- Building Virtual Pentesting Labs for Advanced Penetration Testing
- Kevin Cardwell
- 189字
- 2021-07-16 11:42:09
Summary
In this chapter, we have defined security testing as it relates to this book, and we identified an abstract methodology that consists of the following steps: planning, nonintrusive target search, intrusive target search, data analysis, and reporting. More importantly, we expanded the abstract model when it came to the intrusive target search, and we defined within that a methodology for scanning. This consisted of identifying live systems, looking at the open ports, recovering the services, enumeration, identifying vulnerabilities, and finally exploitation.
Furthermore, we discussed what a penetration test is and that it is a validation of vulnerabilities and that it is identified with one step in our scanning methodology. Unfortunately, most clients do not understand that when you validate vulnerabilities, it requires you to run code that could potentially damage a machine or even worse, damage their data. Due to this, most clients ask that not be a part of the test. We have created a baseline for what penetration testing is in this chapter, and we will use this definition throughout this book. In the next chapter, we will discuss the process of choosing your virtual environment.
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- Metasploit Penetration Testing Cookbook(Third Edition)
- CSO進階之路:從安全工程師到首席安全官
- 數字化轉型浪潮下的數據安全最佳實踐指南
- 黑客攻防與網絡安全從新手到高手(絕招篇)
- SQL Injection Strategies
- 網絡用戶行為的安全可信分析與控制
- 網絡安全大數據分析與實戰(zhàn)
- 捍衛(wèi)隱私
- Mastering Metasploit
- 信息內容安全管理及應用
- Web安全攻防從入門到精通
- 網絡安全監(jiān)控實戰(zhàn):深入理解事件檢測與響應
- 極限黑客攻防:CTF賽題揭秘
- Metasploit Bootcamp