SlideShare a Scribd company logo
1 of 9
Vulnerability Assessment
& Penetration Testing
By: Michael Lassiter Jr. (@EthicalMJPen)
VULNERABILITY ASSESSMENT & PEN TESTING
Vulnerability Assessment
Vulnerability Assessment:
• Is the assessment of a system to determine if it has vulnerabilities or
weaknesses that need to be resolved or patched.
• Is also known as a security audit.
• Can be performed by one person or a team of vulnerability researchers or
security engineers.
• Is often known as a flaw or weakness that could be exploited by an outside
attacker or compromised by internal personnel.
• Is necessary because many organizations, companies, and health facilities are
required to meet certain compliance.
• HIPPA regulations are important so that health facilities hire the services
of pen testers in order to meet compliance with vulnerability assessment
being a great portion of the service.
VULNERABILITY ASSESSMENT & PEN TESTING
Vulnerability Assessment Tools
• Nessus is on of the most popular vulnerability scanning tools. It is a commercial
product and many companies often desire an individual that is skilled with it.
• OpenVas, which is the older open-source version of Nessus, is still available. It
comes pre-packaged with Linux distributions such as Kali Linux.
• Nexpose – The vulnerability scanner, which is by Rapid 7, is available and
highly capable of scanning a system for vulnerabilities with accuracy.
• There are plenty of open-source tools available, so I suggest that you take
time to try them in your virtual lab.
• Do not choose an active target under any circumstances without
authorization. Always obey the law!
VULNERABILITY ASSESSMENT & PEN TESTING
Vulnerability Assessment Key Points
• Vulnerability Assessments do not involve any steps to fix or apply patches to a
system.
• The objective of a vulnerability assessment is to determine the vulnerabilities
and report them to the client.
• The assessment must be requested and authorized by the client prior to the
performance of the assessment.
• The laws and permission of the client are in place to protect the client and
security engineer form liabilities and legal backlash.
VULNERABILITY ASSESSMENT & PEN TESTING
Penetration Testing
• Penetration Testing includes the actual exploitation of the vulnerabilities that
are discovered during the phases of the vulnerability assessment.
• It includes vulnerability assessment; however, vulnerability assessment does
not include penetration testing.
• Rules of engagement (ROE) are signed and understood by both parties before
the beginning of a penetration test. The ROE limits the penetration testers from
touching targets that are not permitted by the client.
VULNERABILITY ASSESSMENT & PEN TESTING
Penetration Testing – Black Box, Gray Box, and White Box Testing
• Penetration testing usually falls under three categories: Black Box, Gray Box,
and White Box.
• Black Box does not include any knowledge of the structure of the system,
so this type of testing simulates the approach of an outside attacker.
• Gray Box includes only a limited knowledge of the layout of the target.
• White Box testing occurs when a penetration tester has complete
knowledge of the layout of the target(s).
VULNERABILITY ASSESSMENT & PEN TESTING
Penetration Testing – Personal Experiences
• My personal experience in pen testing is primarily from a black box testing
perspective. Black box testing will surely test your knowledge and training in
penetration testing.
• If the penetration test requires a team, the success of the it is heavily dependent
on the cohesion of the team. A strength in one can balance the weakness in
another.
• Penetration testing is not about ramming a tool into the most fortified part of a
system, but using it to exploit the overlooked weaknesses.
• During a pen test, my team had to request permission to touch additional
system that were found. We then received permission. The rules of
engagement are in place for a reason.
VULNERABILITY ASSESSMENT & PEN TESTING
Conclusion
• The key difference between vulnerability assessment and penetration testing is
the lack of exploitation in vulnerability assessment and the actual exploitation
in penetration testing.
• Permission must be granted to carry out either or both of these operations.
• Obey the cybercrime laws and regulations at all times.
• There are many available tools, yet one should not simply rely on only one tool
to fit every situation.
• To gain further experience and training; research OWASP, create virtual labs,
and complete the training on Cybrary.
VULNERABILITY ASSESSMENT & PEN TESTING
A special thank you to Michael Lassiter for his submissions to Cybrary. We
appreciate every member and hope that you enjoy expanding your knowledge
through the trainingand resources provided.
Thankyoufor yourcontinuedsupport!
-CybraryStaff

More Related Content

Viewers also liked

Penetration testing
Penetration testingPenetration testing
Penetration testingAmmar WK
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing RomSoft SRL
 
Tipos de Pentest
Tipos de PentestTipos de Pentest
Tipos de PentestRafael Seg
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testingecmee
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration TestingSubho Halder
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing ExplainedRand W. Hirt
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGEr Vivek Rana
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
Introduction to Penetration Testing
Introduction to Penetration TestingIntroduction to Penetration Testing
Introduction to Penetration TestingAndrew McNicol
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authenticationEdgar Mwangangi
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationChris Gates
 
Islamic Economic system Vs Capitalist System (urdu)
Islamic Economic system Vs Capitalist System (urdu)Islamic Economic system Vs Capitalist System (urdu)
Islamic Economic system Vs Capitalist System (urdu)Naveed Butt
 

Viewers also liked (14)

Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
 
Tipos de Pentest
Tipos de PentestTipos de Pentest
Tipos de Pentest
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration Testing
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
 
Introduction to Penetration Testing
Introduction to Penetration TestingIntroduction to Penetration Testing
Introduction to Penetration Testing
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
 
Philippines American Colony
Philippines  American  ColonyPhilippines  American  Colony
Philippines American Colony
 
Islamic Economic system Vs Capitalist System (urdu)
Islamic Economic system Vs Capitalist System (urdu)Islamic Economic system Vs Capitalist System (urdu)
Islamic Economic system Vs Capitalist System (urdu)
 

Recently uploaded

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 

Recently uploaded (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 

Vulnerabilities vs Penetration Testing

  • 1. Vulnerability Assessment & Penetration Testing By: Michael Lassiter Jr. (@EthicalMJPen)
  • 2. VULNERABILITY ASSESSMENT & PEN TESTING Vulnerability Assessment Vulnerability Assessment: • Is the assessment of a system to determine if it has vulnerabilities or weaknesses that need to be resolved or patched. • Is also known as a security audit. • Can be performed by one person or a team of vulnerability researchers or security engineers. • Is often known as a flaw or weakness that could be exploited by an outside attacker or compromised by internal personnel. • Is necessary because many organizations, companies, and health facilities are required to meet certain compliance. • HIPPA regulations are important so that health facilities hire the services of pen testers in order to meet compliance with vulnerability assessment being a great portion of the service.
  • 3. VULNERABILITY ASSESSMENT & PEN TESTING Vulnerability Assessment Tools • Nessus is on of the most popular vulnerability scanning tools. It is a commercial product and many companies often desire an individual that is skilled with it. • OpenVas, which is the older open-source version of Nessus, is still available. It comes pre-packaged with Linux distributions such as Kali Linux. • Nexpose – The vulnerability scanner, which is by Rapid 7, is available and highly capable of scanning a system for vulnerabilities with accuracy. • There are plenty of open-source tools available, so I suggest that you take time to try them in your virtual lab. • Do not choose an active target under any circumstances without authorization. Always obey the law!
  • 4. VULNERABILITY ASSESSMENT & PEN TESTING Vulnerability Assessment Key Points • Vulnerability Assessments do not involve any steps to fix or apply patches to a system. • The objective of a vulnerability assessment is to determine the vulnerabilities and report them to the client. • The assessment must be requested and authorized by the client prior to the performance of the assessment. • The laws and permission of the client are in place to protect the client and security engineer form liabilities and legal backlash.
  • 5. VULNERABILITY ASSESSMENT & PEN TESTING Penetration Testing • Penetration Testing includes the actual exploitation of the vulnerabilities that are discovered during the phases of the vulnerability assessment. • It includes vulnerability assessment; however, vulnerability assessment does not include penetration testing. • Rules of engagement (ROE) are signed and understood by both parties before the beginning of a penetration test. The ROE limits the penetration testers from touching targets that are not permitted by the client.
  • 6. VULNERABILITY ASSESSMENT & PEN TESTING Penetration Testing – Black Box, Gray Box, and White Box Testing • Penetration testing usually falls under three categories: Black Box, Gray Box, and White Box. • Black Box does not include any knowledge of the structure of the system, so this type of testing simulates the approach of an outside attacker. • Gray Box includes only a limited knowledge of the layout of the target. • White Box testing occurs when a penetration tester has complete knowledge of the layout of the target(s).
  • 7. VULNERABILITY ASSESSMENT & PEN TESTING Penetration Testing – Personal Experiences • My personal experience in pen testing is primarily from a black box testing perspective. Black box testing will surely test your knowledge and training in penetration testing. • If the penetration test requires a team, the success of the it is heavily dependent on the cohesion of the team. A strength in one can balance the weakness in another. • Penetration testing is not about ramming a tool into the most fortified part of a system, but using it to exploit the overlooked weaknesses. • During a pen test, my team had to request permission to touch additional system that were found. We then received permission. The rules of engagement are in place for a reason.
  • 8. VULNERABILITY ASSESSMENT & PEN TESTING Conclusion • The key difference between vulnerability assessment and penetration testing is the lack of exploitation in vulnerability assessment and the actual exploitation in penetration testing. • Permission must be granted to carry out either or both of these operations. • Obey the cybercrime laws and regulations at all times. • There are many available tools, yet one should not simply rely on only one tool to fit every situation. • To gain further experience and training; research OWASP, create virtual labs, and complete the training on Cybrary.
  • 9. VULNERABILITY ASSESSMENT & PEN TESTING A special thank you to Michael Lassiter for his submissions to Cybrary. We appreciate every member and hope that you enjoy expanding your knowledge through the trainingand resources provided. Thankyoufor yourcontinuedsupport! -CybraryStaff