Penetration Testing
Penetration Testing
Penetration Testing
Penetration testing is a type of security testing used to test the insecure areas of the system or application. The goal of this testing is to find all security vulnerabilities that are present in the system being tested. Vulnerability is the risk that an attacker can disrupt or gain authorized access to the system or any data contained within it. Vulnerabilities are usually introduced by accident during software development and implementation phase. Common vulnerabilities include design errors, configuration errors, software bugs etc.
1. Black Box Testing 2. White Box Penetration testing 3. Grey Box Penetration Testing
In black box penetration testing, tester has no knowledge about the systems to be tested .He is responsible to collect information about the target network or system. In a white-box penetration testing, the tester is usually provided with a complete information about the network or systems to be tested including the IP address schema, source code, OS details, etc. This can be considered as a simulation of an attack by any Internal sources (Employees of an Organization). In a grey box penetration testing, tester is provided with partial knowledge of the system. It can be considered an attack by an external hacker who had gained illegitimate access to an organizations network infrastructure documents.
Planning phase A Scope & Strategy of the assignment is determined A Existing security policies, standards are used for defining the scope Discovery Phase A Collect as much information as possible about the system including data in the system, user names and even passwords. This is also called as FINGERPRINTING A Scan and Probe into the ports A Check for vulnerabilities of the system Attack Phase A Find exploits for various vulnerabilities You need necessary security Privileges to exploit the system Reporting Phase A Report must contain detailed findings A Risks of vulnerabilities found and their Impact on business A Recommendations and solutions, if any
The prime task in penetration testing is to gather system information. There are two ways to gather information 1) One to one' or 'one to many' model with respect to host: A tester performs techniques in a linear way against either one target host or a logical grouping of target hosts (e.g. a subnet). 2) 'Many to one' or 'many to many' model :The tester utilizes multiple hosts to execute information gathering techniques in a random, rate-limited, and in non-linear.
Conclusion:
Testers should act like a real hacker and test the application or system and needs to check whether code is securely written. A penetration test will be effective if there is a well-implemented security policy. Penetration testing policy and methodology should be a place to make penetration testing more effective. Read more at http://www.guru99.com/learn-penetration-testing.html#us2DqXOKlBJ1cQta.99