PEN TEST (penetration testing)

Penetration testing, also called pen testing or ethical hacking

The practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.

Penetration testing can be automated with software applications or performed manually.

Either way, the process involves gathering information about the target before the test, identifying possible entry points, attempting to break in either virtually or for real and reporting back the findings.

Penetration testing stages

The pen testing process can be broken down into five stages.

Prevention

    The first stage involves:

  • Defining the scope and goals of a test, including the systems to be addressed and the testing methods to be used.

  • Gathering intelligence (e.g., network and domain names, mail server) to better understand how a target works and its potential vulnerabilities.

Detection

    The next step is to understand how the target application will respond to various intrusion attempts. This is typically done using:

  • Static analysis Inspecting an application’s code to estimate the way it behaves while running. These tools can scan the entirety of the code in a single pass.

  • Dynamic analysis Inspecting an application’s code in a running state. This is a more practical way of scanning, as it provides a real-time view into an application’s performance.

Response
  • This stage uses web application attacks, such as cross-site scripting, SQL injection and backdoors, to uncover a target’s vulnerabilities. Testers then try and exploit these vulnerabilities, typically by escalating privileges, stealing data, intercepting traffic, etc., to understand the damage they can cause.

Hunting
  • The goal of this stage is to see if the vulnerability can be used to achieve a persistent presence in the exploited system— long enough for a bad actor to gain in-depth access. The idea is to imitate advanced persistent threats, which often remain in a system for months in order to steal an organization’s most sensitive data.

analysis

    The results of the penetration test are then compiled into a report detailing:

  • Specific vulnerabilities that were exploited

  • Sensitive data that was accessed

  • The amount of time the pen tester was able to remain in the system undetected

  • This information is analyzed by security personnel to help configure an enterprise’s WAF settings and other application security solutions to patch vulnerabilities and protect against future attacks.

LET'S WORK TOGETHER

AND MAKE THE NEXT BEST PROJECT

CONTACT INFO

No: 05 / x2 , Hari Om 2nd Street, Phase III, Sathuvachari, Vellore, Tamil Nadu 632009

+(91) 818 998 5559
+(91) 818 998 5551

council@redback.in

SIGN IN YOUR ACCOUNT TO HAVE ACCESS TO DIFFERENT FEATURES

CREATE ACCOUNT

FORGOT YOUR DETAILS?

GET A QUOTE

We'll do everything we can to make our next best project!

TOP