Enjoy a fast, responsive and cost effective Remote IT Support service to solve your IT issues quickly and with the minimum of fuss.Focused on building innovative solutions that create value for businesses and consumers. Our solutions are built around the following three founding principles - Unique Technology; Distinctive Information / Content; and Innovative Services. Our solutions combine these three, leverage our global services delivery capabilities and ensure that we are able to provide unmatched, superior resolution to specific customer problems.


Techmantra

Wednesday 25 March 2015

Penetration Test

Penetration Test-


Penetration test, or the short form pentest, is an attack on a computer system with the intention of finding security weaknesses, potentially gaining access to it, its functionality and data. The process involves identifying the target systems and the goal, then reviewing the information available and undertaking available means to attain the goal. A penetration test target may be a white box (where all background and system information is provided) or black box (where only basic or no information is provided except the company name).
A penetration test can help determine whether a system is vulnerable to attack, if the defenses were sufficient and which defenses (if any) were defeated in the penetration test.
A vulnerability assessment simply identifies and reports noted vulnerabilities, whereas a penetration test attempts to exploit the vulnerabilities to determine whether unauthorized access or other malicious activity is possible. Penetration testing typically includes network penetration testing and application security testing as well as controls and processes around the networks and applications, and should occur from both outside the network trying to come in (external testing) and from inside the network.

TOOLS








  • Specialized OS distributions
  • Popular examples are Kali Linux (replacing BackTrack as of December 2012) based on Debian Linux, Pentoo based on Gentoo Linux and WHAX based on Slackware Linux.
  • Software frameworks
  • 1.Metasploit
    2.nmap
    3.w3af
    _______________________________________________________________________ Links
    Backtrack-Pentest-Introduction
    Move fast And Break Things................ Code Red

    No comments:

    Post a Comment

    Note: only a member of this blog may post a comment.

    Popular Posts

    0x00000709 How to Fix “Operation could not be completed error” Error When Installing Shared Printer? Windows 11 22h2

      0x00000709 How to Fix “Operation could not be completed error” Error When Using Shared Printer? Windows 11 22h2 1. Via Group Policy Press ...

    Popular Posts

    Search This Blog

    About

    Enjoy a fast, responsive and cost effective Remote IT Support service to solve your IT issues quickly and with the minimum of fuss.Focused on building innovative solutions that create value for businesses and consumers. Our solutions are built around the following three founding principles - Unique Technology; Distinctive Information / Content; and Innovative Services. Our solutions combine these three, leverage our global services delivery capabilities and ensure that we are able to provide unmatched, superior resolution to specific customer problems.