Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Kali Linux Intrusion and Exploitation Cookbook

You're reading from   Kali Linux Intrusion and Exploitation Cookbook Powerful recipes to detect vulnerabilities and perform security assessments

Arrow left icon
Product type Paperback
Published in Apr 2017
Publisher
ISBN-13 9781783982165
Length 512 pages
Edition 1st Edition
Arrow right icon
Authors (2):
Arrow left icon
Dhruv Shah Dhruv Shah
Author Profile Icon Dhruv Shah
Dhruv Shah
Ishan Girdhar Ishan Girdhar
Author Profile Icon Ishan Girdhar
Ishan Girdhar
Arrow right icon
View More author details
Toc

Table of Contents (18) Chapters Close

Title Page
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Customer Feedback
Preface
1. Getting Started - Setting Up an Environment FREE CHAPTER 2. Network Information Gathering 3. Network Vulnerability Assessment 4. Network Exploitation 5. Web Application Information Gathering 6. Web Application Vulnerability Assessment 7. Web Application Exploitation 8. System and Password Exploitation 9. Privilege Escalation and Exploitation 10. Wireless Exploitation Pen Testing 101 Basics

Objectives of penetration testing


The objectives of testing are very simple and straightforward; a penetration test gives the executives, architects, and product managers 360-degree birds-eye view of the security posture of the organizations. Penetration testing also helps the decision makers in understanding what an actual attack will look like and what will be its impact on business, revenue, and goodwill. The process involves rigorous analysis of security, technical, and operational countermeasures for any potential vulnerability that ranges from poor to improper configuration to network, to hardware, firmware, or software flaws. It also helps in focusing on what's important by narrowing down the security risk and knowing how effective the current security measures are. There are other principle reasons as well:

  • As a starting point: To fix a problem, you need to first identify it. This is exactly what a penetration test does; it helps identify the problem and where it lies. It helps you understand where a breach is possible and what the exact reason for a possible breach is so that organizations can come up with an action plan to mitigate these security issues in future.
  • Prioritizing the risk: Identifying the security issues is the primary objective of a penetration test. After learning that security issues exist, it also helps in prioritizing the security issues raised based on their impact and severity.
  • Improving the overall security of the organization: Penetration testing not only helps identify technical security issues, it also helps identify the non-technical issues, such as how soon an attack can be identified, what actions can be taken if identified, how it is being escalated, to whom it is being escalated, and what to do in the event of a breach. It gives an idea of what an actual attack will look like. It also helps identify whether a gap is a technical gap or non-technical gap, such as users clicking on phishing e-mail giving access to attacks directly to their laptops, defeating all the network security devices and rules in firewall. This shows lack of employee security information training.
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image