Security TestingAlso called: "pentesting", "ethical hacking"
Penetration testing (pentesting) validates security controls through ethical hacking.
Types of pentests
- Black box: No prior knowledge (simulates external attacker).
- White box: Full knowledge of systems (comprehensive testing).
- Gray box: Partial knowledge (simulates insider threat).
Testing phases
- Reconnaissance: Gather information about targets.
- Scanning: Identify open ports, services, vulnerabilities.
- Exploitation: Attempt to gain access.
- Post-exploitation: Determine impact, lateral movement.
- Reporting: Document findings and remediation.
Common targets
- Web applications (OWASP Top 10).
- Network infrastructure.
- Wireless networks.
- Physical security.
- Social engineering.
Deliverables
- Executive summary.
- Technical findings with CVSS scores.
- Proof-of-concept exploits.
- Remediation recommendations.