Wednesday, 13 June 2018

Everything You Need To Know About Penetration Testing

What Are The Possible Causes Of Vulnerabilities?

·         Errors that may be caused during design and development phase
·         Incorrect system configuration
·         Human mistakes

Advantages Of Penetration Testing:

·         Effectively take care of susceptibilities
·         Reduces the cost associated with the network downtime
·         Meet regulatory demands and curb fines
·         Capability to maintain a positive image of the organization
·         Assess network efficiency
·         Upgrading existing infrastructure may lead to vulnerabilities which can be identified by pen testing.

Scanning Tools

A pen tester scans the target machine in order to find the weakness in the systems. The 2 main activities of the scanning phase are port scanning and vulnerability scanning.

Port scanning helps to identify a list of opened ports in the target and based on the list of ports you can determine what kinds of services are running in the system.


The next step in scanning is to run a vulnerability scan to recognize the particular weakness in the software and services running in the servers.

No comments:

Post a Comment