Practical Penetration Testing 101 Look mom Im a hacker now! Words - - PowerPoint PPT Presentation

practical penetration testing 101
SMART_READER_LITE
LIVE PREVIEW

Practical Penetration Testing 101 Look mom Im a hacker now! Words - - PowerPoint PPT Presentation

Practical Penetration Testing 101 Look mom Im a hacker now! Words of warning Anything you do to a remote system without authorization is illegal Use common sense Federal prison is bad Overview of Today Brief overview


slide-1
SLIDE 1

Practical Penetration Testing 101

Look mom I’m a hacker now!

slide-2
SLIDE 2

Words of warning

  • Anything you do to a remote system without authorization is illegal
  • Use common sense
  • Federal prison is bad
slide-3
SLIDE 3

Overview of Today

  • Brief overview of the cyber kill chain
  • We will be attempting to exploit a live system and relate that back to the cyber

kill chain

slide-4
SLIDE 4

Cyber Kill Chain

slide-5
SLIDE 5

1- Reconnaissance

  • Scans will be performed on a target’s network
  • Use tools such as nmap
  • Osint- Open-source intelligence

Scanning Social media, Google Hacking, ect.

slide-6
SLIDE 6

2 - Intrusion

  • This is a point of entry for an attack
  • Most commonly done through phishing or MiM attack
slide-7
SLIDE 7

3 - Exploitation

  • This is where an attacker will attempt to exploit a physical system on the

network beyond the perimeter

  • The attacker will use the system they are on to pivot to other boxes on the

network

slide-8
SLIDE 8

4 - Privilege Escalation

  • An attacker will use vulnerabilities/misconfigurations on a box to gain “root” or

administrator access

  • All about elevating the attackers permissions, for example on a windows

network the main goal would be domain controller

slide-9
SLIDE 9

5 - Lateral Movement

  • An attacker will then try to pivot across the network to other boxes and other

subnets

  • The attacker will also look out for sensitive PII
slide-10
SLIDE 10

6 - Obfuscation

  • Naturally, the attacker will try to hide their presence
  • They will use timestoping, redirect logs, and removing data to do so
slide-11
SLIDE 11

7 - Denial of Service

  • Next an attacker will bring down the entire network
  • This is done because it can cause harm to the infiltrated organization

Uptime = $$$ Imagine if this was done to Amazon

slide-12
SLIDE 12

8 - Exfiltration

  • An attacker will then cover their tracks and exit the network with all the stolen

information

  • What happens with this information depends on the attacker
  • The attacker may leave behind backdoors
slide-13
SLIDE 13

Live Demo

Now the fun part!