官术网_书友最值得收藏!

Summary

In this chapter, we discussed the need for a methodology when it comes to penetration testing and how it is essential when it comes to building skills as a professional penetration tester. Following this, we reviewed two sample methodologies. We reviewed the penetration testing framework and described the components within the standards, to include the process to follow based on the ports that are discovered during your assessments. The next methodology we discussed was the PTES, and although there is no technical guidance as part of the standard, there is a reference for the technical information that is available. We provided a reference for that, along with a number of examples on how to perform the testing for each step. The last methodology we looked at was a high-level abstraction that shows the potential components of a professional security test.

In the next chapter, we review the steps required to build the range that we will use throughout the rest of the book. At the end of the next chapter, we will have a complete range that allows us to practice virtually all testing methods against any of the targets that we may encounter.

主站蜘蛛池模板: 衡水市| 安泽县| 襄城县| 宣城市| 五常市| 布尔津县| 防城港市| 芦溪县| 新巴尔虎左旗| 塔河县| 民丰县| 随州市| 沙湾县| 扎兰屯市| 资阳市| 丰宁| 海丰县| 乌鲁木齐市| 乌拉特中旗| 巢湖市| 枞阳县| 莆田市| 尚志市| 滁州市| 额敏县| 崇左市| 鄂尔多斯市| 宣武区| 嵊泗县| 阳西县| 行唐县| 龙井市| 饶阳县| 安岳县| 通化县| 沙雅县| 闽侯县| 南投县| 巢湖市| 隆化县| 岑巩县|