Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
111
6
Information Gathering
The goal of a penetration test (or pentest) is to detect security gaps to improve the defenses of
the company being tested.
Because the network, devices, and software within the company’s
environment change over time, penetration testing is a cyclic activity. A company’s attack surface
changes periodically due to newly discovered software vulnerabilities, configuration mistakes
from internal
activities, or IT restructuring that might expose new segments for targeting.
In this Learning Module, we’ll learn how to methodically map such an attack surface using both
passive and active means, and understand how to leverage this information during the entire
penetration test lifecycle.
6.1
The Penetration Testing Lifecycle
This Learning Unit covers the following Learning Objectives:
•
Understand the stages of a Penetration Test
•
Learn the role of Information Gathering inside each stage
•
Understand the differences between Active and Passive Information Gathering
To keep a company’s security posture as
tightly controlled as possible, we should conduct
penetration testing on a regular cadence and after every time there’s a significant shift in the
target’s IT architecture.
A typical penetration test comprises the following stages:
•
Defining the Scope
•
Information Gathering
•
Vulnerability Detection
•
Initial Foothold
•
Privilege Escalation
•
Lateral Movement
•
Reporting/Analysis
•
Lessons Learned/Remediation
In
this Module, we’ll briefly cover
Yüklə
Dostları ilə paylaş: