ethical hacking & penetration testing

50
Ethical Hacking & Penetration Test ting Bachelor Degree in Computer Engineering (CPE) Faculty of Engineering, KMUTT 18-Sep_2009 Surachai Chatchalermpun

Upload: surachai-chatchalermpun

Post on 18-Nov-2014

3.752 views

Category:

Technology


1 download

DESCRIPTION

Ethical Hacking & Penetration Testing For education only.

TRANSCRIPT

Page 1: Ethical Hacking & Penetration Testing

Ethical Hacking & Penetration Test ting

Bachelor Degree in Computer Engineering (CPE)Faculty of Engineering, KMUTT

18-Sep_2009

Surachai Chatchalermpun

Page 2: Ethical Hacking & Penetration Testing

2

OSSTMM • NIST (SP800-115)

Global Certificate

• EC-Council– CEH (Certified Ethical Hacker)

– ECSA (EC-Council Certified Security Analyst)

– LPT (Lice sensed Penetration Tester)

• SANS GIAC (Global Information Assurance Certification)

– GPEN (GIAC Certified Penetration Tester )

– GWAPT (GIAC Web Application Penetration Tester)

• OSSTMM (The Open Source Security Testing Methodology Manual)

– OPST (OSSTMM PROFESSIONAL SECURITY TESTER ACCREDITED CERTIFICATION)

– OPSA (OSSTMM PROFESSIONAL SECURITY ANALYST ACCREDITED CERTIFICATION)

– OPSE (OSSTMM PROFESSIONAL SECURITY EXPERT ACCREDITED CERTIFICATION)

• Mile2

– CPTEngineer (Certified Pen Testing Engineer)

Government-US with standards such as the NSA Infrastructure Evaluation Methodology (IEM).

Open Web Application Security Project (OWASP) provides a framework of recommendations

Page 3: Ethical Hacking & Penetration Testing

3

OSSTMM • NIST (SP800-115)

Page 4: Ethical Hacking & Penetration Testing

4

Page 5: Ethical Hacking & Penetration Testing

5

Page 6: Ethical Hacking & Penetration Testing

6

Page 7: Ethical Hacking & Penetration Testing

7

Page 8: Ethical Hacking & Penetration Testing

8

Page 9: Ethical Hacking & Penetration Testing

9

Page 10: Ethical Hacking & Penetration Testing

10

Page 11: Ethical Hacking & Penetration Testing

11

Page 12: Ethical Hacking & Penetration Testing

12

Page 13: Ethical Hacking & Penetration Testing

13

Page 14: Ethical Hacking & Penetration Testing

14

Page 15: Ethical Hacking & Penetration Testing

15

Page 16: Ethical Hacking & Penetration Testing

16

Page 17: Ethical Hacking & Penetration Testing

17

Page 18: Ethical Hacking & Penetration Testing

18

Page 19: Ethical Hacking & Penetration Testing

19

Page 20: Ethical Hacking & Penetration Testing

20

Page 21: Ethical Hacking & Penetration Testing

21

Page 22: Ethical Hacking & Penetration Testing

22

Page 23: Ethical Hacking & Penetration Testing

23

Page 24: Ethical Hacking & Penetration Testing

24

Page 25: Ethical Hacking & Penetration Testing

25

Page 26: Ethical Hacking & Penetration Testing

26

Page 27: Ethical Hacking & Penetration Testing

27

Page 28: Ethical Hacking & Penetration Testing

28

Page 29: Ethical Hacking & Penetration Testing

29

Page 30: Ethical Hacking & Penetration Testing

30

Page 31: Ethical Hacking & Penetration Testing

31

Page 32: Ethical Hacking & Penetration Testing

32

Page 33: Ethical Hacking & Penetration Testing

33

Page 34: Ethical Hacking & Penetration Testing

34

Page 35: Ethical Hacking & Penetration Testing

35

Page 36: Ethical Hacking & Penetration Testing

36

Page 37: Ethical Hacking & Penetration Testing

37

Page 38: Ethical Hacking & Penetration Testing

38

Page 39: Ethical Hacking & Penetration Testing

39

Page 40: Ethical Hacking & Penetration Testing

40

Page 41: Ethical Hacking & Penetration Testing

41

Page 42: Ethical Hacking & Penetration Testing

42

Page 43: Ethical Hacking & Penetration Testing

43

Page 44: Ethical Hacking & Penetration Testing

44

Page 45: Ethical Hacking & Penetration Testing

45

Page 46: Ethical Hacking & Penetration Testing

46

Page 47: Ethical Hacking & Penetration Testing

47

Page 48: Ethical Hacking & Penetration Testing

48

Page 49: Ethical Hacking & Penetration Testing

49

Page 50: Ethical Hacking & Penetration Testing

50