© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
J. D. HagarIoT System Testinghttps://doi.org/10.1007/978-1-4842-8276-2_15

15. Internal Security Team Penetration Test Process

Jon Duncan Hagar1  
(1)
Hot Sulphur Springs, CO, USA
 

Chapter 13 noted that most black hat hackers and security people practice penetration (Pen) attacks at many points on a project. Here, I take this type of attack into a Pen test practice. Penetration is how the hacking world thinks, and we testers need to think like them to be most effective. This chapter deals with Pen attacks as a "special case."

The internal penetration process can access development team information that might take a black hat hacker much longer to obtain; however, ...

Get IoT System Testing: An IoT Journey from Devices to Analytics and the Edge now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.