Pen Testing and It's Phases
Cybersecurity audit and its type
2) Vulnerability Assessment
3) Penetration test
Let us understand above all terms in the below section So first is
1) Security Audit:
Security audit is a manual or systematic assessment of any vulnerable system. It includes
- Check all the configuration of the system and a network
- Interview all the staff of the organization in which we are penetrating.
- Review all the policies of the organization
- Check if the operating system they are using and software they are using that are not outdated or they need any updation.
- To get the best result we have to perform a security audit with admin privileges.
2) Vulnerability Assessment
Vulnerability assessment means to identify the vulnerability and the classifying then into a security loophole group.
An attacker can use the vulnerability to misuse the system by exploiting them and violate the security of the system.
Vulnerability means weakness of the system, or we can say a loophole in a system some of the examples of vulnerabilities are given below
2. Vulnerability in the authorization process
3. Vulnerability in input validation
and there are so many tools available for vulnerability assessment few of them are given below:
2 Qualys
3.OpenVAS (open vulnerability Assessment tool){free and open-source }
4.Nexpose
5.Accuntix
What is Pen testing?
Pen testing means an attack on a system for finding a vulnerability and gaining access to a system.
Pen testing means an attack on a system for finding a vulnerability and gaining access to a system.
3) Penetration testing
Penetration testing also called pen testing, it is the practice of testing a computer system, network, or web application to find security vulnerabilities that an attacker could exploit.
Penetration testing can be automated with software applications or performed manually. Either way, the process involves gathering information about the target before the test.
The main objective of penetration testing is to identify security weaknesses. Penetration testing can also be used to test an organization's security policy,
There are some approaches to the pen-testing they are listed below:
1. White Box Testing
In the white box, the testing attacker does have information about the tested machine.
So here is one advantage to the tester that he/she does not have to waste time to find out the initial information because they have it before testing starts.
Some of its advantages are that we can have enough time and if we need more time for a test we can extend the time of the test
Another advantage of white box testing is we can go deep down and test because we have all the assets which are required to test that hard, but at some point some people believe that it is not a realistic scenario.
2. Black Box Testing
This type of testing, the attacker does not contain any information about the target system or a victim machine.
In black-box testing, the attacker has to find all important information by itself.
Blackbox testing took so much of time because of that we can count it as a disadvantage of the black box testing
3. Gray Box Testing
Gray box testing is a mixer of white box testing and the black box testing.
This attacker has partial knowledge of the attacker machine.
Phases of penetration testing
The seven stages of penetration testing that are detailed by this standard are
• Intelligence gathering
• Threat modeling and Vulnerability analysis
• Exploitation
• Post-exploitation
• Reporting
• Retesting
1) Pre-engagement interactions:
This pre-phase usually begins with defining the test’s scope.
In the client's scenario what they want to be tested and by what methods
They may, for example, to know what type of testing they need .as they want network wireless and wired test or they may only want social engineering tests. Once you understand that, you Get the scope targets from the client
Make sure you know which networks and addresses are in range and which are not means what type of networks and terminologies they used.
Once that’s complete, you are pretty much ready to head to phase 2.
2) Intelligence gathering
The idea of this phase is to gather as much info about the subject as possible as you can. It’s really important that you have a clear understanding of the client’s systems and operations before you begin exploiting. Some people call this phase “foot-printing”.
The information that you gather about your target will give you valuable insight into the types of security controls.
3) Threat Modeling and Vulnerability Analysis
Once you have sufficient info about the client’s systems, you can start modeling the threats that the client would realistically face and identify vulnerabilities.
Here You have to use scanning tools or port scanners to find open ports, live hosts, etc. Or you may use a vulnerability scanner to find possible vulnerabilities on the network.
In short, You’re looking to get as many details about the systems as you can.
• What OS are they?
• Is there any firewall?
• Is antivirus installed?
• Intrusion detection? Is it easily avoided?
4) The Exploitation Phase
The goal of this phase – you have to gain high administrator access as possible.
There may be other goals and a ton of damage can still be done even without admin rights.
Think about the company’s assets and how they may be used.
Things like employee info: Who works in what departments, employees role, Customer data can also be a valuable target, costumer access any system in organization and how costumer communicated with organization, Technical data that can be breach. Or Servers that could possibly be exploited.
5) The Post-exploitation Phase
After you have completely exploited the systems or reached the end of the testing time, you’ll have to document the methods that you used.
The other big thing that needs to be done in this phase is clean up. Remove any scripts and files that you may have planted and used. If you changed settings on devices, revert them back to what they were. Remove any accounts that you may have created during your exploiting
6) The reporting phase
Reporting is probably the most important phase. Because here that you tell your client about their systems’ weaknesses and give them suggestions to resolve those weaknesses.
You should tell the client exactly what the exploits where that you used to compromise their systems as well as exactly what steps should be taken to remediate them.
7) The Resolution & Re-testing Phase
For this website, you will see our account, remember to go through this info. application security services
ReplyDelete