logo

Pen Test Methodology Comparisons

   

Added on  2023-01-12

11 Pages2755 Words43 Views
 | 
 | 
 | 
Pen Test Methodology Comparisons
1
Pen Test Methodology Comparisons_1

Contents
INTRODUCTION...........................................................................................................................3
TASK 1............................................................................................................................................3
Critically Compare the Penetration Testing Methodologies.......................................................3
Describe about Statutory and Ethical considerations of penetration tester.................................5
Standard Operating procedures....................................................................................................5
Intelligence Gathering.................................................................................................................7
Vulnerability identification and analysis.....................................................................................7
Target exploitation.......................................................................................................................8
CONCLUSION................................................................................................................................8
REFERENCES..............................................................................................................................10
2
Pen Test Methodology Comparisons_2

INTRODUCTION
Penetrating testing is a process that help for identifying security vulnerabilities in different
computing applications. It is mainly useful for evaluating the system and network with various
malicious methodologies that applied within task. It is also giving prioritizing the risk and fix
them by improving overall security response time. With increasing cyber-attack, many
companies will start on performing various security testing on their software application.
Penetration is one of most common that will identify the vulnerable area of system. it including
wilful attacks on the application system to identify weak area which might provide the passage to
malicious and another unauthorised user. Moreover, Penetration testing will help for evaluating
the capacity of system and defence unexpected malicious attacks. The report will discuss about
the different type of penetration testing methodologies that will support for identifying threats. It
will describe about statutory and ethical considerations for improving moral values. There are
different techniques which help for analysing and gathering vulnerabilities such as decision-
making tree, it will consider the target exploitation.
TASK 1
Critically Compare the Penetration Testing Methodologies.
Penetration testing plays important role of identifying, rectifying and understanding the
vulnerabilities in the business computing application. By using Pen test, it can utilise opportunity
to identify potential attackers, who will target the application system. Sometimes, it can be
evaluating the system for gathering large amount of information relates malicious (Bian and
et.al., 2020). Main purpose is to apply penetrating testing methodologies as per requirement. it
will try to gain unauthorised access within system.
Penetration testing methodologies are evolved the function of IT infrastructure of many
business. It wings expanding to different inter-departmental concern such as web application
security. Penetration testing methodologies are classified into different groups: black box, grey
box and white box testing.
3
Pen Test Methodology Comparisons_3

Differentiate between Penetration Testing Methodologies
Black Box testing White Box testing Grey Box testing
This type of testing is
concern about the
internal working
structure of
application. So as
require GUI for
identifying multiple
test cases.
The knowledge of
internal working
structure is an essential
for box testing. It
always concerns about
input and output.
The testing is
knowledge about the
internal working
structure which
require for particular
input and output
generation.
Black box testing is
also known as
functional testing
because it can easily
monitor internal
functionality
(Boussahaba and
et.al., 2020).
It is also known as
structural testing
because it mainly
control overall
structure and test
vulnerabilities.
Grey box testing is
known as translucent
testing where tested
has limited
knowledge about
coding.
This type of approach
towards testing which
may include trial
technique and error
guessing method
because many testers
doesn’t require
internal coding of
application.
White box testing is a process
for verifying system
boundaries and data domain.
There is no lack of internal
coding and their knowledge
(Diebe and et.al., 2020)
Tester have
knowledge of coding
which easily
validating data and
overall internal
system (Bian and
et.al., 2020).
Black box testing is
not considered
algorithm.
It is well suitable and
recommended for
using algorithm in
It is not used for
algorithm testing.
4
Pen Test Methodology Comparisons_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Top 5 Penetration Testing Methodologies and Standards
|11
|2477
|29

What is Penetration Testing and How Does It Work? -
|12
|2793
|15

Penetration Testing Report And Management
|12
|2862
|10

Statutory And Legal Consideration Report
|13
|2609
|17

Penetration Testing
|14
|3069
|417

Computer Science and Security | Task Report
|43
|3989
|16