官术网_书友最值得收藏!

Summary

In this chapter, we discussed the need for a methodology when it comes to penetration testing and how it is essential when it comes to building skills as a professional penetration tester. Following this, we reviewed two sample methodologies. We reviewed the penetration testing framework and described the components within the standards, to include the process to follow based on the ports that are discovered during your assessments. The next methodology we discussed was the PTES, and although there is no technical guidance as part of the standard, there is a reference for the technical information that is available. We provided a reference for that, along with a number of examples on how to perform the testing for each step. The last methodology we looked at was a high-level abstraction that shows the potential components of a professional security test.

In the next chapter, we review the steps required to build the range that we will use throughout the rest of the book. At the end of the next chapter, we will have a complete range that allows us to practice virtually all testing methods against any of the targets that we may encounter.

主站蜘蛛池模板: 金阳县| 余姚市| 广饶县| 都兰县| 咸阳市| 梅州市| 泗洪县| 自治县| 民权县| 闻喜县| 东乡族自治县| 开化县| 金沙县| 永昌县| 东港市| 浠水县| 石屏县| 肇州县| 新乡县| 永胜县| 海淀区| 泰和县| 富平县| 保山市| 辽源市| 颍上县| 平阴县| 湖口县| 罗源县| 南康市| 桐乡市| 新昌县| 瑞安市| 成安县| 定边县| 涟源市| 望城县| 余江县| 定兴县| 德钦县| 襄城县|