官术网_书友最值得收藏!

Summary

In this chapter, we have defined security testing as it relates to this book, and we identified an abstract methodology that consists of the following steps: planning, nonintrusive target search, intrusive target search, data analysis, and reporting. More importantly, we expanded the abstract model when it came to the intrusive target search, and we defined within that a methodology for scanning. This consisted of identifying live systems, looking at the open ports, recovering the services, enumeration, identifying vulnerabilities, and finally exploitation.

Furthermore, we discussed what a penetration test is and that it is a validation of vulnerabilities and that it is identified with one step in our scanning methodology. Unfortunately, most clients do not understand that when you validate vulnerabilities, it requires you to run code that could potentially damage a machine or even worse, damage their data. Due to this, most clients ask that not be a part of the test. We have created a baseline for what penetration testing is in this chapter, and we will use this definition throughout this book. In the next chapter, we will discuss the process of choosing your virtual environment.

主站蜘蛛池模板: 孝感市| 精河县| 秦皇岛市| 故城县| 孟连| 保靖县| 三江| 龙海市| 芜湖市| 平舆县| 襄垣县| 新竹县| 吴旗县| 十堰市| 连云港市| 麻城市| 盖州市| 清水河县| 高平市| 大城县| 喀喇| 体育| 郁南县| 贺兰县| 宜都市| 遵义县| 商丘市| 宽城| 林周县| 巨野县| 泾源县| 洛浦县| 通海县| 嘉黎县| 广丰县| 临洮县| 灵台县| 祥云县| 瑞丽市| 海安县| 黄大仙区|