官术网_书友最值得收藏!

Summary

In this chapter, we have defined security testing as it relates to this book, and we identified an abstract methodology that consists of the following steps: planning, nonintrusive target search, intrusive target search, data analysis, and reporting. More importantly, we expanded the abstract model when it came to the intrusive target search, and we defined within that a methodology for scanning. This consisted of identifying live systems, looking at the open ports, recovering the services, enumeration, identifying vulnerabilities, and finally exploitation.

Furthermore, we discussed what a penetration test is and that it is a validation of vulnerabilities and that it is identified with one step in our scanning methodology. Unfortunately, most clients do not understand that when you validate vulnerabilities, it requires you to run code that could potentially damage a machine or even worse, damage their data. Due to this, most clients ask that not be a part of the test. We have created a baseline for what penetration testing is in this chapter, and we will use this definition throughout this book. In the next chapter, we will discuss the process of choosing your virtual environment.

主站蜘蛛池模板: 商水县| 平潭县| 涞水县| 攀枝花市| 红河县| 凌海市| 江永县| 射洪县| 甘南县| 雷州市| 梁山县| 武冈市| 田东县| 江西省| 瑞昌市| 增城市| 屯昌县| 恭城| 牡丹江市| 苗栗市| 宜城市| 漳浦县| 无极县| 沙田区| 克什克腾旗| 延庆县| 阜南县| 进贤县| 修水县| 富阳市| 汶上县| 霍山县| 广州市| 长泰县| 达孜县| 岑巩县| 嘉兴市| 惠东县| 晋州市| 临清市| 新疆|