Basic knowledge of penetration testing

1. What is penetration testing?

    Penetration test(Penetration test) does not have a standard definition. The general statement reached by some foreign security organizations is: penetration testing is an evaluation method to evaluate the security of computer network systems by simulating the attack methods of malicious hackers. This process includes Active analysis of any weaknesses, technical defects or vulnerabilities of the company. This analysis is carried out from a location where an attacker may exist, and this location is conditionally destined to exploit security vulnerabilities. In other words, penetration testing means that infiltrators use various methods to test a specific network at different locations (such as from the internal network, external network, etc.), in order to discover and mine the vulnerabilities in the system. , And then output the penetration test report and submit it to the network owner. Based on the penetration test report provided by the infiltrator, the network owner can clearly understand the hidden security risks and problems in the system.

2. Penetration testing process

    Clear goals to write reports,
    information collection and information collation,
    vulnerability detection and acquisition,
    vulnerability verification information analysis

Three, penetration testing classification

1. Black box test

    Black box testing is also known as the so-called "Zero-Knowledge Testing". Infiltrators are completely ignorant of the system. Usually this type of testing. The initial information acquisition comes from DNS, Web, Email, and various public sources. server.

2. White box testing

    White box testing is just the opposite of black box testing. Testers can obtain various information from the tested unit through normal channels, including network topology, employee information, and even code fragments of websites or other programs. It can also communicate with other employees of the unit (sales, program Staff, managers...) to communicate face-to-face. The purpose of this type of test is to simulate the unauthorized operation of employees within the enterprise.

3. Stealth test

    The covert test is for the tested unit. Normally, the network management department of the unit that accepts the penetration test will be notified that the test will be performed at certain times. Therefore, it is possible to monitor changes in the network. But for the covert test, only a few people in the tested unit are aware of the existence of the test, so it can effectively check whether the information security incident monitoring, response, and recovery in the unit is in place.

Fourth, classify the target

1. Host operating system penetration

    Perform penetration testing on Windows, Solaris, AIX, Linux, SCO, SGI and other operating systems themselves.

2. Database system penetration

    Conduct penetration tests on database application systems such as MS-SQL, Oracle, MySQL, Informix, Sybase, DB2, and Access.

3. Application system penetration

    Perform penetration tests on various applications provided by penetration targets, such as WWW applications composed of ASP, CGI, JSP, and PHP.

4. Network equipment penetration

    Conduct penetration tests on various firewalls, intrusion detection systems, and network equipment.

Guess you like

Origin blog.csdn.net/Han_V_Qin/article/details/109597948