官术网_书友最值得收藏!

General penetration testing framework

Kali Linux is a versatile operating system that comes with a number of security assessment and penetration testing tools. Deriving and practicing these tools without a proper framework can lead to unsuccessful testing and might produce unsatisfying results. Thus, formalizing security testing with a structured framework is extremely important from a technical and managerial perspective.

The general testing framework presented in this section will constitute both the black box and white box approaches. It offers you a basic overview of the typical phases through which an auditor or penetration tester should progress. Either of these approaches can be adjusted according to the given target of assessment. The framework is composed of a number of steps that should be followed in a process at the initial, medial, and final stages of testing in order to accomplish a successful assessment. These include the following:

  • Target scoping
  • Information gathering
  • Target discovery
  • Enumerating target
  • Vulnerability mapping
  • Social engineering
  • Target exploitation
  • Privilege escalation
  • Maintaining access
  • Documentation and reporting

Whether applying any combination of these steps with the black box or white box approaches, it is left to the penetration tester to decide and choose the most strategic path according to the given target environment and its prior knowledge before the test begins. We will explain each stage of testing with a brief description, definition, and its possible applications. This general approach may be combined with any of the existing methodologies and should be used as a guideline rather than a penetration testing catch-all solution.

Target scoping

Before starting the technical security assessment, it is important to observe and understand the given scope of the target network environment. It is also necessary to know that the scope can be defined for a single entity or set of entities that are given to the auditor. The following list provides you with typical decisions that need to be made during the target scoping phase:

  • What should be tested?
  • How should it be tested?
  • What conditions should be applied during the test process?
  • What will limit the execution of the test process?
  • How long will it take to complete the test?
  • What business objectives will be achieved?

To lead a successful penetration test, an auditor must be aware of the technology under assessment, its basic functionality, and its interaction with the network environment. Thus, the knowledge of an auditor does make a significant contribution toward any kind of security assessment.

主站蜘蛛池模板: 绍兴县| 达日县| 正阳县| 元朗区| 三台县| 宁国市| 岑溪市| 临漳县| 定远县| 南通市| 武夷山市| 罗江县| 浏阳市| 吕梁市| 贡山| 揭阳市| 临海市| 余江县| 昌乐县| 平山县| 修水县| 手机| 进贤县| 贵阳市| 孟连| 新疆| 沈阳市| 大姚县| 玉龙| 迭部县| 乌拉特中旗| 谢通门县| 天镇县| 聂拉木县| 海门市| 呼图壁县| 望城县| 万年县| 杭锦后旗| 白沙| 和顺县|