Background Information
Phases of the PT
- Information Gathering
- Threat modeling - Threat modeling uses the information you acquired in the intelligence-gathering phase to identify any existing vulnerabilities on a target system. When performing threat modeling, you will determine the most effective attack method, the type of information you are after, and how the organization might be attacked.
- Bulnerability analysis
- Exploitation - trigger a vulnerability
- Post Exploitation
- Reporting
Types of PT
- Overt Penetration Testing
- Convert Penetration Testing
http://www.hackcave.net/2015/11/the-basics-of-penetration-testing.html