O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Types of penetration testing

In order to have a successful pen testing activity in place, one needs to map down a process to the whole flow.

There are different types of approaches as well:

  • Black box approach
  • White box approach
  • Gray box approach

The following sections are the most common norms/approaches known for the testing phase.

Black box

In black box approach, the tester is given no knowledge of the underlying infrastructure and performs testing. This is like a shot in the dark and is usually what real-life attacks are; the only drawback is the time constraint to perform the testing, as attackers have a lot of time to plan and prepare their attack; however, a tester does not, and it will impact the financials. The black box approach usually goes ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required