Penetration testing can be performed manually or with the help of automated tools.
It is frequently directed at the following endpoints:
Servers: This can include various types of servers, such as web servers, file transfer servers, Dynamic Host Configuration Protocol (DHCP) servers, and domain name system (DNS) servers.
Network services and devices: This includes all types of network services and devices, such as routers, switches, and firewalls. Penetration testers may try to find flaws in how these devices are set up or check if they allow unauthorized access to sensitive data or the ability to manipulate or shut down the network.
Wireless devices and networks: This includes all types of wireless devices and networks, such as WiFi, NFC, and Bluetooth. Penetration testers may attempt to identify vulnerabilities in the wireless protocols or encryption mechanisms used by these devices and networks.
Network security devices: This includes all types of network security devices, such as firewalls, intrusion detection and prevention systems, and virtual private network (VPN) gateways. Penetration testers may try to find flaws in the way these devices are set up or put together that could let attackers get around or avoid them.
Web applications and software: This includes all types of web applications and software used by the organization.
Mobile devices: This includes all types of mobile devices, such as smartphones and tablets. Penetration testers may attempt to identify vulnerabilities in the operating system or applications installed on these devices that could allow attackers to compromise them or steal sensitive data.
It should be noted, though, that the real pentest simply does not end here. The main objective is to penetrate the IT infrastructure to reach a company’s electronic assets.
Types of Penetration Testing
Black Box Penetration Testing
In this type of test, the tester receives absolutely no information during the test. The pentester imitates the tactics of an attacker, starting from initial access, execution, and exploitation. Black box penetration testing is more realistic since it shows how an adversary without inside information would target and infiltrate an organization. The pentester is in charge of the attack’s reconnaissance phase, during which they collect any sensitive information they will need to successfully breach the network. Black box penetration testers gather information about their target system and use it to create a blueprint of its inner workings. Like an unprivileged attacker, a pentester creates the map based on their own observations, investigation, and analysis of the target system. The pentester then employs these results in an attack on the target. They may use whatever methods are required, including brute‐force attacks and password cracking. Following the breach, the pentester mimics the actions of an attacker by attempting privilege escalation and establishing a persistent presence, but without really causing any harm. After completing the test, the pentester will create a report and clean up the workspace.
White Box PenetrationTesting
This method entails giving the tester access to all network and system data, including network maps, login passwords, and IP addresses. In this type of testing, time is saved, and the total cost of the engagement is reduced. White box penetration testing is done to mimic a particular attack on a system by using as many attack pathways as feasible.
Gray Box Penetration Testing
Gray box penetration testing is a type of testing that combines elements of both black box and white box testing. During a gray box penetration test, the testers are provided with a limited amount of information about the target system, typically authentication credentials or partial access to the system. The purpose of this is to simulate an attacker with some prior knowledge of the system, such as an insider or a compromised user account.One of the primary benefits of gray box testing is its ability to reveal the extent of access that a privileged user might have on a system. By limiting the information given to the testers, it forces them to use their knowledge and experience to identify potential vulnerabilities and exploit them to gain access to sensitive data.
7030 Woodbine Avenue
Suite 500
Markham, Ontario
L3R 6G2
Tel 1-888-638-1233 | Email: [email protected] | Copyright © 2017 TEKYHOST