Ethical Hacking 2 Week Security
Ethical Hacking 2 Week Security
Fundamentals
INF 203
CONTENTS 1 What is Security Testing?
Pentesting 2
Red Team 4
5 Blue Team
7 Methodologies
What is Security
Testing? 01
A good general definition to start from
would be the following:
Indeed, there are various types of activities that fall under the
umbrella of security testing:
• Security Audit
• Vulnerability Assessment
• Penetration Testing
• Red Teaming
• Ethical Hacking
02
Pentesting
A penetration testing (pentest) is an authorized
simulated cyberattack on a computer system,
performed to evaluate the security of the system.
• No Rules*
• 2 weeks - 6 months engagement
• No announcement
• Restrictive Scope • Test Blue teams on programs, policies,
Scope • 1-2 weeks engagement tools, and skills
• Generally Announced • Useful to estimate organization's Time To
• Identify Vulnerabilities Detect
(TTD) and Time To Mitigate (TTM)
* Can't be illegal…
✓ End date
Risks
• Some of activities might cause denial-of-service, loss of the data or slower
the work of other people who share the environment. That’s why it is a
good idea to conduct security test on a separate environment.
• Also, you need to know who is the person that might help you in critical
situation (contact person).
07 Methodologies
Methodologies
Pentest methodologies can be customized based on the specific system, goals,
and industry standards.
Common pentesting methodologies:
1. OWASP Testing Guide
2. NIST SP 800-115
3. OSSTMM (Open Source Security Testing Methodology Manual)
4. PTES (Penetration Testing Execution Standard)
OWASP Testing Guide
• The Web Security Testing Guide (WSTG) Project produces the premier
cybersecurity testing resource for web application developers and security
professionals.
• The WSTG is a comprehensive guide to testing the security of web applications and
web services. Created by the collaborative efforts of cybersecurity professionals
and dedicated volunteers, the WSTG provides a framework of best practices used
by penetration testers and organizations all over the world.
• The OWASP Top 10 is a standard awareness document for
•
developers and web application security. It represents a broad
consensus about the most critical security risks to web applications.
Companies should adopt this document and start the process of
OWASP Top 10
ensuring that their web applications minimize these risks.
PTES (Penetration Testing Execution Standard)
Penetration Testing Execution Standard (PTES) defines penetration testing as 7 phases. Particularly, PTES Technical
Guidelines give hands-on suggestions on testing procedures, and recommendation for security testing tools.
1 Pre-engagement Interactions
2 Intelligence Gathering
3 Threat Modeling
4 Vulnerability Analysis
5 Exploitation
6 Post Exploitation
7 Reporting
References
1. https://owasp.org/www-project-web-security-testing-guide/
2. http://www.pentest-standard.org/index.php/Main_Page
3. https://tryhackme.com/room/redteamfundamentals
4. https://owasp.org/www-project-top-ten/