Information Gathering - Penetration Testing Process

Table of contents

  • Penetration testing basic concepts
  • Penetration Testing Performance Standards (PTES)
  • Basic process and methods of penetration testing
  • Penetration testing tools
  • Penetration testing risk avoidance
  • Penetration testing plans and reports

Relevant legal provisions (it is recommended to understand them to prevent them from accidentally entering for further study)

According to Articles 285 and 286 of the Criminal Law of the People's Republic of China:

  1. Whoever violates national regulations and intrudes into computer information systems in the fields of national affairs, national defense construction, or cutting-edge science and technology shall be sentenced to fixed-term imprisonment of not more than three years or criminal detention.

  2. Whoever violates national regulations by deleting, modifying, adding, or interfering with the functions of a computer information system, causing the computer information system to fail to operate normally, with serious consequences, shall be sentenced to fixed-term imprisonment of not more than five years Or not. If the consequences are particularly serious, the offender shall be sentenced to fixed-term imprisonment of not less than five years.

In addition, according to the "Amendment to the Criminal Law of the People's Republic of China (VII)", the following situations will also be punished:

  1. Violate national regulations by intruding into computer information systems other than those specified in the preceding paragraph or using other technical means to obtain data stored, processed or transmitted in such computer information systems, or exercising illegal control over such computer information systems, a>If the circumstances are serious, he shall be sentenced to fixed-term imprisonment of not more than three years or criminal detention, and shall also or solely be fined. If the circumstances are particularly serious, the offender shall be sentenced to fixed-term imprisonment of not less than three years but not more than seven years.

  2. Provide programs and tools specifically used to intrude into or illegally control computer information systems, or provide programs and tools to others knowing that they are committing illegal and criminal acts of intruding into or illegally controlling computer information systems. If the circumstances are serious, they shall be punished in accordance with the provisions of the preceding paragraph.

Knowledge Sub-Area - Basic Concepts of Penetration Testing

    Guess you like

    Origin blog.csdn.net/weixin_43263566/article/details/135016684