It is the process of evaluating the security of an organization by exploiting the vulnerabilities in a way the attackers could exploit them and thereby defending as well as documenting the procedure of attack.
Penetration testing:
This kind of testing simulates an attack from a malicious hacker. This testing involves analysis of a particular system to check for potential vulnerabilities to an external hacking attempt.
How to do Penetration Testing
Step 1) Planning phase
- Scope & Strategy of the assignment is determined
- Existing security policies, standards are used for defining the scope
Step 2) Discovery phase
- Collect as much information as possible about the system including data in the system, usernames and even passwords. This is also called as FINGERPRINTING
- Scan and Probe into the ports
- Check for vulnerabilities of the system
Step 3) Attack Phase
- Find exploits for various vulnerabilities You need necessary security Privileges to exploit the system
Step 4) Reporting Phase
- A report must contain detailed findings
- Risks of vulnerabilities found and their Impact on business
- Recommendations and solutions, if any
The prime task in penetration testing is to gather system information. There are two ways to gather information -
- 'One to one' or 'one to many' model with respect to host: A tester performs techniques in a linear way against either one target host or a logical grouping of target hosts (e.g. a subnet).
- 'Many to one' or 'many to many' model: The tester utilizes multiple hosts to execute information gathering techniques in a random, rate-limited, and in non-linear.
Types of penetration testing:
Black box: The penetration tester will not be given any details pertaining to the network, or infrastructure of the network/ organizationWhite Box: the penetration tester will be aware of the complete details of the infrastructure to be tested
grey box: The penetration tester will be provided with a limited knowledge about the systems to be tested.
0 Comments:
Post a Comment