Penetration Testing: Sachin Phapale (Ciseh & Cissp)
Penetration Testing: Sachin Phapale (Ciseh & Cissp)
Sachin Phapale
(CISEH & CISSP)
Agenda
● Introduction about me
● Penetration testing Methodology
● Pen testing Frameworks
● Customizing your tool set
● Engagement Prep
● Post Engagement
● Wrapping it all up
The about me stuff
Hello Friends,
• I am an Individual Certified Information
Security Researcher and Ethical
Hacker!(CISEH)
• Now a days working to share knowledge on
Web Security and spreading awareness
about common securities.
Ethical Pentesting Methodology?
● No such thing if you want to be successful
● You need to think like a hacker
● Pentesting methodologies cover all grounds
and help win assessments
● Attention to details and organization skills
● Push the envelope but do not cross the line
Penetration Methodology
5 step process
● Reconnaissance/Footprinting
● Scanning & Enumeration
● Gaining Access
● Maintaining Access
● Covering Tracks
Penetration Methodology Cont.
● Reconnaissance
– Gathering information passively
– Not actively scanning or exploiting anything
– Harvesting information
● Bing, google, yahoo, yandex
● shodan