PENETRATE TESTING
WHAT IS PENETRATE TESTING :
Pen tests can be automated with software applications or they can be performed manually. Either way, the process includes gathering information about the target before the test (reconnaissance), identifying possible entry points, attempting to break in (either virtually or for real) and reporting back the findings.
The main objective of penetration testing is to determine security weaknesses. A pen test can also be used to test an organization's security policy compliance, its employees' security awareness and the organization's ability to identify and respond to security incidents.
Penetration tests are sometimes called white hat attacks because in a pen test, the good guys are attempting to break in.
The main objective of penetration testing is to determine security weaknesses. A pen test can also be used to test an organization's security policy compliance, its employees' security awareness and the organization's ability to identify and respond to security incidents.
Penetration tests are sometimes called white hat attacks because in a pen test, the good guys are attempting to break in.
TYPES OF PENTESTING
Following are the important types of pen testing −
Social Engineering Test:in this test, attempts are being made to make a person reveal the sensitive information like password, business critical data, etc.
Web Application Test:using software methods one can verify if the application is exposed to security vulnerabilities. It checks the security vulnerability of web apps and software programs positioned on the target environment.
Physical Penetration Test:strong physical security methods are applied to protect sensitive data. This is generally useful in military and government facilities.
Network Services Test:this is one of the most commonly performed penetration test where the openings in the network are identified through which entry is being made in the systems on the network to check what kind of vulnerabilities are there. It can be done locally or remotely.
Client-side test:it aims to search and exploit vulnerabilities in client-side software programs.
Remote dial-up war dial:it searches for modems in the environment and try to login to the systems connected through these modems by password guessing or brute forcing.
Wireless security test:It discovers the open, unauthorized and less secured hotspots or Wi-Fi networks and connects through them
Examples of Free and Commercial Tools:
- Nmap
- Nessus
- Metasploit
- Wireshark
- OpenSSL
- Cain & Abel
- THC Hydra
- w3af

Comments
Post a Comment