
Martin Hořický
Penetration tests are popularly described as simulating an attack against a specified IT area. The subject of a penetration test is always a certain isolated part of a company’s IT ecosystem, such as a web application, mobile application, desktop application, or network infrastructure.
The biggest weakness of penetration tests lies precisely in isolation. As a result of periodic execution of these tests, information can be that all security risks have been reduced to an acceptable level and the tested system is resistant to attacks.
So, the main reason why penetration tests are essential to an organisation's security is because they help personnel learn how to handle any type of hacker attack. Penetration tests allow you to determine whether your network environment is truly resilient. Through testing, we look for weaknesses in the system and potential targets of a hacker attack. This helps our clients protect their networks from external threats.
In the pre-penetration testing phase, the tester and the client define the scope of the penetration test, such as what systems will be tested, what methods the tester will be using, and what the other objectives and legal implications are.
The survey requires the tester to gather as much information as possible about the test subject, including information about personnel, technology and systems.
After gathering sufficient information about the client's system, the testers begin to model the real threats that the client will might face and then scan for relevant system vulnerabilities that would typically be targeted by these attacks.
In this phase, all identified vulnerabilities are exploited in accordance with the scope specified in the pre-engagement phase.
After the testing period or after all relevant systems have been exploited, all testing methods and vulnerabilities - including associated devices, ports or personnel - are logged.
The tester creates a penetration testing report for the client that describes the methods used, vulnerabilities exploited, remediation measures, and other important information.
After the client has had time to resolve the vulnerabilities listed in the initial report, the tester can go back and perform the same penetration tests on the client's system to verify that the vulnerabilities have been resolved. This phase is not as common, but may be requested by the client.
The goal is to verify whether an organisation's information system can be penetrated. The tester uses the means and methods most quickly leading to the goal.
The output of the test is a final report that includes:
There are three main strategic approaches to penetration testing, each involving different steps and tools. The main differences in these approaches relate to the extent of the attacker's theoretical knowledge of the target system or network.
Martin Hořický