官术网_书友最值得收藏!

Abstract methodology

As mentioned previously, we concentrate on a process and apply that to our security components when we go about security testing. For this, we describe an abstract methodology here:

A simple abstract methodology consists of the following steps:

  1. Planning
  2. Non-intrusive target search
  3. Intrusive target search
  4. Remote target assessment
  5. Local target assessment
  6. Data analysis
  7. Reporting

The goal is to develop your process and select a minimum of two tools for each process, which provides the means for you to achieve the desired outcome at each step. Once you have done this, then you can add additional tools as required. The essential component is to have at least two tools to start professional security and penetration testing. For more on this abstract reference, refer to Building Virtual Pentesting Labs for Advanced Penetration Testing.

Final thoughts

It is essential that you have a professional security testing plan and methodology before you start your penetration testing; furthermore, the more time you spend planning, the easier the test will be to perform. Without these essential elements, your testing will be unstructured and mostly ad hoc. This is something we want to avoid when it comes to performing penetration testing for a client who has hired us. We have briefly covered a number of methodologies here, and these are only provided as a reference. You are encouraged to build and develop your own methodology; the more time you spend on this, the more you will be rewarded in the end.

主站蜘蛛池模板: 江永县| 宁乡县| 南靖县| 遂昌县| 保山市| 景宁| 栾城县| 龙海市| 嘉善县| 沾化县| 辽源市| 沙湾县| 乌拉特后旗| 博罗县| 三穗县| 金昌市| 玉树县| 桑日县| 宜良县| 光山县| 连城县| 集贤县| 樟树市| 公主岭市| 济南市| 石泉县| 合江县| 大足县| 瑞丽市| 壤塘县| 富宁县| 台山市| 合肥市| 雅江县| 肃宁县| 资溪县| 额敏县| 锡林浩特市| 民权县| 曲周县| 桂阳县|