Security Auditing and Exploitation of a Computer System Through
Outline
Penetration testing
Pentesting Phases
Reconnaissance (Project context)
Scanning
Slide 7
Slide 8
Slide 9
Gaining Access
Slide 11
Escalating/Maintaining Access
Slide 13
Slide 14
Slide 15
Slide 16
References
S
E
C
U
R
I
T
Y
A
U
D
I
T
I
N
G
A
N
D
E
X
P
L
O
I
T
A
T
I
O
N
O
F
A
C
O
M
P
U
T
E
R
S
Y
S
T
E
M
T
H
R
O
U
G
H
P
E
N
E
T
R
A
T
I
O
N
T
E
S
T
I
N
G
!
"
#
$
!
%
&
'
(
)
*
+
-
,
%
-
#
&
.
#
/
.
&
0
1
%
-
)
2
-
3
)
4
#
!
1
3
!
5
6
-
7
!
3
%
%
3
6
-
%
%
&
.
8
1
.
!
0
9
/
-
!
3
#
%
3
!
!
3
/
%
:
+
;
5
/
&
2
#
#
*
#
:
+
#
#
<
#
%
#
#
=
;
%
0
>
?
@
A
-
$
0
%
5
4
$
5
3
!
'
-
4
%
0
%
3
&
1
#
#
-
3
)
!
1
#
%
0
5
%
-
(
#
4
)
!
3
5
#
=
+
%
0
.
1
)
1
!
-
1
3
%
>
)
08
4
)
4
$
8
/
A
-
)
%
%
&
%
,
!
4
)
#
/
-
>
#
!
8
#
%
A
4
!
/
3
3
!
$
0
#
0
%
#
#
%
&