We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 5
EXPLAINING PENETRATION TESTING
PN OS Bins RMN oN dake Ne
or pen-test, is an effort to application program defects, improper configurations
Pare sR RSet s aol
ears anes ole
an IT infrastructure by safely
hs 3 Such appraisals are also usoful in confirming the efficacy of
attempting to exploit eM cnn MSN MtS telson ac}
Nella cele (csae Peete tonsa eto
oll
=
Rasen need
Hack
‘Armed with intel gathered from social
engineering and vulnerability scanning,
the penetration tester begins bombarding
tho wob application (or infrastructure or
wireless system) with hacking attempts
WEB APPLICATION
a «
1 PENETRATION > Z
TESTER
aonL
=NETRATION | >
PEN!
_ TESTER
Gather
Throughout the penetration test, information
is gathered, and risks arre identified.
The results of the penetration test
aire prioritized and compiled in
ain executive report. Risks are labelled
Rem ed | ate and described, and a proposed
solution is provided.
The report is used by the IT team to
guide the subsequent risk mitigation
process. At this time IT staff members
and developers work to resolve high
‘and moderate risk findings.
\eee AiR een ae
‘
Remediate Siena a cuoae alana
The report is used by the IT team to
guide the subsequent risk mitigation
process. At this time IT staff members
‘and developers work to resolve high
and moderate risk findings.
Validate
Following the attempt to fix discovered issues
found in an external test, the penetration
tester will validate remediation efforts.
This process will confirm whether or not
the remediation was successful.
[ Validated Input
| Secure Authentication
For more penetration testing information visit
hackercombat.comGF’
PENETRATION | ~~» S. 4
TESTER aS q
= I
= |
fe = Get Results
me <\.
f
Remediate
Oz A ValidateFollow us
Hackercombat.com