It can be performed in different approaches depending on testers' knowledge of the infrastructure: Blackbox, Graybox, Whitebox.
The course of the penetration test process will be as follows:
- Gathering information - about the tested object based on the Internet,
- Network mapping - analysis of the computer network of the tested object,
- Vulnerability identification - searching for vulnerabilities based on the obtained information,
- Penetration - gaining unauthorized access to the system,
- Privilege escalation - an attempt to elevate privileges and extend the range of access to the infrastructure,
- Further penetration - obtaining additional information about the system, e.g. running processes, in order to enable further breach of security of individual system components,
- Removal of traces - elimination of all traces of activity in the form of files, logs, system integrity tests, etc, proving that the attack was carried out,
- Preparing a report,
- Verification of corrections made by the customer,
- Preparation of the final report.
Service provided by the CyberSec project.
Do you have questions or do you need detailed information? Email us with questions.