- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- Lee Allen Kevin Cardwell
- 246字
- 2021-07-09 20:20:36
Abstract methodology
As mentioned previously, we concentrate on a process and apply that to our security components when we go about security testing. For this, we describe an abstract methodology here:
A simple abstract methodology consists of the following steps:
- Planning
- Non-intrusive target search
- Intrusive target search
- Remote target assessment
- Local target assessment
- Data analysis
- Reporting
The goal is to develop your process and select a minimum of two tools for each process, which provides the means for you to achieve the desired outcome at each step. Once you have done this, then you can add additional tools as required. The essential component is to have at least two tools to start professional security and penetration testing. For more on this abstract reference, refer to Building Virtual Pentesting Labs for Advanced Penetration Testing.
Final thoughts
It is essential that you have a professional security testing plan and methodology before you start your penetration testing; furthermore, the more time you spend planning, the easier the test will be to perform. Without these essential elements, your testing will be unstructured and mostly ad hoc. This is something we want to avoid when it comes to performing penetration testing for a client who has hired us. We have briefly covered a number of methodologies here, and these are only provided as a reference. You are encouraged to build and develop your own methodology; the more time you spend on this, the more you will be rewarded in the end.
- 科技安全:戰(zhàn)略實(shí)踐與展望
- 數(shù)字身份與元宇宙信任治理
- ARM匯編與逆向工程:藍(lán)狐卷·基礎(chǔ)知識(shí)
- 從0到1:CTFer成長(zhǎng)之路
- 持續(xù)集成:軟件質(zhì)量改進(jìn)和風(fēng)險(xiǎn)降低之道
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- 數(shù)字政府網(wǎng)絡(luò)安全合規(guī)性建設(shè)指南:密碼應(yīng)用與數(shù)據(jù)安全
- Cybersecurity Threats,Malware Trends,and Strategies
- Kali Linux高級(jí)滲透測(cè)試(原書(shū)第4版)
- 計(jì)算機(jī)網(wǎng)絡(luò)安全實(shí)驗(yàn)指導(dǎo)
- 云計(jì)算安全技術(shù)與應(yīng)用
- 信息組織
- Manga Studio 5 Beginner's Guide
- 防火墻和VPN技術(shù)與實(shí)踐
- 零信任安全從入門到精通