Penetration Testing
A penetration test (pen test) is an authorized simulated attack performed on a computer system to evaluate its security. Penetration testers use the same tools, techniques, and processes as attackers to find and demonstrate the business impacts of weaknesses in a system. Penetration tests usually simulate a variety of attacks that could threaten a business. They can examine whether a system is robust enough to withstand attacks from authenticated and unauthenticated positions, as well as a range of system roles. With the right scope, a pen test can dive into any aspect of a system.
What are the benefits of penetration testing?
Ideally, software and systems were designed from the start with the aim of eliminating dangerous security flaws. A pen test provides insight into how well that aim was achieved. Pen testing can help an organization.
- Find weaknesses in systems
- Determine the robustness of controls
- Support compliance with data privacy and security regulations (e.g., PCI DSS, HIPAA, GDPR)
- Provide qualitative and quantitative examples of current security posture and budget priorities for management
What are the types of pen testing tools?
There is no one-size-fits-all tool for pen testing. Instead, different targets require different sets of tools for port scanning, application scanning, Wi-Fi break-ins, or direct penetration of the network. Broadly speaking, the types of pen testing tools fit into five categories.
- Reconnaissance tools for discovering network hosts and open ports
- Vulnerability scanners for discovering issues in-network services, web applications, and APIs.
- Proxy tools such as specialized web proxies or generic man-in-the-middle proxies.
- Exploitation tools to achieve system footholds or access to assets.
- Post exploitation tools for interacting with systems, maintaining and expanding access, and achieving attack objectives.