Coming Soon...
High-value penetration testing involves modeling the techniques used by real-world computer attackers to find vulnerabilities, and, under controlled circumstances, to exploit those flaws in a professional, safe manner according to a carefully designed scope and rules of engagement. This process helps to determine business risk and potential impact of attacks, all with the goal of helping the organization improve its security stance. (Source: SANS)
The Pentest Wizard (PW) is a free educational tool that can help you as penetration tester by following a simple step-step guide to perform the test, and generate a professional pentest report.
Always make sure you have explicit written permission to perform any security test, and you exploit detected vulnerabilities in a controlled environment.
The Methodology
A Penetration Test (Pentest) is security test whereby the tester attempts to exploit existing weaknesses (i.e. simulate an attack)
A pentest can be performed on networks, applications (Web; Mobile; etc.), physical resources, and people.
Penetration testing involves two main teams:
Blue Team
Red Team
Planning and Preparation
Always ensure you have written permission
Information Gathering and Analysis
Reconnaissance
. This entire phase may not bbe required if you are performing a Clear-Box
pentest (i.e., you are already given all the information).
Vulnerability Detection
Penetration Attempt
Analysis and Reporting
Cleaning Up