7 Phase Penetration Testing Methodology

Published: 06 June 2020
on channel: CISO Global
1,447
39

This video covers an example of a "Hacking" or "Penetration Testing" methodology. The high-level penetration testing methodology used in this video is Alpine Security's methodology:

PHASE 1 - PLANNING AND PREPARATION

1.1 Kick-Off Meeting
1.2 Explicit Test Authorization Document Review and Signature
1.3 Rules of Engagement Document Review and Signature

PHASE 2 - RECONNAISSANCE / DISCOVERY

2.1 Passive Reconnaissance
2.2 Active Reconnaissance
2.3 Prioritize Target List

PHASE 3 - VULNERABILITY ENUMERATION / ANALYSIS

3.1 Enumerate Target Vulnerabilities
3.2 Analyze Vulnerabilities
3.3 Map Vulnerabilities to Exploits
3.4 Prioritize Targets to Exploit

PHASE 4 - INITIAL EXPLOITATION

4.1 Compromise Targets
4.2 Gain Consistent Target Access
4.3 Use Compromised Targets for Additional Reconnaissance

PHASE 5 - EXPANDING FOOTHOLD / DEEPER PENETRATION

5.1 Escalate Privileges
5.2 Configure Pivot Point
5.3 Accomplish Objective

PHASE 6 – CLEANUP

6.1 Review Compromised Targets
6.2 Remove Files, Data, and Accounts Used for Exploitation
6.3 Verify System State is Pre-Test

PHASE 7 - REPORT GENERATION

7.1 Analyze Penetration Testing Documentation
7.2 Prioritize Findings
7.3 Write, Review, and Present Report

To schedule a penetration test contact us at:

https://alpinesecurity.com/services/p...

Alpine Security is now a wholly owned member of the CISO Global family of companies.

#cybersecurity #penetrationtesting #hackingmethodology


Watch video 7 Phase Penetration Testing Methodology online without registration, duration hours minute second in high quality. This video was added by user CISO Global 06 June 2020, don't forget to share it with your friends and acquaintances, it has been viewed on our site 1,447 once and liked it 39 people.