
Ivan Spiteri
In the pre-penetration testing phase, the tester and the client define the scope of the penetration test, such as what systems will be tested, what methods the tester will be using, and what the other objectives and legal implications are.
The survey requires the tester to gather as much information as possible about the test subject, including information about personnel, technology and systems.
After gathering sufficient information about the client's system, the testers begin to model the real threats that the client will might face and then scan for relevant system vulnerabilities that would typically be targeted by these attacks.
In this phase, all identified vulnerabilities are exploited in accordance with the scope specified in the pre-engagement phas
After the testing period or after all relevant systems have been exploited, all testing methods and vulnerabilities - including associated devices, ports or personnel - are logged.
The tester creates a penetration testing report for the client that describes the methods used, vulnerabilities exploited, remediation measures, and other important information.
After the client has had time to resolve the vulnerabilities listed in the initial report, the tester can go back and perform the same penetration tests on the client's system to verify that the vulnerabilities have been resolved. This phase is not as common, but may be requested by the client.
The goal is to verify whether an organisation's information system can be penetrated. The tester uses the means and methods most quickly leading to the goal.
The output of the test is a final report that includes:
Want to Know More?
There are three main strategic approaches to penetration testing, each involving different steps and tools. The main differences in these approaches relate to the extent of the attacker's theoretical knowledge of the target system or network.
Ivan Spiteri