Penetration Testing

What is penetration testing

 Penetration testing (also known as penetration testing) is a simulated cyber attack on a computer system looking for exploitable vulnerabilities. In the context of web application security, penetration testing is often used to extend web application firewalls (WAFs).


Penetration testing (also known as penetration testing) is a simulated cyber-attack against a computer system looking for exploitable vulnerabilities. In the context of web application security, penetration testing is often used to extend web application firewalls (WAFs).


Stages of Penetration testing 




1. Planning 

Define the scope and purpose of the test, including the systems to be addressed and test methods to be used. 

 Collecting information (network names, domain names, mail servers, etc.) to better understand how a target works and  potential vulnerabilities.


2. Scanning


Static Analysis - Examines your application's code and infers its behavior during execution. These tools can scan your entire code in one pass. 

 Dynamic Analysis - Examine your application's code while it's running. This is a more practical scanning method as it gives you a real-time view of your application's performance.

3. Gaining Access

During this stage, web application attacks such as cross-site scripting, SQL injection, and backdoors are used to expose target vulnerabilities. Testers then attempt to exploit these vulnerabilities, typically through privilege escalation, data theft, traffic interception, etc., to understand the damage they can cause.

4. Maintaining access

The goal of this phase is to see if the vulnerability can be exploited to establish a persistent presence on the exploited system long enough for the attacker to gain full access. The idea is to mimic Advanced Persistent Threats that often stay on systems for months  to steal an organization's most sensitive data.

5. Analysis

Specific vulnerabilities  exploited Access to sensitive data.The amount of time the pentester was able to stay in the system without being detected.


Methods of Penetration testing 

External testing

External Penetration Testing is for company assets  that appear on the Internet. For example, the web application itself, his corporate website,  email and domain name servers (DNS), etc. The purpose is to  access  and extract valuable data. 


Internal testing

 In  internal testing, testers with access to applications behind the firewall simulate attacks by  malicious insiders. This does not necessarily simulate a rogue employee. A common initial scenario could be an employee whose credentials were stolen as a result of a phishing attack.


Targeted testing

 In this scenario, both testers and security personnel work together to update each other's movements. This is invaluable training  that provides  real-time feedback from a hacker's perspective to her security team.


----------------------------------------------------------------------------

Finally, penetration testing meets some of the compliance requirements of security audit procedures such as PCI DSS and SOC 2. B. PCI-DSS 6.6 can only be met by using a certified WAF. However, it doesn't make penetration testing  less useful as it offers the above benefits and an opportunity to improve your WAF configuration.




Post a Comment

Previous Post Next Post