Analysis of Penetration Testing

Source: Internet
Author: User

The following is a comprehensive analysis of penetration testing. Please point out the shortcomings.
----------------------------------

1. What is penetration testing?

2. Why do you choose penetration testing?

3. Select a service

4. Various Methods

5. Results

----------------------------------

1. Introduction: What Is penetration testing?

Penetration testing is a process of product-level evaluation of your information security measures. There are some methods that can be done, but the most common is to product-level analysis of design defects, technical defects and weaknesses of security measures; provide the executive, management, and technical personnel with a comprehensive security report.

2. Why does penetration testing: Why did you choose it?

There are several reasons for the Organization to perform penetration tests. From the most common technology to the business:

* Determine the threats to the Organization's information resources. You can refer to risk quantification to fully describe expenditures.
* Reduce the IT security cost of the organization, provide better security, safeguard the investment income (Francesco), discover and solve existing vulnerabilities, and understand the basic technology, design, and implementation defects of vulnerabilities.
* Ensures a comprehensive and thorough security architecture for the Organization, including evaluation policies, processes, design and implementation.
* Industry management and maintenance (BS7799, HIPAA, etc.) for obtaining certificates ).
* Best practices are applicable to legal and industrial rules.

3. Select a service: What test methods are provided?

* Traditional penetration testing methods for external penetration testing. testing focuses on servers, including infrastructure and infrastructure software goals. no leakage of on-site informed (Black Box) or topological environment (crystal box) is allowed ). this test usually requires the public information of the target network to analyze and determine the behavior of the security facilities of the target host, such as the analysis of firewalls and routers. determine and verify the impact of the Vulnerability Assessment on the target host.
* The Internal Security Evaluation provides more comprehensive security considerations based on similar external testing methods. the test starts from the Network Access Node and describes each logical and physical segment. for example, hierarchical network and DMZ environment, company network, and line interface of company partners.
* The purpose of application security evaluation is to assess threats to the application system by the Organization. applications provide interactive access to protect sensitive materials, which must be evaluated. First, ensure that basic application software and services are not attacked. Second, malicious users cannot use, modify, or damage data and system services. even in secure configuration and deployment, application vulnerabilities can leak the maximum access permissions of the Organization, which poses unacceptable risks.
* Wireless/remote access security assessment: mobile staff are facing increasing security risks. household Workers use 802.11 Wireless Access to the Internet to expand the traditional network boundaries. Many emerging remote access technologies greatly increase the risks of enterprises. it is important to design and deploy security to ensure effective management of related risks.
* Telephone security assessment security problems involve the company's speech processing technology, including abuse of external telephone lines, payment calls from the other party and secure deployment mailboxes, illegal use of VOIP, and other related risks.
* Social engineering targets non-technical intrusions. It relies on human interaction. It often includes cracking normal security procedures by Using Human Tricks. Social engineering is usually a scam and deception by authoritative people. Or other technologies such as searching for valuable information from the spam, viewing the access password records of certain owners, or using passwords that are easy to guess.

4. Two different testing methods: black box testing and white box testing

Penetration testing can be performed in two aspects: black box testing (testing without knowledge of the Infrastructure) or white box testing (testing with a complete understanding of the structure ).

Some penetration testing providers think that black box testing is the best method, because it can simulate real hacker attacks. this is an interesting theory, especially incorrect. first, it is impossible for an attacker to understand your system structure. if someone attacks your organization, it is likely that you are familiar with the Organization's systems and processes (non-employees do not know the information ). In this case, there will be serious consequences. they understand the comprehensive system. If the security you designed relies on single point of protection, you actually do not have security protection. then, hackers are not limited to any time limit and can be used for penetration testing. theoretically, they can not only spend a week to discover available vulnerabilities, but also spend years to discover problems.

There are also economic benefits. Black box testing takes some time to discover the relationship between the nature of the project and its infrastructure. Obviously, time is spent on Discovery rather than actual testing of vulnerabilities.

This does not mean that the dark box test has no value. How to find the best information system weakness through other information (such as the mail header file. In the selection of a dark box test, pay attention to spending the same time on the Access Vulnerability test, otherwise you must allocate more time to the project.

5. Results: How much do you get from the cost?

The penetration test system analysis includes all the security measures. A comprehensive solution will cover part or all of the following:

Network Security

* Network Survey
* Port Scan
* System recognition
* Service identification
* Vulnerability discovery and Verification
* Application testing and code review
* Vro Test
* Firewall Test
* Test the intrusion detection system.
* Trusted System Test
* Password cracking
* Dos Testing
* Control measure test

Information Security

* File Protection
* Competitive intelligence reconnaissance
* Privacy Review

Social Engineering

* Test invitation
* Guidance Test
* Trusted Test

Wireless Security

* Wireless Network Test
* Wireless communication test
* Privacy Review
* Infrared System Testing

Communication Security

* Telephone switch Test
* Message Test
* Fax Review
* Modem Test

Physical security

* Access Control Test
* Border review
* Supervised Review
* Emergency Response Test
* Site review
* Environment Review

Although a lot of work has been done in the early stage, the true value of penetration testing is reflected in the report and report of the later work. If the report is not clear and understandable, the value of the entire process cannot be maximized. the perfect report should introduce the intrusion process targeting the test target, the risk analysis and the description of the solution. The layman needs a concise understanding of the solution, and the technical manager needs the overall solution, the system administrator must solve the vulnerability step by step.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.