- Becoming the Hacker
- Adrian Pruteanu
- 343字
- 2021-06-11 13:38:53
Types of assessments
Depending on the agreement with the client prior to the engagement, you may have some of the information required, a lot of information, or no information whatsoever. White-box testing allows for a thorough examination of the application. In this case, the attackers have essentially the same access as the developer. They not only have authenticated access to the application, but also its source code, any design documents, and anything else they'll need.
White-box testing is typically conducted by internal teams and it is fairly time-consuming. A tester is provided with any information they require to fully assess the application or infrastructure. The benefit of providing testers with this level of knowledge is that they will be able to look at every bit of an application and check for vulnerabilities. This is a luxury that external attackers do not have, but it does make efficient use of limited time and resources during an engagement.
Gray-box scenarios are more common, as they provide just enough information to let the testers get right into probing the application. A client may provide credentials and a bit of information on the design of the infrastructure or application, but not much more. The idea here is that the client assumes that a malicious actor already has a certain level of access or knowledge, and the client needs to understand how much more damage can be done.
Finally, black-box testing will simulate an attack from the perspective of an outsider without any knowledge of the application or infrastructure. Companies that expose applications to the internet are subjected to constant attack by external threats. While it is important to remember that not all malicious actors are external, as disgruntled employees can cause just as much damage, malicious black-box type attacks are fairly common and can be very damaging.
The following is a breakdown of the three common types of application penetration tests:

Note
For the remainder of this book, we will approach our targets from a more gray-box perspective, simulating the typical engagement.
- 攻守道:企業數字業務安全風險與防范
- 零信任網絡:在不可信網絡中構建安全系統
- 黑客攻防技巧
- INSTANT Windows PowerShell
- .NET安全攻防指南(上冊)
- 代碼審計:企業級Web代碼安全架構
- Digital Forensics with Kali Linux
- 從0到1:CTFer成長之路
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 情報驅動應急響應
- 網絡安全態勢感知
- 信息技術基礎:提高篇·實驗與習題
- Bug Bounty Hunting Essentials
- 捍衛隱私
- INSTANT Kali Linux