- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- Lee Allen Kevin Cardwell
- 246字
- 2021-07-09 20:20:36
Abstract methodology
As mentioned previously, we concentrate on a process and apply that to our security components when we go about security testing. For this, we describe an abstract methodology here:
A simple abstract methodology consists of the following steps:
- Planning
- Non-intrusive target search
- Intrusive target search
- Remote target assessment
- Local target assessment
- Data analysis
- Reporting
The goal is to develop your process and select a minimum of two tools for each process, which provides the means for you to achieve the desired outcome at each step. Once you have done this, then you can add additional tools as required. The essential component is to have at least two tools to start professional security and penetration testing. For more on this abstract reference, refer to Building Virtual Pentesting Labs for Advanced Penetration Testing.
Final thoughts
It is essential that you have a professional security testing plan and methodology before you start your penetration testing; furthermore, the more time you spend planning, the easier the test will be to perform. Without these essential elements, your testing will be unstructured and mostly ad hoc. This is something we want to avoid when it comes to performing penetration testing for a client who has hired us. We have briefly covered a number of methodologies here, and these are only provided as a reference. You are encouraged to build and develop your own methodology; the more time you spend on this, the more you will be rewarded in the end.
- 大型互聯網企業安全架構
- CSO進階之路:從安全工程師到首席安全官
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 計算機病毒分析與防范大全(第3版)
- 黑客攻防入門秘笈
- Penetration Testing with Perl
- 移動APT:威脅情報分析與數據防護
- Digital Forensics with Kali Linux
- 網絡安全態勢感知
- 信息技術基礎:提高篇·實驗與習題
- Securing Network Infrastructure
- BeagleBone for Secret Agents
- ATT&CK視角下的紅藍對抗實戰指南
- 大話數據恢復
- Hands-On Spring Security 5 for Reactive Applications