penetration testing

5 pts.
Tags:
Software Quality Assurance
Dears, kindly define the steps involved in the penetration testing?

Answer Wiki

Thanks. We'll let you know when a new response is added.

Sadly, given such a short question, with no apparent clue as to what you’re actually looking for – an answer which covers all the areas under your question would be too large to post here. I certainly hope that this is not a school or training question.

I recommend that you spend some time at the SANS reading room (URL below). They have a wealth of white papers on various security subjects. Once you’ve read some of those, you should be able to ask a more precise question. There are many books on the subject as well, but the SANS reading room will give you a good start – for free!

http://www.sans.org/reading_room/

Bob

Discuss This Question: 3  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • MichelleDavidson
    SearchSoftwareQuality.com has several articles, tips and other resources on penetration testing. Here are a few: Penetration testing techniques -- Chapter 6 from Professional Pen Testing for Web Applications http://searchsoftwarequality.techtarget.com/tip/0,289483,sid92_gci1212964,00.html Penetration testing versus code review http://searchsoftwarequality.techtarget.com/tip/0,289483,sid92_gci1215374,00.html Manual vs. automated penetration testing http://searchsoftwarequality.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid92_gci1191631,00.html
    435 pointsBadges:
    report
  • Compuman2153
    First you need nmap, a root kit,a packet sniffer, back oriffice,, Solar winds network mask, vunerability assesment software,BOOK Hack Attacks Revealed, 2600 Hackers Quartely subscription,and another clean node, never hack on your personal system even if you are hacking your own, get a node that can easily be disconnected once you are done with it for your own security and if you leave it active it can be hacked from the network, and then there are network identifiers, oh yeah and buy a copy of Steal this Computer Book, it has valuable information on steganography. Did you know that your web cam is a vunerability point too? There are so many vunerability points that in this short form I can't go into all of them. UBER WhiteHat X-BlackHat Hacker now working for the U.S. Government compuman2153, X- Legion of Doom
    0 pointsBadges:
    report
  • Bobkberg
    Having re-thought the original question, the "steps" involved in penetration testing (or pen-testing for short) are: Bear in mind that this is a simplification - only touching on the main steps. 1) Defined Objective 2) Information Gathering to learn as much public information about your Objective as possible 3) Target(s) identification (from data gathered in step 2) 4) Reconnaisance 5) Probing 6) Data Gathering 7) Interpretation of data 8) Possible recursion to gain more data Hope that helps, Bob
    1,070 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following