What are the Methods Used for Penetration Tests?

Durum
Üzgünüz bu konu cevaplar için kapatılmıştır...

Znéa

Administrator
19 Tem 2011
4,382
59
Bellagio

Tactics used for penetration tests





1. Web Application Audit


SQL Injection Test: Detailed tests of SQL vulnerabilities are performed. (For example: Blind Sql injection, Error Based Sql injection, Timebased sql injection). databases where tests are done MySQL, MsSQL, Oracle, Postgresql etc.


File Inclusion Test: Local and remote file inclusion test on the web application.


CSRF Test: Tests of post data that can create deficits in specific web applications. (For example: It is the control of the weakness by sending auto post data to the web pages, doing specific works such as admin user identification etc. by sending e-mail to the authorized personnel.)


Cookie Check and Hijacking (XSS): If there is a cookie used on the web application and the session data is manipulated with certain methods and attempts such as intrusion etc. are performed. It is tested and reported according to OWASP standards.


2. PCI Security Audit


It is the test of checking the deficiencies and adequacy of the security standards that companies that provide payment cards must carry and check the deficiencies, if any. Reported according to PCI-DSS standards.


3. Database Security Audit


Local Intranet Database Test: These are known or unknown security vulnerability tests on the database engine that are used within the organization. (For example: tests such as TNS poison etc. in Oracle databases.)


4. Wireless Security Audit


WEP / WPA Cracking Test: It tests whether the passwords of Wireless networks or Access points in use in the institution can be broken.​


Jaseger Beacon Test: Creates fake wireless networks with the Beacon flood method and checks whether the internal clients are connected to these networks.

Passive Hijacking Test: It tries to collect information and data on broken wireless networks without being included in the network.


Packet injection Test: It is the users of the wireless network collecting information by injecting customized packets into their data.


5. Social Engineering Test


Phone Test: The phone is a test whether or not information can be obtained from the personnel within the institution by imitating Callerid.


Email Test and Etc: It is a test whether it can be informed from the employees of the institution by email or other method.


6. Web Server Audit


It is a test of vulnerabilities on web servers used in the institution. (For example: Webservers like Apache, Nginx, IIS are the current known or unknown exploit tests.)


7. Network Security Audit


MITM Test: It is the control of whether line listening can be done on the local network with Arp Poison etc. methods.


DNS Spoofing Tests: Controls whether or not local network users can be directed to unreal sites by manipulating DNS packets.


SSL Trip Tests: It is the control whether the traffic to SSL sites can be listened to by changing the ssl certificate or port forwarding by MITM method while logging on the local network users.


Vlan Hopping Test: If there is a vlan structure in the local network, this is the control of whether the vlan structure can be circumvented by vlan hopping methods.

Network Devices Pen Test: These are the penetration tests of other devices such as printers etc. running on the local network.


WPAD Test: It is the control of whether the line can be listened with WPAD security weakness methods on the local network.


SMB Relay Test: Network sharing vulnerability tests in Microsoft systems. Firmware Exploiting Test: These are the checks whether the current firmwares of the network devices located in the local network are exploitable.


Default Password Check: These are the tests whether the passwords of the network devices located in the local network can be cracked.


It also covers vulnerability tests on the operating system and running applications on all computers included in the network.


8. Bluetooth Device Audit


These are open tests on bluetooth devices that users are using.


9. USB / Other Media Exploiting Check


It is the control of attacks on users' computers by using social engineering methods, such as media such as USB or CD.


10. DDOS


SYN Flood Test: Syn Spoofed Flood Load tests for Web Systems.

11. TDOS (Phone2Dos)


Load tests for phone systems.


It can be performed in different tests over many blackbox scenarios that vary according to the institution's need and strategic importance.

Translator: Secret Person
Subject source: https://www.turkhackteam.org/web-server-guvenligi/1069929-penetrasyon-testleri.html
 
Durum
Üzgünüz bu konu cevaplar için kapatılmıştır...
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.