官术网_书友最值得收藏!

Abstract methodology

As mentioned previously, we concentrate on a process and apply that to our security components when we go about security testing. For this, we describe an abstract methodology here:

A simple abstract methodology consists of the following steps:

  1. Planning
  2. Non-intrusive target search
  3. Intrusive target search
  4. Remote target assessment
  5. Local target assessment
  6. Data analysis
  7. Reporting

The goal is to develop your process and select a minimum of two tools for each process, which provides the means for you to achieve the desired outcome at each step. Once you have done this, then you can add additional tools as required. The essential component is to have at least two tools to start professional security and penetration testing. For more on this abstract reference, refer to Building Virtual Pentesting Labs for Advanced Penetration Testing.

Final thoughts

It is essential that you have a professional security testing plan and methodology before you start your penetration testing; furthermore, the more time you spend planning, the easier the test will be to perform. Without these essential elements, your testing will be unstructured and mostly ad hoc. This is something we want to avoid when it comes to performing penetration testing for a client who has hired us. We have briefly covered a number of methodologies here, and these are only provided as a reference. You are encouraged to build and develop your own methodology; the more time you spend on this, the more you will be rewarded in the end.

主站蜘蛛池模板: 长白| 南陵县| 博爱县| 龙川县| 临澧县| 资源县| 安溪县| 巨鹿县| 当雄县| 肥东县| 廊坊市| 揭阳市| 河西区| 滨州市| 游戏| 栖霞市| 临泉县| 广饶县| 德格县| 新民市| 永善县| 林口县| 富源县| 皮山县| 定州市| 霍州市| 永嘉县| 南城县| 郎溪县| 梅州市| 乌恰县| 罗甸县| 新和县| 惠州市| 穆棱市| 抚宁县| 丰镇市| 定日县| 建始县| 尤溪县| 东阳市|