PENTRATION TESTING

The purpose of penetration testing is to detect security weaknesses and issues. This testing can also be used to test an organization’s security policy, its attachment to compliance requirements, its employee’s security awareness, and the company’s capability to pick up and react to security incidents. The final goal is to detect security problems and vulnerabilities. In addition, we have many side goals that Pen testing activities can do:

  • Test the compliance of security policies.
  • Verify the awareness of the staff in terms of security.
  • Check if and how an organization can face a security breach.

Penetration Testing Strategic Approaches

There are a few ways where cybersecurity experts can take while executing a penetration test. The key difference tells how much knowledge that the theoretical attacker thinks to have.

1. Gray Box Penetration Test

This type of penetration testing will have the tester possess some basic knowledge about the system. It could be initial credentials, a network infrastructure map, or application logic flow charts. The test will give away a very realistic outcome because many cyber attackers will not even attempt to attack without a small amount of information about the target. This way essentially skips over the “reconnaissance” step and first gets to the actual pen test. It can be done more quickly and focus exactly on systems that are already known to be risky.

2. Black Box Penetration Test

This type of test was performed without any idea of the earmarked network or the systems running on it. The tester does not have any idea about the internal code or software and has no access to any credentials or sensitive data. This form of testing is realistic because it enables the tester to think like a potential hacker when searching for vulnerabilities. While it may seem like the exact form of testing, black box tests are restricted by time limits. The tester usually has a certain time to check on the system and try to earn access, while a hacker does not have similar restrictions and could detect weaknesses that are not obvious.

TYPES OF PENTRATION TEST :–

1. Network Penetration Test

In a network penetration test, you would be testing a network environment for potential security vulnerabilities and threats. This test was divided into two categories: external and internal penetration tests. An external penetration test would involve testing the public IP addresses, whereas, in an internal test, you can become part of an internal network and test that network.

The test generally aims at the following network areas in their penetration tests.

  • Firewall configuration
  • Firewall bypass testing
  • Stateful analysis testing.
  • IPS deception
  • DNS level attacks

2. Web application penetration test

A web application penetration testing examines the potential security problems or problems that occurred due to insecure design, development, or coding. This test detects the potential vulnerabilities in the websites and web applications with CRN and externally or internally developed programs, leading to exposing or leaking important data and personal confidential data. This test is designed to focus mainly on browsers, websites and web applications, and other components like plug-in, procedures, Applets, etc.

3. Client-side test

The client-side test can also be called an internal test run to identify potential security threats that could emerge from within the organization. It could be a disadvantage in software applications running in the user’s workplace where a hacker can easily utilize it. The theme of utilizing can be exploiting vulnerabilities in client-side applications like through emails, web browsers, Macromedia Flash, Adobe Acrobat, and other modes. A hacker can use a vulnerable application through a smartly crafted email or by attracting the employee to visit a malicious web page or by malware loaded on USB sticks that are automatically executed once kept in the user’s workplace. Though running the client-side test can identify the disadvantages and reduce data breach and system vulnerability.

4. Wireless network test

Wireless network test is about dealing with wireless devices like tablets, laptops, notebooks, iPods drives, smartphones, etc. As the name itself says that the test has to examine all the wireless devices to detect any security loopholes and identify the devices that are deemed to be weak or rogue. Besides the gadgets, the penetration test considers testing administration credentials to determine crossing

Published by Ayushi kumari

Hey! i am interesting in tech , cyber security and reading books

One thought on “PENTRATION TESTING

Leave a comment

Design a site like this with WordPress.com
Get started