Penetration testing methodology
During scoping the type of test, it is important to know the different type of tests and what they consist of; this can be broken down into three groups:
- White-box penetration testing: Here, the tester has complete access and in-depth knowledge of the system being tested. The testers work with the client and have access to insider information, servers, software running, network diagrams, and sometimes even credentials. This test type is normally used to test new applications before they are put into production and are routinely conducted as part of the Systems Development Life Cycle (SDLC); this helps to identify vulnerabilities and remedy them before rolling out to production.
- Black-box penetration testing: In the black-box penetration testing approach, only high-level information is made available to the tester. The tester is totally unaware of the system/network, making this testing type as close to the real world as possible. The tester had to acquire all of their information using creative methods within the agreement of the client. While this approach mimics the real world, sometimes it might miss some areas while testing. If not scoped properly, it can be very costly to the client as well as time-consuming. The tester would explore all attack vectors and report their findings. The tester must be careful because things can break during this type of test.
- Gray-box penetration testing: In the middle of the two extremes lies the gray-box penetration testing; only limited information is available to the tester to attack the system externally. These tests are usually run within a limited scope and with the tester having some information about the system.
Regardless of which kind of test is chosen, it is important to also follow a standard or guidelines to ensure best practices. We will discuss some of the most popular standards in more detail:
- OWASP testing guide
- PCI penetration testing guide
- Penetration Testing Execution Standard
- NIST 800-115
- Open Source Security Testing Methodology Manual (OSSTMM)
推薦閱讀
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- 大型互聯(lián)網(wǎng)企業(yè)安全架構(gòu)
- 電子支付的規(guī)制結(jié)構(gòu)配置研究
- 黑客攻防技巧
- 開發(fā)者的Web安全戒律:真實(shí)威脅與防御實(shí)踐
- 安全實(shí)戰(zhàn)之滲透測試
- 數(shù)據(jù)安全實(shí)踐指南
- API攻防:Web API安全指南
- CTF競賽權(quán)威指南(Pwn篇)
- 云原生安全技術(shù)實(shí)踐指南
- 信息安全等級保護(hù)測評與整改指導(dǎo)手冊
- Mastering Reverse Engineering
- 信息安全工程與實(shí)踐
- 構(gòu)建新型網(wǎng)絡(luò)形態(tài)下的網(wǎng)絡(luò)空間安全體系