Penetration testing is just like
hacking in an ethical way. We follow the same procedures, tools and tricks to
mock a hacker’s attempt to take over an enterprise networks/systems. The one who execute
penetration testing is known as a ”Pen-tester”. The pentester first do a
vulnerability assessment, in which he list out known vulnerabilities in existing
in network. With respect to vulnerabilities received he tries to exploit them, which is known as "Pentesting".
He records the maximum level/depth he could reach. The pen tester then creates
a detailed report about vulnerabilities and their impact on the network. These
reports will have recommendation to fix these vulnerabilities or to mitigate
them.
Classification of hacking
Hacking mainly classified in to two types. first one ethical and other unethical. Ethical hacking, or in other words pentesting, is done with proper concern from the client. The unethical hacking, which has only one sub category, generally known as black hat hacking is completely illegal and those who practice these are declared as cyber criminal. If one or more people engage in illegal hacking, then they are called as cyber terrorist, and if they are doing it for a cause, then they are called as hacktivist.
On the other hand we have ethical hacking, which as name says is completely legal. They are mainly three categories first one is again black hat hacking second one grey hat hacking and last one white hat hacking.
The Black hat hacking or Black box pentesting is a method of pentesting in which the pentester has zero knowledge about the client IT infrastructure and security posture, only top management people knows about it. The main idea is to find out how does the IT team respond to a particular cyber incident.
The next category is Grey box or Grey hat testing, in which other than management people top level IT staff will also know about it. In this type of testing a limited information such as IP address, subnets etc. will be given. The idea is to demonstrate how do the IT staff perform in case of an insider attack with inside information.
The White box or White hat testing,The third category is generally preferred by most of the companies. A pentester executing white box pentesting will have entire information about the IT assets like critical subnets, ip address etc. He can have detailed testing on all assets. He can cross check the information he got from pentesting with IT people, providing more accurate results and hence removing possible false positives, when compared to other testing methods white box testing has literally zero false positives This in turn gives detailed pentetration testing report.
Comments
Post a Comment