensive
• Common Tools
Non Technical Skillset
• Written and Verbal Communications
• Emails/phone calls
• Report development
• Small and large group presentations
• Professionalism
• Respecting others, setting, and
meeting expectations
• Troubleshooting Mindset
• Never give up, never surrender
• Where there is a will, there is a way
• Ethics
• Don’t do bad things
• Pros (career) vs. Cons (jail)
• Hack responsibly
Basic Technical Skillset
• Windows Desktop Administration
• Windows Domain Administration
• Linux and Unix Administration
• Network Infrastructure Administration
• Application Development
• Scripting (Ruby, Python, PHP, Bash, PS, Batch)
• Managed languages (.Net, Java, Davlik)
• Unmanaged languages (C, C++)
Offensive and Defensive Knowledge
• System enumeration and service
fingerprinting
• Linux system exploitation and escalation
• Windows system exploitation and escalation
• Network system exploitation and escalation
• Protocol exploitation
• Web application exploitation (OWASP)
• Reverse engineering client-server
applications + AV Evasion
• Social engineering techniques (onsite,
phone, email)
Common Tools
There are hundreds of “hacker” tools.
Generally, you need to have enough
knowledge to know what tool or tool(s) is
right for the task at hand….
…and if one doesn’t exist, then create it.
Common Tools
That being said…
Common Tools
• Knowledge > Tools
• Understand the core technologies
• Understand the core offensive techniques
• Understand the core defensive techniques
• Network Penetration Testing
• BT, CAIN, YERSINIA, NCAT, NMAP, NESSUS,
NEXPOSE, WCE, MIMIKATZ, AirCrack-ng,
METASPLOIT… and NATIVE TOOLS!
• Application Penetration Testing
• BURP, ZAP, NIKTO, DIRBUSTER, SQLMAP, SQL
Ninja, and BEEF…. and commercial tools
Pen Testing as a Career: Common Paths
• Internal Paths
• Help Desk
• IT Support
• IT Admin
• Security Analyst
• Senior Security Analyst
• Internal Consultant
• CISO
• Security Consulting Paths
• Internship
• Consultant
• Senior Consultant
• Principle Consultant
• Team Lead
• Director
Security consultants
often end up in
malware research or
exploit
development, but
some go corporate.
Internal employees
often stay internal.
Pen Testing as a Career: How to Start
• Read and learn! – There is no “end”
• Tap into the community!
• Research and Development
• Contribute to open source projects
• Present research at conferences
• Training and Certifications
• Community: DC612, OWASP, Conferences, etc
• Professional ($): SANS, OffSec, CISSP, etc
• Volunteer
• Internships
BE SAFE and
HACK RESPONSIBLY
Questions
Questions,
comments, curses?

More Related Content

What's hot (20)

PDF
The Web Application Hackers Toolchain
jasonhaddix
 
PDF
The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZA...
Denim Group
 
PPTX
Automated tools for penetration testing
devanshdubey7
 
PDF
Ethical Hacking & Penetration Testing
Won Ju Jub
 
PPTX
External to DA, the OS X Way
Stephan Borosh
 
PDF
Defcon 22-tim-mcguffin-one-man-shop
Priyanka Aash
 
PPTX
Secure Coding 101 - OWASP University of Ottawa Workshop
Paul Ionescu
 
PPTX
Lateral Movement - Phreaknik 2016
Xavier Ashe
 
PDF
Lateral Movement: How attackers quietly traverse your Network
EC-Council
 
PPT
Web attacks
husnara mohammad
 
PDF
Shmoocon 2015 - httpscreenshot
jstnkndy
 
PDF
Addios!
Chong-Kuan Chen
 
PDF
PCI and Vulnerability Assessments - What’s Missing
Black Duck by Synopsys
 
PDF
Malware collection and analysis
Chong-Kuan Chen
 
PDF
When the internet bleeded : RootConf 2014
Anant Shrivastava
 
PDF
Defcon 22-gregory-pickett-abusing-software-defined-networks
Priyanka Aash
 
PDF
The Dark Side of PowerShell by George Dobrea
EC-Council
 
PDF
Myths and Misperceptions of Open Source Security
Black Duck by Synopsys
 
PDF
Real World Application Threat Modelling By Example
NCC Group
 
PDF
RIoT (Raiding Internet of Things) by Jacob Holcomb
Priyanka Aash
 
The Web Application Hackers Toolchain
jasonhaddix
 
The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZA...
Denim Group
 
Automated tools for penetration testing
devanshdubey7
 
Ethical Hacking & Penetration Testing
Won Ju Jub
 
External to DA, the OS X Way
Stephan Borosh
 
Defcon 22-tim-mcguffin-one-man-shop
Priyanka Aash
 
Secure Coding 101 - OWASP University of Ottawa Workshop
Paul Ionescu
 
Lateral Movement - Phreaknik 2016
Xavier Ashe
 
Lateral Movement: How attackers quietly traverse your Network
EC-Council
 
Web attacks
husnara mohammad
 
Shmoocon 2015 - httpscreenshot
jstnkndy
 
PCI and Vulnerability Assessments - What’s Missing
Black Duck by Synopsys
 
Malware collection and analysis
Chong-Kuan Chen
 
When the internet bleeded : RootConf 2014
Anant Shrivastava
 
Defcon 22-gregory-pickett-abusing-software-defined-networks
Priyanka Aash
 
The Dark Side of PowerShell by George Dobrea
EC-Council
 
Myths and Misperceptions of Open Source Security
Black Duck by Synopsys
 
Real World Application Threat Modelling By Example
NCC Group
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
Priyanka Aash
 

Viewers also liked (18)

PDF
Thick Application Penetration Testing - A Crash Course
NetSPI
 
PDF
Introduction to Windows Dictionary Attacks
NetSPI
 
PDF
Declaration of Mal(WAR)e
NetSPI
 
PDF
Thick Application Penetration Testing: Crash Course
Scott Sutherland
 
PDF
All You Need is One - A ClickOnce Love Story - Secure360 2015
NetSPI
 
PDF
Fuzzing and You: Automating Whitebox Testing
NetSPI
 
PDF
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Damon Small
 
PDF
Attack All the Layers - What's Working in Penetration Testing
NetSPI
 
PPTX
Extracting Credentials From Windows
NetSPI
 
PPTX
GPU Cracking - On the Cheap
NetSPI
 
PDF
What is pentest
itissolutions
 
PDF
System of security controls
S.E. CTS CERT-GOV-MD
 
PDF
Attack All The Layers - What's Working in Penetration Testing
NetSPI
 
PDF
Penetration testing & Ethical Hacking
S.E. CTS CERT-GOV-MD
 
PPT
Open Source Tools & Data Science Competitions
odsc
 
PPTX
1114 sasaki-metadata
Felix Sasaki
 
PDF
Convegno “ Stress, molestie lavorative e organizzative del lavoro: aspetti pr...
Drughe .it
 
PPT
Como Planejar sua Campanha Promocional com Brindes | Apresentação 2 de 3
Memory Promotional Enterprise
 
Thick Application Penetration Testing - A Crash Course
NetSPI
 
Introduction to Windows Dictionary Attacks
NetSPI
 
Declaration of Mal(WAR)e
NetSPI
 
Thick Application Penetration Testing: Crash Course
Scott Sutherland
 
All You Need is One - A ClickOnce Love Story - Secure360 2015
NetSPI
 
Fuzzing and You: Automating Whitebox Testing
NetSPI
 
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Damon Small
 
Attack All the Layers - What's Working in Penetration Testing
NetSPI
 
Extracting Credentials From Windows
NetSPI
 
GPU Cracking - On the Cheap
NetSPI
 
What is pentest
itissolutions
 
System of security controls
S.E. CTS CERT-GOV-MD
 
Attack All The Layers - What's Working in Penetration Testing
NetSPI
 
Penetration testing & Ethical Hacking
S.E. CTS CERT-GOV-MD
 
Open Source Tools & Data Science Competitions
odsc
 
1114 sasaki-metadata
Felix Sasaki
 
Convegno “ Stress, molestie lavorative e organizzative del lavoro: aspetti pr...
Drughe .it
 
Como Planejar sua Campanha Promocional com Brindes | Apresentação 2 de 3
Memory Promotional Enterprise
 
Ad

Similar to WTF is Penetration Testing (20)

PDF
WTF is Penetration Testing
Scott Sutherland
 
PPTX
WTF is Penetration Testing v.2
Scott Sutherland
 
PPTX
Ethical Hacking and Defense Penetration
Jay Nagar
 
PDF
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Software Guru
 
PDF
Security and Penetration Testing Overview
QA InfoTech
 
PDF
Unraveling the Confusion Surrounding the Purpose of Penetration Tests
Bo Birdwell
 
PDF
Itis pentest slides hyd
Rama krishna
 
PDF
PENETRATION TESTING LECTURE SLIDES start
Dorcask3
 
PPTX
Hacking and Penetration Testing - a beginners guide
Pankaj Dubey
 
PDF
The Art of Penetration Testing in Cybersecurity.
Expeed Software
 
PPT
Pentesting hygt frde education of engi.ppt
asranausheenasra
 
PDF
So, you wanna be a pen tester ctsc2017
Adrien de Beaupre
 
PDF
Cyber Security Company.pdf
pdfcompressor1
 
PDF
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
TruShield Security Solutions
 
PPTX
What is penetration testing
sakshisoni076
 
PDF
pentration testing.pdf
Ramya Nellutla
 
PPTX
Pen Testing Explained
Rand W. Hirt
 
PDF
Application Security: Safeguarding Data, Protecting Reputations
Cognizant
 
PPTX
Penentration testing
tahreemsaleem
 
PPTX
Penetration Testing for Cybersecurity Professionals
211 Check
 
WTF is Penetration Testing
Scott Sutherland
 
WTF is Penetration Testing v.2
Scott Sutherland
 
Ethical Hacking and Defense Penetration
Jay Nagar
 
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Software Guru
 
Security and Penetration Testing Overview
QA InfoTech
 
Unraveling the Confusion Surrounding the Purpose of Penetration Tests
Bo Birdwell
 
Itis pentest slides hyd
Rama krishna
 
PENETRATION TESTING LECTURE SLIDES start
Dorcask3
 
Hacking and Penetration Testing - a beginners guide
Pankaj Dubey
 
The Art of Penetration Testing in Cybersecurity.
Expeed Software
 
Pentesting hygt frde education of engi.ppt
asranausheenasra
 
So, you wanna be a pen tester ctsc2017
Adrien de Beaupre
 
Cyber Security Company.pdf
pdfcompressor1
 
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
TruShield Security Solutions
 
What is penetration testing
sakshisoni076
 
pentration testing.pdf
Ramya Nellutla
 
Pen Testing Explained
Rand W. Hirt
 
Application Security: Safeguarding Data, Protecting Reputations
Cognizant
 
Penentration testing
tahreemsaleem
 
Penetration Testing for Cybersecurity Professionals
211 Check
 
Ad

Recently uploaded (20)

PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PDF
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
PDF
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
PDF
Persuasive AI: risks and opportunities in the age of digital debate
Speck&Tech
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
Complete Network Protection with Real-Time Security
L4RGINDIA
 
PDF
July Patch Tuesday
Ivanti
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
Persuasive AI: risks and opportunities in the age of digital debate
Speck&Tech
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
Complete Network Protection with Real-Time Security
L4RGINDIA
 
July Patch Tuesday
Ivanti
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 

WTF is Penetration Testing

  • 1. WTF is Penetration Testing? An Overview of Who, What, Where, When, and Why Scott Sutherland Ryan Wakeham
  • 2. • Scott Sutherland Principle Security Consultant NetSPI • Ryan Wakeham Director of Consulting NetSPI Who are we?
  • 3. Presentation Overview • What is a “pen test”? • Why do companies “pen test”? • Who does “pen testing”? • What skills are required? ‒ Non Technical Skillset ‒ Basic Technical Skillset ‒ Offensive and Defensive Knowledge • What are some Common Tools? • Pen Testing as a Career • Attack Demo: SQL Inject World • Questions
  • 4. What is Penetration Testing? Our Definition: “The process of evaluating systems, applications, and protocols with the intent of identifying vulnerabilities from the perspective of an unprivileged or anonymous user to determine the real world impact…” “…legally and under contract”
  • 5. Why do Companies Pen Test? • Compliance Requirements • Validate Existing Controls • Identify Unknown Security Gaps • Prioritize Existing Security Initiatives • Prevent Data Breaches • Test IDS / IPS / IRP
  • 6. What are the Technical Objectives? • Client specific objectives first • Identify and verify all entry points • Identify critical escalation points • Gain unauthorized access to: ‒ Application functionality ‒ Critical systems ‒ Sensitive data
  • 7. Assessment VS. Penetration • Vulnerability Assessment and Penetration Testing Answer: ‒ What are my system layer vulnerabilities? ‒ Where are my system layer vulnerabilities? ‒ How wide spread are my system layer vulnerabilities? ‒ Can I identify attacks? ‒ How do I fix my vulnerabilities?
  • 8. Assessment VS. Penetration • Penetration Testing Answers: ‒ What are my high impact network layer issues? ‒ What are my high impact application layer issues? ‒ Can an attacker gain unauthorized access to: • critical infrastructure that provides privileged access or cause service disruptions • critical application functionality that the business depends on • sensitive data that the business would be required to report on if a breach occurs ‒ Can an attacker bypass our IPS / WAF? ‒ Can an attacker pivot from environment A to environment B?
  • 9. Common Penetration Test Approach • Kickoff: Scope, cost, testing windows, risks etc • Information Gathering • Vulnerability Enumeration • Penetration • Escalation • Evidence Gathering (Pilfering) • Clean up • Report Creation • Report Delivery and Review • Remediation
  • 10. Who Conducts Pen Testing? • Internal Employees • Security Analyst • Security Consultant • Third Parties • Audit Firms • Security Consultants
  • 11. Rules of Engagement • Have fun, but…Hack Responsibly! • Written permission • Stay in scope • No DoS • Don’t change major state • Restore state • Clear communication
  • 12. What Skills are Needed? • Non Technical • Basic Technical • Offensive • Defensive • Common Tools
  • 13. Non Technical Skillset • Written and Verbal Communications • Emails/phone calls • Report development • Small and large group presentations • Professionalism • Respecting others, setting, and meeting expectations • Troubleshooting Mindset • Never give up, never surrender • Where there is a will, there is a way • Ethics • Don’t do bad things • Pros (career) vs. Cons (jail) • Hack responsibly
  • 14. Basic Technical Skillset • Windows Desktop Administration • Windows Domain Administration • Linux and Unix Administration • Network Infrastructure Administration • Application Development • Scripting (Ruby, Python, PHP, Bash, PS, Batch) • Managed languages (.Net, Java, Davlik) • Unmanaged languages (C, C++)
  • 15. Offensive and Defensive Knowledge • System enumeration and service fingerprinting • Linux system exploitation and escalation • Windows system exploitation and escalation • Network system exploitation and escalation • Protocol exploitation • Web application exploitation (OWASP) • Reverse engineering client-server applications + AV Evasion • Social engineering techniques (onsite, phone, email)
  • 16. Common Tools There are hundreds of “hacker” tools. Generally, you need to have enough knowledge to know what tool or tool(s) is right for the task at hand…. …and if one doesn’t exist, then create it.
  • 18. Common Tools • Knowledge > Tools • Understand the core technologies • Understand the core offensive techniques • Understand the core defensive techniques • Network Penetration Testing • BT, CAIN, YERSINIA, NCAT, NMAP, NESSUS, NEXPOSE, WCE, MIMIKATZ, AirCrack-ng, METASPLOIT… and NATIVE TOOLS! • Application Penetration Testing • BURP, ZAP, NIKTO, DIRBUSTER, SQLMAP, SQL Ninja, and BEEF…. and commercial tools
  • 19. Pen Testing as a Career: Common Paths • Internal Paths • Help Desk • IT Support • IT Admin • Security Analyst • Senior Security Analyst • Internal Consultant • CISO • Security Consulting Paths • Internship • Consultant • Senior Consultant • Principle Consultant • Team Lead • Director Security consultants often end up in malware research or exploit development, but some go corporate. Internal employees often stay internal.
  • 20. Pen Testing as a Career: How to Start • Read and learn! – There is no “end” • Tap into the community! • Research and Development • Contribute to open source projects • Present research at conferences • Training and Certifications • Community: DC612, OWASP, Conferences, etc • Professional ($): SANS, OffSec, CISSP, etc • Volunteer • Internships
  • 21. BE SAFE and HACK RESPONSIBLY