Penetration Test (pen testing) Processes
Penetration Test (pen testing) Processes include: Gathering Passive information; Port scanning; Network equipment types and its description; Determining the types of operating systems used in network infrastructure; Types of adjacent peripherals in the network infrastructure; Defining special device types and combinations; Gathering the information received and its analysis; Defining “entry points”; Defining attack vectors; Attempt […]
Penetration Test (pen testing) Processes Read More »