Professional Documents
Culture Documents
About Me
Security Analyst Specialize in Penetration Testing Forensics Surveillance Red Team Assessment Behavior Analysis Clandestine recovery Covert Data Acquisition Malware Development and Analysis Exploit Development
October 2013
Chuksjonia.blogspot.com
Penetration Testing
The means to identify the presence of points where something can find or force its way into or through something else. IT Security Penetration Testing:
This is most often used to positively identify points of vulnerabilities Determine the genuineness of the vulnerabilities that they identify by use of exploitation. Findings that cannot be exploited are either not reported or are reported as theoretical findings when justified
October 2013
October 2013
Types of Pentests
Internal Penetration Testing (WhiteBox and Gray Box) External /Remote Penetration Testing (Blackbox)
October 2013
Black boxing
Stages:
Reconnaissance, Surveillance, Intel gathering and hours of stake-outs Network Mapping, Office locations, Employees names their offices and their bosses and family Social media Intel / Data Acquisition
The hardest, but always the best. Takes longer, but its worthy it.
October 2013
Malware attacks
October 2013
Social Engineering
October 2013
October 2013
October 2013
10
October 2013
11
Questions
October 2013
12
Types of Risk
October 2013
13
References
October 2013
14
References
October 2013
15