НовоВики. «Мой Новосибирск родной!»

Security Penetration Testing: What are the results inside a Penetration Test?

Материал из Wiki.nios.ru
Перейти к: навигация, поиск

Security penetration testing is a crucial part of the organisation's information security provision. However many security controls you implement for your data, you won't ever be sure how effective they're and soon you actively test them out . by commissioning security penetration testing (also known as "pen testing").

During security penetration testing, the tester will probe your organisation's computer and network defences, and will then make an effort to breach them (with your permission), but without resulting in the damage that the malicious hacker could cause. The results are explained within a report which includes tips for actions to take care of any security loopholes inside your systems.

To acheive the most effective from the test results, you should be familiar with the pattern taken by way of a penetration test. This makes it possible to check that your provider is following correct methodology. The key stages are listed below:

  • Foot-printing: Public resources are widely-used to gather information about your organisation's Internet presence.
  • Scanning: Standard tools are employed to map your network in a non-intrusive way, determining the number of computers along with the network configuration.
  • Enumeration: This stage involves attempting active connections to your systems to find out information (including valid account names) that has to be exploited by hackers. This stage and the two preceding stages are all legal: the further stages wouldn't be legal without your organisation's written permission.
  • Gaining access: This can be the point where security penetration testing has its, since the test demonstrates whether a hacker could obtain your network.
  • Increasing access rights: Having gained access, the pen tester now seeks to raise his/her access rights for the highest level possible, and locate out whether your network is vulnerable to this kind of "exploit". A hacker who succeeds in gaining high-level access would be able to wreak considerable damage on the systems.
  • Pilfering and theft of knowledge: Entering into an even more active mode, the safety penetration testing procedure now covers the attempted theft of knowledge.
  • Covering one's tracks: A competent pen tester attempt to hide his/her tracks so that the attack remains undetected, in order to show that this can be done, since a stealth attack is the most dangerous kind.
  • Creating a back door: A further refinement is always to produce a "back door" that will make less complicated to access your systems down the road. In the event the penetration tester finds this can be done, it'll certainly be highlighted within the report as being a major weakness of the systems.
  • Denial of service: Finally, the tester may attempt to discover whether a "denial of service" attack is possible, whereby resources become unavailable to legitimate users.

It is important to remember that the greater active phases of testing may disrupt the conventional operation of networks, resulting in a certain amount of denial and services information. Because of this, some organisations choose the security penetration testing to halt lacking those stages. Each pen testing project needs to be paid by a certain contract aiming what exactly will or won't be attempted. Generally, penetration testing ought to be accomplished at regular intervals, and of course after major changes to the computer network. Used correctly, pen tests is definitely an indispensable aid to your organisation's information security management system.

To understand more about stresser please visit our website. We've covered every piece of information you must know about stresser.

Персональные инструменты