Monday, October 27, 2025
No Result
View All Result
Ajoobz
Advertisement
  • Home
  • Bitcoin
  • Crypto Updates
    • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Scam Alert
  • Regulations
  • Analysis
Marketcap
  • Home
  • Bitcoin
  • Crypto Updates
    • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Scam Alert
  • Regulations
  • Analysis
No Result
View All Result
Ajoobz
No Result
View All Result

Penetration testing methodologies and standards

2 years ago
in Blockchain
Reading Time: 6 mins read
0 0
A A
0
Home Blockchain
Share on FacebookShare on TwitterShare on E-Mail


The web area continues to develop quickly, opening extra alternatives for cyberattacks to happen inside a pc system, community, or internet utility. To mitigate and put together for such dangers, penetration testing is a obligatory step find safety vulnerabilities that an attacker would possibly use.

What’s penetration testing?

A penetration take a look at, or “pen take a look at,” is a safety take a look at that’s run to mock a cyberattack in motion. A cyberattack could embrace a phishing try or a breach of a community safety system. There are several types of penetration testing accessible to a corporation relying on the safety controls wanted. The take a look at might be run manually or with automated instruments by the lens of a particular plan of action, or pen testing methodology.

Why penetration testing and who’s concerned?

The phrases “moral hacking” and “penetration testing” are typically used interchangeably, however there’s a distinction. Moral hacking is a broader cybersecurity area that features any use of hacking expertise to enhance community safety. Penetration checks are simply one of many strategies moral hackers use. Moral hackers might also present malware evaluation, threat evaluation, and different hacking instruments and methods to uncover and repair safety weaknesses moderately than trigger hurt.

IBM’s Value of a Information Breach Report 2023 discovered the worldwide common price of a knowledge breach in 2023 to be USD 4.45 million, a 15% improve over 3 years. One solution to mitigate these breaches is by performing correct and pointed penetration testing.

Firms rent pen testers to launch simulated assaults in opposition to their apps, networks, and different belongings. By staging pretend assaults, penetration testers assist safety groups uncover crucial safety vulnerabilities and enhance general safety posture. These assaults are sometimes carried out by purple groups, or offensive safety groups. The purple crew simulates an actual attackers’ ways, methods and procedures (TTPs) in opposition to the group’s personal system as a solution to assess safety threat.

There are a number of penetration testing methodologies to contemplate as you get into the pen testing course of. The group’s alternative will depend upon the class of the goal group, the purpose of the pen take a look at and the scope of the safety take a look at. There isn’t a one-size-fits-all method. It requires a corporation to grasp its safety points and safety coverage for there to be a good vulnerability evaluation previous to the pen testing course of.

Watch pen testing demos from X-Drive

5 high penetration testing methodologies

One of many first steps within the pen testing course of is deciding on which methodology to comply with.

Under, we’ll dive into 5 of the preferred penetration testing frameworks and pen testing methodologies to assist information stakeholders and organizations to the very best technique for his or her particular wants and guarantee it covers all required areas.

1. Open-Supply Safety Testing Methodology Guide

Open-Supply Safety Testing Methodology Guide (OSSTMM) is likely one of the hottest requirements of penetration testing. This technique is peer-reviewed for safety testing and was created by the Institute for Safety and Open Methodologies (ISECOM).

The strategy relies on a scientific method to pen testing with accessible and adaptable guides for testers. The OSSTMM contains key options, reminiscent of an operational focus, channel testing, metrics and belief evaluation in its methodology.

OSSTMM supplies a framework for community penetration testing and vulnerability evaluation for pen testing professionals. It’s meant to be a framework for suppliers to search out and resolve vulnerabilities, reminiscent of delicate knowledge and points surrounding authentication.

2. Open Internet Utility Safety Undertaking

OWASP, brief for Open Internet Utility Safety Undertaking, is an open-source group devoted to internet utility safety.

The non-profit group’s purpose is to make all its materials free and simply accessible for anybody who desires to enhance their very own internet utility safety. OWASP has its personal High 10 (hyperlink resides outdoors of ibm.com), which is a well-maintained report outlining the most important safety considerations and dangers to internet purposes, reminiscent of cross-site scripting, damaged authentication and getting behind a firewall. OWASP makes use of the highest 10 checklist as a foundation for its OWASP Testing Information. 

The information is split into three elements: OWASP testing framework for internet utility growth, internet utility testing methodology and reporting. The net utility methodology can be utilized individually or as part of the net testing framework for internet utility penetration testing, cell utility penetration testing, API penetration testing, and IoT penetration testing.

3. Penetration Testing Execution Normal

PTES, or Penetration Testing Execution Normal, is a complete penetration testing technique.

PTES was designed by a crew of knowledge safety professionals and is made up of seven principal sections overlaying all features of pen testing. The aim of PTES is to have technical tips to stipulate what organizations ought to count on from a penetration take a look at and information them all through the method, beginning on the pre-engagement stage.

The PTES goals to be the baseline for penetration checks and supply a standardized methodology for safety professionals and organizations. The information supplies a spread of assets, reminiscent of finest practices in every stage of the penetration testing course of, from begin to end. Some key options of PTES are exploitation and put up exploitation. Exploitation refers back to the means of having access to a system by penetration methods reminiscent of social engineering and password cracking. Put up exploitation is when knowledge is extracted from a compromised system and entry is maintained.

4.  Info System Safety Evaluation Framework

Info System Safety Evaluation Framework (ISSAF) is a pen testing framework supported by the Info Programs Safety Group (OISSG).

This technique is not maintained and is probably going not the very best supply for probably the most up-to-date data. Nevertheless, certainly one of its principal strengths is that it hyperlinks particular person pen testing steps with particular pen testing instruments. The sort of format generally is a good basis for creating an individualized methodology.

5. Nationwide Institute of Requirements and Know-how  

NIST, brief for the Nationwide Institute of Requirements and Know-how, is a cybersecurity framework that gives a set of pen testing requirements for the federal authorities and out of doors organizations to comply with. NIST is an company throughout the U.S. Division of Commerce and must be thought-about the minimal customary to comply with.

NIST penetration testing aligns with the steerage despatched by NIST. To adjust to such steerage, organizations should carry out penetration checks following the pre-determined set of tips.

Pen testing phases

Set a scope

Earlier than a pen take a look at begins, the testing crew and the corporate set a scope for the take a look at. The scope outlines which programs will probably be examined, when the testing will occur, and the strategies pen testers can use. The scope additionally determines how a lot data the pen testers may have forward of time.

Begin the take a look at

The following step could be to check the scoping plan and assess vulnerabilities and performance. On this step, community and vulnerability scanning might be achieved to get a greater understanding of the group’s infrastructure. Inside testing and exterior testing might be achieved relying on the group’s wants. There are a selection of checks the pen testers can do, together with a black-box take a look at, white-box take a look at, and gray-box take a look at. Every supplies various levels of details about the goal system.

As soon as an outline of the community is established, testers can begin analyzing the system and purposes throughout the scope given. On this step, pen testers are gathering as a lot data as attainable to grasp any misconfigurations.

Report on findings

The ultimate step is to report and debrief. On this step, you will need to develop a penetration testing report with all of the findings from the pen take a look at outlining the vulnerabilities recognized. The report ought to embrace a plan for mitigation and the potential dangers if remediation doesn’t happen.

Pen testing and IBM

In case you attempt to take a look at every little thing, you’ll waste your time, price range and assets. By utilizing a communication and collaboration platform with historic knowledge, you possibly can centralize, handle, and prioritize high-risk networks, purposes, gadgets, and different belongings to optimize your safety testing program. The X-Drive® Crimson Portal allows everybody concerned in remediation to view take a look at findings instantly after vulnerabilities are uncovered and schedule safety checks at their comfort.

Discover community penetration testing companies from X-Drive

Was this text useful?

SureNo

Content material Author, IBM Consulting



Source link

Tags: methodologiesPenetrationStandardsTesting
Previous Post

Musee d’Orsay to Spotlight DJ Agoria at First NFT Exhibition

Next Post

Could 2024 be XR’s Mainstream Moment, or will it be Another Metaverse Crash?

Related Posts

American Bitcoin Corp Nears 4,000 BTC Milestone in Strategic Accumulation
Blockchain

American Bitcoin Corp Nears 4,000 BTC Milestone in Strategic Accumulation

3 hours ago
TRX Price Prediction: TRON Targets alt=
Blockchain

TRX Price Prediction: TRON Targets $0.35-$0.62 Despite Current Oversold Conditions

2 days ago
Peter Schiff and CZ to Debate Gold vs Bitcoin’s Future as Money
Blockchain

Peter Schiff and CZ to Debate Gold vs Bitcoin’s Future as Money

3 days ago
OpenAI Acquires Sky to Bring Smarter AI to Mac Users
Blockchain

OpenAI Acquires Sky to Bring Smarter AI to Mac Users

3 days ago
Is this the sign crypto needed
Blockchain

Is this the sign crypto needed

3 days ago
DOE Seeks Faster Grid Access for AI and Crypto Miners
Blockchain

DOE Seeks Faster Grid Access for AI and Crypto Miners

3 days ago
Next Post
Could 2024 be XR’s Mainstream Moment, or will it be Another Metaverse Crash?

Could 2024 be XR's Mainstream Moment, or will it be Another Metaverse Crash?

Crypto Needs Cohesive Regulation – A Look at Europe’s MiCA

Crypto Needs Cohesive Regulation – A Look at Europe’s MiCA

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[ccpw id="587"]
  • Disclaimer
  • Cookie Privacy Policy
  • Privacy Policy
  • DMCA
  • Terms and Conditions
  • Contact us
Contact us for business inquiries: cs@ajoobz.com

Copyright © 2023 Ajoobz.
Ajoobz is not responsible for the content of external sites.

No Result
View All Result
  • Home
  • Bitcoin
  • Crypto Updates
    • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Scam Alert
  • Regulations
  • Analysis

Copyright © 2023 Ajoobz.
Ajoobz is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In