- Building Virtual Pentesting Labs for Advanced Penetration Testing
- Kevin Cardwell
- 189字
- 2021-07-16 11:42:09
Summary
In this chapter, we have defined security testing as it relates to this book, and we identified an abstract methodology that consists of the following steps: planning, nonintrusive target search, intrusive target search, data analysis, and reporting. More importantly, we expanded the abstract model when it came to the intrusive target search, and we defined within that a methodology for scanning. This consisted of identifying live systems, looking at the open ports, recovering the services, enumeration, identifying vulnerabilities, and finally exploitation.
Furthermore, we discussed what a penetration test is and that it is a validation of vulnerabilities and that it is identified with one step in our scanning methodology. Unfortunately, most clients do not understand that when you validate vulnerabilities, it requires you to run code that could potentially damage a machine or even worse, damage their data. Due to this, most clients ask that not be a part of the test. We have created a baseline for what penetration testing is in this chapter, and we will use this definition throughout this book. In the next chapter, we will discuss the process of choosing your virtual environment.
- 攻守道:企業數字業務安全風險與防范
- 白話網絡安全2:網安戰略篇
- Metasploit Penetration Testing Cookbook(Third Edition)
- 網絡安全應急管理與技術實踐
- 計算機使用安全與防護
- 工業控制網絡安全技術
- 解密彩虹團隊非凡實戰能力:企業安全體系建設(共5冊)
- 解密數據恢復
- 安全防御入門手冊
- 信息安全工程與實踐
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- VMware vCloud Security
- Learn Azure Sentinel
- 動態賦能網絡空間防御
- 2010年中國互聯網網絡安全報告