Penetration Testing in Practice: develop your skills! - Pentestmag

Penetration Testing in Practice: develop your skills!

Download
File
1431337625wpdm_PenTest2015.pdf
1431337615wpdm_PenTest2015.epub

Dear Readers,

Let us present our latest issue entitled Penetration Testing in Practice.
Inside, you will find a few interesting tutorials that will help you develop your skills.


Table of Contents:


 1) Writing an Effective Penetration Testing Report

Writing an effective penetration testing report is an article that needs to be learned to make sure that the report will deliver the right information to the targeted audience.

  • High-Level Security Assessment
  • Tools of the Trade
  • Business Case
  • Planning and Preparation
  • Risk Management
  • Gathering and Translating Raw Data
  • Project Proposal
  • Project Activities
  • Deliverables

+ Sample Penetration Testing Report


2) Hardening VoIP Protocols

In this tutorial the reader will learn the guide lines used by the best expert in VoIP security. These best practice should be applied in order to avoid the attacks reported in the previous chapters.

  • Security Socket Layer (SSL) and SIP
  • Secure RTP
  • Advanced Encryption Standard (AES)
  • HMAC-SHA1
  • Method of Key Distribution
  • Firewalls
  • Network Address Translation (NAT)
  • Session Border Controllers (SBCs)

3) Try to write your own rule for detecting concrete signatures in network traffic in SnortIDS or SurricataIDS

In this section, we shall look at IDS which use predefined signatures in detection process. Signature-based approach comes from first implementations of intrusion detection systems and still is in use and actual.

  • Purpose of creating signature-based algorithms
  • Understanding of detection process
  • Signature-based algorithms benefits
  • Signature-based algorithms restrictions
  • Typical application for such algorithms

4) How to detect the vulnerabilities used in XSS attacks

How to detect and exploit the vulnerabilities behind this kind of attacks and how to make a Proof of Concept that can make your customers understand the risks they are exposed to? During the article we will show how to use the burp suite and other tools in order to detect and exploit the vulnerabilities.

  • Detect the vulnerabilities that allow you to perform XSS attacks
  • XSS Attack Vectors (HTTPWEB Based)
  • XSS Reflected VS Stored
  • DOM based XSS
  • How to trick users
  • Write your first XSS exploit

5) Configure and deploy a fully working Cisco Router

  • Deploy a fully sand boxed network running on Virtualbox to do all the testing you need;
  • Have a fully exploitable server at your disposal;
  • Configure and use a full functional Checkpoint firewall;
  • Deploy your Metasploit framework with Kali Linux;
  • Configure and deploy a fully working Cisco Router;
  • Grasp basic navigation concepts and commands of the Metasploit Framework;
  • Recreate a fully functional network for present and future testing.

6) Broken Authentication and Session Management

We will write a simple Web app with the main goal of pinging servers on the internet. There are many such applications in the wild now. And they are popular — whois web services, online statistics and others. So, this application allows one to enter a server address and ping that address, then it returns the result.
We will provide you two versions of all examples: one in Python and one in PHP.


 





Download
File
1431337625wpdm_PenTest2015.pdf
1431337615wpdm_PenTest2015.epub

July 23, 2021
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023