Open In App

Reconnaissance – Penetration Testing

Prerequisites :

  1. Ethical Hacking | Footprinting
  2. Penetration TestingSoftware Testing

Penetration Testing (or Pen Testing)

It refers to process of testing an organization’s security posture using similar techniques and tools to that of an attacker but with the knowledge and approval of the organization. Reconnaissance or Footprinting is the first step in the pen testing process. Performing the systematic enables a pen tester to discover potential security liabilities that an attacker may exploit. In pen testing measure, the pen analyzer goes about as a malignant pariah and reenacts an assault to discover security escape clauses.

Reconnaissance

pen test It helps in determining an organization’s information on the Internet such as network architecture, operating systems, applications, and users. Cyber-security analyzer attempts to assemble openly accessible delicate data of a target by claiming to be a hacker or an attacker. The target might be a particular host or an organization. Pen-testers can play out similar assaults as an assailant. Pen-tester should attempt all potential manners by which to accumulate however much data as could be expected to guarantee the most extreme extent of footprinting pen-testing. On the off chance that the pen-tester discovers touchy data on any freely accessible data asset, that data ought to be accounted for by the association.



Footprinting pen testing helps the organization to :

Reconnaissance Pen-Testing Steps :

Pen-testing is a way to look at network security. Steps in procedure should be followed in order, to ensure maximum scope of testing. Steps involved in Reconnaissance are :



Conclusion :

Pen testing helps an organization to enhance its security perimeter. A pentester should always gather sensitive information such as server details, OS, and so on of target organization by conducting reconnaissance. Analyze system and network defenses by breaking into its security with authorization without causing any damage. Discover provisos and shortcomings in organization or framework security and show them alongside particular countermeasures in a pen-testing report. Significantly, pen testing report results from network infiltration tests or security reviews. It contains all subtleties, for example, kinds of tests played out, hacking methods utilized, and aftereffect of hacking action. Moreover, report additionally contains features of security dangers and weaknesses of an association. Continuously keep report classified. If this information falls into hands of an attacker, information in report could be used to launch attacks.

Article Tags :