Background Information

Phases of the PT

  • Information Gathering
  • Threat modeling - Threat modeling uses the information you acquired in the intelligence-gathering phase to identify any existing vulnerabilities on a target system. When performing threat modeling, you will determine the most effective attack method, the type of information you are after, and how the organization might be attacked.
  • Bulnerability analysis
  • Exploitation - trigger a vulnerability
  • Post Exploitation
  • Reporting

Types of PT

  • Overt Penetration Testing
  • Convert Penetration Testing

http://www.hackcave.net/2015/11/the-basics-of-penetration-testing.html

results matching ""

    No results matching ""