What is Penetration Testing?
It is the method of testing
where the areas of weakness in software systems in terms of security are put to
test to determine, if ‘weak-point’ is indeed one, that can be broken into or
not.
Performed for: Websites/Servers/Networks
How is it performed?
- Step #1. It starts with a list of Vulnerabilities/potential problem areas that would cause a security breach for the systems.
- Step #2. If possible, this list of items has to be ranked in the order of priority/criticality
- Step #3. Devise penetration tests that would work (attack your system) from both within the network and outside (externally) to determine if you can access data/network/server/website unauthorized.
- Step #4. If the unauthorized access is possible, the system has to be corrected and the series of steps need to be re-run until the problem area is fixed.
Who performs
Pen-testing?
- Testers/ Network specialists/ Security Consultants
- Note: it is important to note that pen-testing is not the same as vulnerability testing. The intention of vulnerability testing is just to identify potential problems, whereas pen-testing is to attach those problems.
- Good news is, you do not have to start the process by yourself – you have a number of tools already in the market. Why tools, you ask?
- Even though you design the test on what to attack and how, you can leverage a lot of tools that are available in the market to hit the problem areas and collect data quickly that enables effective security analysis of the system.
- Before we look into the details of the tools, what they do, where can you get them, etc. , I would like to point out that the tools you use for pen-testing can be classified into two kinds – In simple words they are: scanners and attackers. This is because; by definition pen-testing is exploiting the weak spots. So there are some software/tools that will show you the weak spots, some that show and attack. Literally speaking, the ‘show-ers’ are not pen-testing tools but they are inevitable for its success.
Top Penetration Testing Tools:
- Metasploit
- Wireshark
- w3af
- CORE Impact
- Back Track
- Netsparker
- Nessus
- Burpsuite
- Cain & Abel
- Zed Attack Proxy (ZAP)
- Etc..
No comments:
Post a Comment