- Building Virtual Pentesting Labs for Advanced Penetration Testing
- Kevin Cardwell
- 286字
- 2021-07-16 11:42:09
Myths and misconceptions of pen testing
After more than twenty years of performing professional security testing, I find it is amazing to know how many are confused about what a penetration test is. I have, on many occasions, been to a meeting and the client is convinced that they want a penetration test. However, when I explain exactly what one is, they look at me with a shocked look. So, what exactly is a penetration test? Remember our abstract methodology had a step for intrusive target search and part of that step was another methodology for scanning? Well, the last item in the scanning methodology, that being exploitation, is the step that is indicative of a penetration test. That one step is the validation of vulnerabilities, and this is what defines penetration testing. Again, it is not what most clients think when they bring a team in. The majority of them in reality want a vulnerability assessment. When you start explaining to them that you are going to run some exploit code and all these really cool things on their systems and/or networks, they usually are quite surprised. Most often, the client will want you to stop at the validation step. On some occasions, they will ask you to prove what you have found and then you might get to show the validation. I once was in a meeting with the stock market IT department of a foreign country, and when I explained what we were about to do with validation of vulnerabilities, the IT Director's reaction was "that is my stock broker records, and if we lose them, we lose a lot of money!". Hence, we did not perform the validation step in that test.
- Android應用安全實戰:Frida協議分析
- 攻守道:企業數字業務安全風險與防范
- CSO進階之路:從安全工程師到首席安全官
- INSTANT Metasploit Starter
- 工業物聯網安全
- 反黑命令與攻防從新手到高手(微課超值版)
- 工業控制網絡安全技術
- 硬黑客:智能硬件生死之戰
- 網絡空間安全實驗
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 互聯網企業安全高級指南
- Mastering Reverse Engineering
- 持續集成:軟件質量改進和風險降低之道
- Cybersecurity Threats,Malware Trends,and Strategies
- 計算機網絡安全實驗指導