Penetration test analyzes systems for weakness, vulnerabilities, …show more content…
Verifies and validates current in place security controls and information programs from weaknesses
Penetration test types
There are various approaches to Pen testing
Black – in Black pen test, the tester typically has no knowledge of the organization’s infrastructure
Grey – in a grey pen test, the tester has some knowledge of the infrastructure
White – in the white pen test, the tester is typically in collaboration with the IT …show more content…
Low tech, sometimes high reward tool
Port Scanning Tool. Port scanning tool will review and reveal any open ports
NMAP – is just one of many port scanning tools. NMAP capabilities:
Scans all ports, but can be selected scan only certain ports to reduce excess traffic
Determines what operating systems is being used on
Nessus – another popular scanner. Nessus has a large library of vulnerabilities and tests to identify
Like NMAP, Nessus can scan all ports and can detect what OS the system is using.
Nessus can run each portion separately for a more stealthy type of scan
Exploitation – After the recon, it’s time to exploit the vulnerabilities and weakness uncovered from the recon phase. This phase focuses on attempts at establishing access to systems or resources by bypassing whatever security restrictions that in place.
Biggest difference between a penetration test and an actual hacker attack really gets down to permission. A Pen Tester is mostly likely going to have a certain amount of permission to conduct his or her test whereas an attacker will not (unless he or she is an