Thursday 3 November 2011

Penetration Testing

The Scope of Penetration Testing Includes:

Location of testing: internally and/or externally.
Vulnerabilities are identified and then tested for proof of concept (POF)
Destructive attacks like DOS and Buffer Overflow attacks are used depending upon the
client’s willingness to accept the risk.
Information Gathering
Network Surveying / Network Mapping
Port Scanning and Service Identification
Evading Firewall Rules
Physical access to network
Automated Vulnerability Scanning
Exploiting Services for Known Vulnerabilities
Exploiting Web-Based Authorization
Brute Force Password Cracking
Denial of Services (DoS) Testing
Elevation of Privileges

No comments:

Post a Comment