Thai pants are hot! Learned the penetration testing process again

Penetration testing

Network penetration testing and security testing are one of the necessary skills for test engineers. They are required for activities such as strengthening the company's systems, conducting security assessment and testing of the company's website and business systems, and checking whether there are security vulnerabilities in the website or APP software. Penetration testing session. Let’s learn penetration testing with the editor today!

picture

Penetration testing is a process of testing and evaluating the security of a target system under authorized conditions by simulating the attack methods of malicious hackers. Its focus is on testing and process, not on reckless attacks or test defenses. It is a set of scientific processes and is not limited to the use of a certain tool or technique.

Penetration testing process

picture

01  Early interaction

The penetration testing team conducts preliminary interactive discussions with the client organization, the most important of which is to determine the scope, objectives, constraints, and service contract details of the penetration testing. Defining the scope is one of the most important components of penetration testing, and a questionnaire is a better format where the client needs to answer questions in order to correctly estimate the scope of engagement.

This phase usually involves activities such as gathering customer requirements, preparing test plans, defining test scope and boundaries, defining business goals, project management and planning. After reaching an agreement with the client on both sides' goals, a formal power of attorney is obtained.

picture

02 Intelligence gathering

Many companies currently fail to take into account the vast amount of information about their company and its employees that is available in the public domain, and that this information could become a vulnerability that could be exploited.

The penetration testing team uses a variety of information gathering tools as much as possible to try to obtain more information about the target organization's network topology, system configuration, and security defense measures. Intelligence collection methods that testers can use include website WeChat Weibo, email, Google Hacking, whois query, scanning detection, network monitoring, social networks, etc.

Intelligence gathering ability is a very important skill for testers. Only based on sufficient information analysis can penetration testing be successful. Only the more information, the greater the chance of discovering vulnerabilities. Of course, we still need to focus on learning some scanning and detection tools, such as: netdiscover, nmap, appscan, nikto

03 Threat Modeling

After collecting sufficient intelligence information, penetration testing team members conduct threat modeling and attack planning. During the threat modeling process, the client company’s organizational assets should be classified and listed, such as:

Company’s internal policies, business plans, roadmaps

Company product information and source code

Company financial information (e.g. bank, credit, equity accounts)

The company's technical information, such as infrastructure information, system configuration information, and user account credentials, employee data, and customer data. Once these business assets are identified and the value of different assets is analyzed, an accurate threat model is established and carefully developed through team brainstorming. Intelligence analysis and penetration ideas can be sorted out from a large amount of information and intelligence, and the most feasible penetration channels can be determined.

04 Vulnerability Analysis

At this stage, a high-level penetration testing team will also conduct security vulnerability detection and mining on some key systems and services on the attack channel, hoping to find unknown security vulnerabilities that can be exploited, and develop penetration code to open the attack channel. On the critical path, common vulnerability search websites include exploit-db.com and github.com

05 Penetration attack

Penetration attacks are the most charming and precise part of the penetration testing process. In this link, the penetration testing team needs to use the identified security vulnerabilities to actually invade the system and obtain access control rights. Penetration attacks can take advantage of publicly available penetration code.

picture

06 Post-penetration attack

Post-penetration attacks are a link that best reflects the professional ethics and technical capabilities of the penetration testing team.

During this step, with the customer's permission, the penetration testing team performs privilege escalation and maintains control of the machine for future use. At the same time, rules need to be agreed with customers to ensure that customers’ daily operations and data will not be exposed to risks.

07 Form report

The penetration testing process is finally submitted to the client, and what is recognized and successfully obtained the contract payment is a penetration testing report.

This report condenses the key intelligence information obtained by the penetration testing team in all previous stages, the system security vulnerabilities detected and discovered, the process of successful penetration attacks, the code used in the penetration process, and the attacks that caused business impact consequences. approach, and at the same time, from the perspective of defenders, help them analyze weak links, existing problems, and technical solutions for repair and upgrade in the security defense system.

Finally: The complete software testing video tutorial below has been compiled and uploaded. Friends who need it can get it by themselves [guaranteed 100% free]

Software Testing Interview Document

We must study to find a high-paying job. The following interview questions are the latest interview materials from first-tier Internet companies such as Alibaba, Tencent, Byte, etc., and some Byte bosses have given authoritative answers. After finishing this set I believe everyone can find a satisfactory job based on the interview information.

Guess you like

Origin blog.csdn.net/AI_Green/article/details/133185339
Recommended