官术网_书友最值得收藏!

Summary

In this chapter, we have defined security testing as it relates to this book, and we identified an abstract methodology that consists of the following steps: planning, nonintrusive target search, intrusive target search, data analysis, and reporting. More importantly, we expanded the abstract model when it came to the intrusive target search, and we defined within that a methodology for scanning. This consisted of identifying live systems, looking at the open ports, recovering the services, enumeration, identifying vulnerabilities, and finally exploitation.

Furthermore, we discussed what a penetration test is and that it is a validation of vulnerabilities and that it is identified with one step in our scanning methodology. Unfortunately, most clients do not understand that when you validate vulnerabilities, it requires you to run code that could potentially damage a machine or even worse, damage their data. Due to this, most clients ask that not be a part of the test. We have created a baseline for what penetration testing is in this chapter, and we will use this definition throughout this book. In the next chapter, we will discuss the process of choosing your virtual environment.

主站蜘蛛池模板: 台北县| 新晃| 乐清市| 绥江县| 绥德县| 北川| 砚山县| 宜丰县| 绩溪县| 甘德县| 巢湖市| 玉树县| 青田县| 三穗县| 诸城市| 黄浦区| 福贡县| 根河市| 灵宝市| 邵武市| 从江县| 宝坻区| 佛教| 蓬莱市| 伊宁市| 资源县| 汽车| 万全县| 宿迁市| 湖北省| 贡觉县| 景洪市| 资中县| 腾冲县| 会理县| 剑川县| 湖南省| 皋兰县| 区。| 乌拉特后旗| 宁南县|