Overview of the Penetration testing process

Source: Internet
Author: User
Tags web hosting

0x01???? Information gathering
  1. Human Resource Intelligence
    1. such as Enterprise General employee information, administrator information, mailbox, name, common user name and password, etc.
  2. Enterprise Location information Collection
    1. Real IP can be determined by location and can be used for WiFi penetration
  3. IP and domain name information collection
    1. Determine penetration test Range
  4. Third party Resource Collection
    1. Cloud service, ISP, web hosting information
  5. Server Open port Information
    1. Port-provided services, and version information
  6. Server/Employee PC operating System Information
  7. Web Service information provided by the server
    1. CMS and version information used by Web services
    2. Development language, language version
    3. Site path Information
    4. Is there any information leaking?
  8. Identification of defense mechanisms
  9. Penetration test target has exposed the vulnerability information
  10. Github,google code and other open source platform information collection
  11. Determination of enterprise Network boundary
0x02???? Vulnerability discovery and exploit
  1. Automated vulnerability Discovery/Manual Vulnerability Discovery
  2. Web application vulnerability Discovery and utilization
    1. SQL injection
    2. XSS Cross-site scripting
    3. File Upload
    4. Weak password
    5. ... Wait a minute
  3. Some port software vulnerability discovery and utilization
    1. Database can be accessed remotely or with weak passwords
    2. Remote management function Weak password, such as Ssh,pcanywhere, etc.
    3. Remote overflow such as RPC
    4. ... Wait a minute
  4. Whether the network boundary can break through
    1. Wifi
    2. Vpn
    3. ... Wait a minute
0x03???? Privilege elevation Phase
    1. Local/Remote power-up due to system vulnerability
    2. Rights of third party software
    3. Right to raise rights due to improper disposition
0x04???? Permission to maintain
    1. Agent
    2. Port forwarding
    3. Tunnel
    4. Backdoor/trojan/hidden account
0x05???? Intranet Infiltration
    1. Intranet Range
    2. Determination of intranet topology
    3. Weak password problem in intranet
0x06???? Infiltration Trace Cleanup
    1. Web App log cleanup
    2. Cleanup of system logs
    3. Log cleanup for some services
0x07???? Summary

Information gathering is an extremely important stage in penetration testing, and every stage of penetration testing is accompanied by information gathering, which should pay special attention to the record of sensitive information.

Penetration testing is not performed in the order of the first and the last, but in an iterative process.

Overview of the Penetration testing process

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.