Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)

Introduction

This module attempts to bridge various aspects of ethical hacking by suggesting an approach for undertaking penetration testing. There are different ways of approaching a penetration test.

Whatever the approach adopted, it is a fact that penetration testing is constrained by time and availability of resources, which varies from client to client. To effectively utilize both these telling factors, penetration testers adopt some form of structure or methodology. These can be checklists developed by consulting practices, widely available resources such as Open Source Security Testing Methodology or a customized attack strategy.

There are is no single set of methodology that can be adopted across client organizations. The skeletal frame of testing however is more or less similar. The terms of reference used for various phases may differ , but the essence is the same. As discussed in preceding modules, the test begins with:

The general objective of a penetration test is to reveal where security fails. The result of a penetration test can be:

Foot printing / Information Gathering phase:

Discovery and Planning / Information Analysis phase

Detecting a vulnerability / security loophole

Attack / Penetration / Compromise

Analysis of security posture / Cover up / Report

Clean up

Категории