General penetration testing phases
A successful penetration attempt takes place in phases in order to understand or replicate the same need to understand the core competent phases of penetration testing.
The process can be broken down as follows:
- Gathering requirements
- Preparing and planning (phases, objectives, approvals)
- Assessing/detecting the devices and their vulnerabilities
- Actual attack
- Categorization/reporting of vulnerabilities
- Threat management/asset risk rating
- Reporting
Let's understand these processes in brief.
Gathering requirements
In this phase, we gather as much information as we can about our targets, such as identifying the IP address and the port details. Once this is done, more information can be gathered about the type of OS flavor ...
Get Kali Linux Intrusion and Exploitation Cookbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.