Attack

Common Attack Techniques

The specific attacks a pen test team chooses will depend on the target environment. However, there are common attacks that every chief information security officer (CISO) should worry about. These include: Social engineering, including phishing and malware distribution Injection attacks, including SQL injection, cross-site scripting (XSS), cross-site request forgery (XSRF), and directory traversal Denial of […]

Pentest

Asset categorization

Asset categorization, also known as asset classification, is the process of placing business assets with similar characteristics into the same group. This helps a business shape how it works with each asset, such as how it prioritizes what assets receive the strongest security protections. From the perspective of a pen tester, categorizing assets is a […]

Vulnerability Scanning

Vulnerability Scan

Vulnerabilities are weaknesses that may or may not be exploitable. Known vulnerabilities are categorized and referred to by their Common Vulnerabilities and Exposures (CVE) number. Once you have discovered hosts and open ports, you can conduct a vulnerability scan to see if the services listening on those ports have known vulnerabilities. A vulnerability scan involves […]

Active Reconnaissance

Network Shares

Most organizations make files available on the internal network for users to access. This is typically done through the use of network shares, which are directories that can be accessed by using a network sharing protocol. These network shares might hold sensitive files or information that is otherwise useful to the pen test. On most […]

Hacking 101 Tools

Metasploit

Metasploit is a multi-purpose computer security and penetration testing framework. Intentionally modular, it allows the attacker to mix and match scanners, exploits, and payloads into a single attack. Originally created by H.D. Moore for security analysis, it was later acquired by Rapid7, which added more intuitive, GUI-based commercial versions. Metasploit is considered to be the […]