官术网_书友最值得收藏!

Initiating a penetration test

An application penetration test is always said to be incomplete if it does not do the following:

  • Following the standard methodology of performing recon
  • Enumerating functionality
  • Testing individual parameters
  • Creating test cases
  • Performing non-invasive exploitation
  • Providing a report that talks about the issue
  • Implementing steps to reproduce, proof of concept code, and possible mitigation

During my career, on numerous occasions, I have come across security consulting companies or independent professionals that are known to run an automated scanner that detects only a handful of vulnerabilities and almost always does not discover logical issues. These vulnerabilities are then exploited with a half-baked exploit that does very little in terms of explaining the business impact and criticality of the findings to the end client.

Scanning for vulnerabilities using an automated scanner is the most common approach taken when it comes to detecting vulnerabilities quickly. This can result in both actionable and complete results or in-actionable and incomplete findings. This very heavily depends on what information was fed to the scanner in the first place.

Using an automated scanner isn't bad. In fact, using a scanner can ensure completeness in a lot of cases. However, the methodology of using a scanner without performing sufficient recon, assigning, and creating target maps can result in the tool being used incorrectly and producing incomplete results.

A tool is only as good as the information it receives before beginning execution. Therefore, scoping your pentest is very important.

主站蜘蛛池模板: 厦门市| 清水县| 习水县| 永济市| 福鼎市| 南澳县| 宁国市| 南城县| 龙门县| 英德市| 沁阳市| 穆棱市| 宁安市| 满洲里市| 聊城市| 抚州市| 临安市| 时尚| 喀喇沁旗| 容城县| 西宁市| 四会市| 扎兰屯市| 贵阳市| 怀宁县| 宁南县| 淮北市| 台南县| 桑植县| 和龙市| 静乐县| 伊吾县| 巴林右旗| 麻江县| 肃宁县| 乐陵市| 三都| 东明县| 来宾市| 行唐县| 灵宝市|