Monday, December 1, 2014

Chapter 11: Security Operations - Vulnerability Testing

Main goal of penetration testing is to report identified vulnerabilities and to determine how severe the vulnerabilities are.

The five steps of penetration testing:

1. Discovery - Gather info about the system you are going to attempt to gain unauthorized access to.

2. Enumeration - Perform scans to find out ways you might be able to accomplish your penetration goals.

3. Vulnerability Mapping - Actually identify your found vulnerabilities and document them

4. Exploitation - Attempt to break into the system.

5. Report to Management - Show them what you found, if you gained unauthorized access, how sever it is, and what can be done to protect against all of these new found vulnerabilities.

No comments:

Post a Comment