当前位置:网站首页>1、 Relevant theories and tools of network security penetration testing
1、 Relevant theories and tools of network security penetration testing
2022-07-04 06:19:00 【Dear, Ting】
One 、 What is network security penetration testing ?
Famous movies in America 《 do a quick change 》 in , Thunder · Breslin is one of the strongest prison break masters in the world , He's in the past 8 Successfully from 14 Escaped from the heavily guarded prison . even so , Thunder · Breslin is not a criminal , His real identity is a prison security expert of the national security agency . Thunder · Breslin went to prison as a criminal , Look for loopholes in the prison . And every time he successfully escaped from prison , It means that he has found the loophole in the prison security . Of course, ray · Breslin's purpose is not to destroy , But to ensure that every prisoner in prison cannot escape . Every time he successfully escaped from prison , Will make the prison stronger , So he is a legal jailbreak .
1、 Four major aspects
1. The concept of network security penetration testing .
2. The executive standard of network security penetration test .
3. Common tools for network security penetration testing .
4. Preparation of network security penetration test report .2、 The concept of network security penetration testing
1. Black box testing is also called external testing
2. White box testing is also called internal testing
3. Use white box test and black box test together , It's the gray box test 3、 The goal of network security penetration testing
1. Network devices
2. Physical security
3. operating system
4. Applications
5. Management system 4、 Characteristics of network security penetration test
1. Network security penetration testing is a business behavior , The customer should take the initiative , And give authorization permission before .
2. The goal of network security penetration testing must be evaluated as a whole , Analyze as comprehensively as possible .
3. The purpose of network security penetration test is to improve users' network security mechanism .Two 、 The executive standard of network security penetration test
There is 7 Stages :
1. The communication stage with customers
2. Intelligence gathering stage
3. Threat modeling phase
4. Vulnerability analysis stage
5. Vulnerability exploitation stage
6. Post penetration attack stage
7. Reporting stage 1、 Communication phase
1. The goal of penetration testing
2. The method used in the penetration test process
3. Conditions required for conducting penetration tests
4. Limitations during penetration testing
5. Duration of penetration test process
6. The cost of penetration testing
7. The expected goal of the penetration test process 2、 Collection phase
1. Passive scanning
2. Active scanning 3、 Threat modeling
At this stage, the following issues are mainly considered :
1、 Which assets are important in the target .
2、 The technology and means used in the attack .
3、 Which groups may cause damage to the target system .
4、 What methods will these groups use to destroy .
4、 Vulnerability analysis
This stage is the process of discovering vulnerabilities from the target . The vulnerability may be located anywhere in the target , From server to switch , From the operating system used to Web Applications are the objects we want to check . At this stage, we will find the target operating system according to the previous intelligence collection 、 Open ports and service programs , Find and analyze vulnerabilities in the target system .
5、 Exploit
After finding the vulnerability on the target , You can use the vulnerability penetration program to test the target system . At this stage , Our focus is on , How to bypass the security mechanism of the target to control the target system or access the target resources . If we successfully completed the task in the last stage , Then this stage can be carried out accurately and smoothly . The penetration test at this stage should have an accurate range . The main goal of vulnerability exploitation is to obtain the important assets we previously evaluated . Finally, the probability of success and the greatest possible impact on the target should also be considered when carrying out infiltration .
6、 Post penetration
This stage is closely connected with the previous stage , As a penetration tester , We must try our best to simulate the possible consequences after the target is infiltrated .
The tasks that may be completed at this stage include the following :
Control permission promotion .
Theft of login credentials .
Access to important information .
Use goals as a springboard .
Establish long-term control channels .
7、 Reporting stage
This stage is the last stage of the whole penetration test stage , At the same time, it is also a stage that can best reflect the results of our work , We will submit all the previous findings to the customer in writing . actually , This report is also the only demand of customers . We must report the problems in the test objectives to the customers in the form of simple and direct and try to avoid a large number of professional terms , And possible risks . This report should point out the most important threats to the target system 、 Tables and icons generated using penetration data , And the repair plan for the problems of the target system 、 Suggestions for improving the current security mechanism .
3、 ... and 、 Common tools for network security penetration testing :
1.Nmap
2.Maltego
3.Recon-NG
4.OpenVAS
5.Metasploit
6.SET
7.Ettercap
8.Burpsuite
9.Wireshark
Four 、 Preparation of network security penetration test report
The last and most important stage of penetration testing is report preparation . As a qualified penetration tester, he should have good report writing ability . The penetration tester should ensure the professionalism of the report when writing the test , However, the final readers of this report are often managers who do not have professional domain knowledge , Therefore, it is necessary to avoid using too professional terms , And easy to understand .
summary :
What is network security penetration testing , And how to carry out network security penetration testing . Mastering the standards of penetration test is of great help to our later study . If you want to have a deeper understanding of the network security penetration test standards explained in this chapter , You can visit the website pentest-standard, Here is a very detailed introduction to penetration testing 7 Stages .
边栏推荐
- Steady! Huawei micro certification Huawei cloud computing service practice is stable!
- Notes and notes
- The solution of win11 taskbar right click without Task Manager - add win11 taskbar right click function
- 2022.7.2-----leetcode.871
- 4G wireless all network solar hydrological equipment power monitoring system bms110
- 如何实现视频平台会员多账号登录
- Cloud native - SSH article that must be read on the cloud (commonly used for remote login to ECS)
- Learn about the Internet of things protocol WiFi ZigBee Bluetooth, etc. --- WiFi and WiFi protocols start from WiFi. What do we need to know about WiFi protocol itself?
- JSON Web Token----JWT和傳統session登錄認證對比
- 《ClickHouse原理解析与应用实践》读书笔记(4)
猜你喜欢
![[microservice] Nacos cluster building and loading file configuration](/img/50/7af220c57a06eb186729c9882d9dab.png)
[microservice] Nacos cluster building and loading file configuration

Compound nonlinear feedback control (2)

win10清除快速访问-不留下痕迹

Arcpy uses the updatelayer function to change the symbol system of the layer

云原生——上云必读之SSH篇(常用于远程登录云服务器)

Weekly summary (*63): about positive energy

树形dp

AWT introduction

C實現貪吃蛇小遊戲

Bicolor case
随机推荐
C réaliser des jeux de serpents gourmands
Uninstall Google drive hard drive - you must exit the program to uninstall
JSON Web Token----JWT和傳統session登錄認證對比
buuctf-pwn write-ups (8)
Considerations for testing a website
Compound nonlinear feedback control (2)
Vant --- detailed explanation and use of list component in vant
Internet of things protocol ZigBee ZigBee module uses the concept of protocol stack
Configure cross compilation tool chain and environment variables
Reading notes of Clickhouse principle analysis and Application Practice (4)
MySQL installation and configuration
How to realize multi account login of video platform members
Learning multi-level structural information for small organ segmentation
SQL injection SQL lab 11~22
C language - Blue Bridge Cup - Snake filling
Notes and notes
After the festival, a large number of people change careers. Is it still time to be 30? Listen to the experience of the past people
The width of the picture in rich text used by wechat applet exceeds the problem
双色球案例
Design and implementation of redis 7.0 multi part AOF