CEH IT Security Penetration Testing Step
CEH IT Security Penetration Testing Step
CEH IT Security Penetration Testing Step
Step
Knowledge NET
Penetration Testing
Overview
• Penetration testing is a security testing methodology that
gives an attacker insight into the target’s security
posture and the strength of the target’s network security.
A complete security snapshot includes:
Level I, High-level assessment. A top-down look at the
organization’s policies, procedures, standards and
guidelines. A Level I assessment is not usually hands-on,
in that the system’s security is not actually tested.
Level II, Network evaluation. More hands-on than a
Level I assessment, a Level II assessment has some of
the Level I activities with more information gathering and
scanning.
Level III, Penetration test. A penetration test is not
usually concerned with policies. It’s more about taking
the adversarial view of a hacker, by seeing what can be
accomplished and with what difficulty.
The need of Penetration
Testing
• The reason a security professional may wish to conduct a
penetration test of his or her company is the same as the
reason a business has a security policy
• Several factors have converged in the marketplace to make
penetration testing a necessity.
• The skill level required to execute a hacker exploit has
steadily decreased.
• The size and complexity of the network environment has
mushroomed.
• The number of network and Web-based applications has
increased.
• The detrimental impact of a security breach on corporate
assets and goodwill is greater than ever.
Penetration Testing Phases
• Penetration testing is most commonly carried out
within a black-box (that is, with no prior knowledge
of the infrastructure to be tested). At its simplest
level, the penetration test involves three phases
Preparation phase. A formal contract is executed
containing nondisclosure of the client’s data and legal
protection for the tester. At a minimum, it also lists the IP
addresses to be tested and the time to test.