2. Penetration Testing
2. Penetration Testing
4. Maintaining access
The goal of this stage is to see if the vulnerability can be used to achieve a persistent presence in the exploited
system— long enough for a bad actor to gain in-depth access. The idea is to imitate advanced persistent threats,
which often remain in a system for months in order to steal an organization’s most sensitive data.
5. Analysis
The results of the penetration test are then compiled into a report detailing:
• Specific vulnerabilities that were exploited
• Sensitive data that was accessed
• The amount of time the pen tester was able to remain in the system undetected
• This information is analyzed by security personnel to help configure an enterprise’s WAF settings and other
application security solutions to patch vulnerabilities and protect against future attacks.
7. Role and Responsibilities of Penetration Testers
• Testers should collect required information from the
Organization to enable penetration tests
• Find flaws that could allow hackers to attack a target machine
• Pen Testers should think & act like real hackers albeit ethically.
• Work done by Penetration testers should be reproducible so that
it will be easy for developers to fix it
• Start date and End date of test execution should be defined in
advance.
• A tester should be responsible for any loss in the system or
information during the Software Testing
• A tester should keep data and information confidential
8. Manual Penetration vs. automated penetration testing
Manual Testing requires Excel and other Automation Testing has centralized and
tools to track it standard tools
In Manual Testing, sample results vary In the case of Automated Tests, results do
from test to test not vary from test to test