官术网_书友最值得收藏!

General penetration testing framework

Kali Linux is a versatile operating system that comes with a number of security assessment and penetration testing tools. Deriving and practicing these tools without a proper framework can lead to unsuccessful testing and might produce unsatisfying results. Thus, formalizing security testing with a structured framework is extremely important from a technical and managerial perspective.

The general testing framework presented in this section will constitute both the black box and white box approaches. It offers you a basic overview of the typical phases through which an auditor or penetration tester should progress. Either of these approaches can be adjusted according to the given target of assessment. The framework is composed of a number of steps that should be followed in a process at the initial, medial, and final stages of testing in order to accomplish a successful assessment. These include the following:

  • Target scoping
  • Information gathering
  • Target discovery
  • Enumerating target
  • Vulnerability mapping
  • Social engineering
  • Target exploitation
  • Privilege escalation
  • Maintaining access
  • Documentation and reporting

Whether applying any combination of these steps with the black box or white box approaches, it is left to the penetration tester to decide and choose the most strategic path according to the given target environment and its prior knowledge before the test begins. We will explain each stage of testing with a brief description, definition, and its possible applications. This general approach may be combined with any of the existing methodologies and should be used as a guideline rather than a penetration testing catch-all solution.

Target scoping

Before starting the technical security assessment, it is important to observe and understand the given scope of the target network environment. It is also necessary to know that the scope can be defined for a single entity or set of entities that are given to the auditor. The following list provides you with typical decisions that need to be made during the target scoping phase:

  • What should be tested?
  • How should it be tested?
  • What conditions should be applied during the test process?
  • What will limit the execution of the test process?
  • How long will it take to complete the test?
  • What business objectives will be achieved?

To lead a successful penetration test, an auditor must be aware of the technology under assessment, its basic functionality, and its interaction with the network environment. Thus, the knowledge of an auditor does make a significant contribution toward any kind of security assessment.

主站蜘蛛池模板: 八宿县| 新巴尔虎右旗| 合川市| 慈溪市| 六安市| 泗阳县| 二连浩特市| 黔南| 公安县| 登封市| 锡林郭勒盟| 蓝田县| 汕尾市| 葵青区| 溆浦县| 汤原县| 西昌市| 宁波市| 河源市| 甘谷县| 化州市| 嘉义市| 金华市| 平利县| 万载县| 吉木萨尔县| 桐庐县| 钦州市| 古浪县| 福安市| 尼玛县| 元江| 肥乡县| 灯塔市| 寿宁县| 新泰市| 沾化县| 始兴县| 雅江县| 普定县| 云安县|