Page 193 - ICDEBI2018
P. 193

I International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456nternational Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 | IF: 4.101

            level,  after  all  placed  outside  the  firewall.  This level,  after  all  placed  outside  the  firewall.  This  2.  White  Box  –  This  check  is  termed  complete This  check  is  termed  complete
            will  increase  the  surface  of  attack.  Such will  increase  the  surface  of  attack.  Such   know-ledge  testing.  Testers  area  unit  given  full ledge  testing.  Testers  area  unit  given  full
            infrastructure has to be assessed often for security infrastructure has to be assessed often for security   i info concerning the target network nfo concerning the target network
            threats.
        2.  Identification of what form of resources area unit Identification of what form of resources area unit   T
                                                                   The  information  will  be  the  host  science he  information  will  be  the  host  science
                                                                   addresses,  Domains  in  hand  by  the  company, ddresses,  Domains  in  hand  by  the  company,
            exposed to the outer world, determinant texposed to the outer world, determinant the safety   a
            risk  involved  in  it,  detective  work  the  attainable risk  involved  in  it,  detective  work  the  attainable   A
                                                                   Applications  and  their  versions,  Nepplications  and  their  versions,  Network
            sorts of attacks and preventing those attacks.sorts of attacks and preventing those attacks.   diagrams, security defencesdefences like IPS or IDS within
                                                                   the network.
        1.2   advantages of Penetration Testingadvantages of Penetration Testing   3.  Grey  Box  –  The  tester  simulates  an  enclosed The  tester  simulates  an  enclosed
        1.  Proactive  identification  of  the  criticality  of  the Proactive  identification  of  the  criticality  of  the   e
                                                                   employee. The tester is given AN account on the mployee. The tester is given AN account on the
                                                                   i
            vulnerabilities  and  false  positives  given  by  the vulnerabilities  and  false  positives  given  by  the   internal  network  and  commonplace  access  to  the nternal  network  and  commonplace  access  to  the
                                                                   network. This check assesses internal threats fetwork. This check assesses internal threats from
            auto-mated scanners. This helps in prioritizing the ed scanners. This helps in prioritizing the   n
                                                                   workers at intervals the corporate.orkers at intervals the corporate.
            remedy action, whether or not the vulnerability is remedy action, whether or not the vulnerability is   w
            to  be  patched  straightaway  or  not  supported  the to  be  patched  straightaway  or  not  supported  the
                                                                              I
                                                                                                         TESTING ESTING
            criticality.                                        2.  STEPS EPS   IN N   PENETRATION ENETRATION   T
                                                                                    P
        2.  Penetration  testing  helps  compliant  the  audit Penetration  testing  helps  compliant  the  audit   METHODOLOGY
            regulatory  standards  like  PCI  DSS,  HIPAA  and regulatory  standards  like  PCI  DSS,  HIPAA  and  2.1   Preparation for a Network Penetration checkPreparation for a Network Penetration check
            GLBA.  This  avoids  the  massive  fines  for  nons  avoids  the  massive  fines  for  non-  To carry out a thorough penetration testing and create thorough penetration testing and create
            compliance.                                         i it a hit, there ought to be a correct goal outlined for a t a hit, there ought to be a correct goal outlined for a
        3.  A security breach might value heavily to associate A security breach might value heavily to associate  penetration  tester.  A  gathering  between  the gathering  between  the
            degree  organization.  There  could  also  be  a degree  organization.  There  could  also  be  a  penetration  checker  and  also  the  organization  which penetration  checker  and  also  the  organization  which
            network period resulting in an important business network period resulting in an important business  needs  a  penetration  test  should  be  command.  The needs  a  penetration  test  should  be  command.  The
            loss.  Penetration  testing  helps  in  avoiding  these loss.  Penetration  testing  helps  in  avoiding  these  meeting ought to clearly outline the scope and also the to clearly outline the scope and also the
            monetary  falls  by  distinguishing  and  adby  distinguishing  and  ad-dressing  goal  of  the  check.  The  network  Diagram  should  be goal  of  the  check.  The  network  Diagram  should  be
                                                                provided to the Pen tester* just in case of a white box rovided to the Pen tester* just in case of a white box
            the risks. [4]                                      p
                                                                penetration testing to spot all the crucial devices that enetration testing to spot all the crucial devices that
                                                                p
        Depending  on  the  requirements,  there  are  a  unit  2 Depending  on  the  requirements,  there  are  a  unit  2  need penetration testing to be done, this is often need penetration testing to be done, this is often not
        sorts of penetration testing.                           needed just in case of a recording machine check.eeded just in case of a recording machine check.
                                                                n
        1.  External  Penetration  check  –  This  check  shows This  check  shows
            what  a  hacker  will  see  into  the  network  and what  a  hacker  will  see  into  the  network  and  Another vital agenda of the meeting ought to be the Another vital agenda of the meeting ought to be the
            exploits the vulnerabilities seen over the net. Here over the net. Here  time  window  and  also  the  period  of  the  check.  The time  window  and  also  the  period  of  the  check.  The
            the  threat  is  from  associate  degree  external the  threat  is  from  associate  degree  external  organization  should  clearly  outline  the  time  window organization  should  clearly  outline  the  time  window
            network from web. This check is performed over network from web. This check is performed over  which can be its non-business hours. business hours. This is often to
            the net, bypassing the firewall.                    make  sure  that  the  Pen  tester  isn't  interrupted  and ake  sure  that  the  Pen  tester  isn't  interrupted  and
                                                                m
        2.  Internal  Penetration  check  –  This  check  shows This  check  shows  conjointly  the  business  of  the  organization  is conjointly  the  business  of  the  organization  is
            risks  from  at  intervals  the  network.  for  instance, risks  from  at  intervals  the  network.  for  instance,  unaffected.  Thanks  to  the  weird  traffic  usage  by  the to  the  weird  traffic  usage  by  the
            what  threat  an  interior  discontented    worker  will interior  discontented    worker  will  pen check might cause  network congestion or might pen check might cause  network congestion or might
            cause to the network. This check is performed by cause to the network. This check is performed by  bring down the network by blinking the sybring down the network by blinking the systems. for
            connecting to the interior local area network.connecting to the interior local area network.   example, a Denial –Of- Service check meted out on a Service check meted out on a
                                                                web payment entry might cause the disruption within eb payment entry might cause the disruption within
                                                                w
        Depending  on  the  data,  there  are  a  unit  3  sorts  of Depending  on  the  data,  there  are  a  unit  3  sorts  of  the  network  and  inflicting  inconvenience  to  the the  network  and  inflicting  inconvenience  to  the
        penetration  testing,  Black  box,  White  box  and  grey penetration  testing,  Black  box,  White  box  and  grey  purchasers purchasers   thereby hereby   acquisition cquisition   loss oss   t to o   t the he
                                                                             t
                                                                                       a
                                                                                                     l
        box. [6]                                                organization.
        1.  Recorder – This check is administrated with zero is check is administrated with zero
            data concerning the network. The tester is needed data concerning the network. The tester is needed  Pen  checker  ought  to  ensure  that  anPen  checker  ought  to  ensure  that  any  data  or
            to  accumulate  data  victimization  penetration to  accumulate  data  victimization  penetration  knowledge  obtained  throughout  the  test  ought  to  be knowledge  obtained  throughout  the  test  ought  to  be
            testing tools or social engineering techniques. The testing tools or social engineering techniques. The  either destroyed or unbroken confidential. this is often either destroyed or unbroken confidential. this is often
            in  public  offered  info  over  web  could  also  be in  public  offered  info  over  web  could  also  be  a  awfully  vital  precaution  to  be  taken.  The a  awfully  vital  precaution  to  be  taken.  The
                                                                o
            employed by the penetration tester.                 organization will sue the pen testers otherwise.rganization will sue the pen testers otherwise.




        @ IJTSRD  |  Available Online @ www.ijtsrd.comwww.ijtsrd.com |  Conference Issue: ICDEBI-2018 | | Oct 2018   Page: 185
   188   189   190   191   192   193   194   195   196   197   198