Penetration Testing - Salem73616C656D/reading-notes GitHub Wiki

Key Takeaways

Stages

  • Planning and Recon
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Analysis and WAF Configuration

Types

External

  • External penetration tests target the assets of a company that are visible on the internet, e.g., the web application itself, the company website, and email and domain name servers (DNS). The goal is to gain access and extract valuable data.

Internal

  • In an internal test, a tester with access to an application behind its firewall simulates an attack by a malicious insider. This isn’t necessarily simulating a rogue employee. A common starting scenario can be an employee whose credentials were stolen due to a phishing attack.

Blind

  • In a blind test, a tester is only given the name of the enterprise that’s being targeted. This gives security personnel a real-time look into how an actual application assault would take place.

Double-Blind

  • In a double blind test, security personnel have no prior knowledge of the simulated attack. As in the real world, they won’t have any time to shore up their defenses before an attempted breach.

Targeted

  • In this scenario, both the tester and security personnel work together and keep each other appraised of their movements. This is a valuable training exercise that provides a security team with real-time feedback from a hacker’s point of view.

Vocabulary

Penetration Test

  • a simulated cyber attack against your computer system to check for exploitable vulnerabilities