What is Penetration Testing?
Information in This Chapter:
Introduction to Kali and Backtrack Linux: Tools. Lots of Tools
Working with Your Attack Machine: Starting the Engine
The Use and Creation of a Hacking Lab
Methodology: Phases of a Penetration Test
Introduction
Penetration testing can be defined as a legal and authorized attempt to locate and
successfully exploit computer systems for the purpose of making those systems
more secure. The process includes probing for vulnerabilities as well as
providing proof of concept attacks to demonstrate the vulnerabilities are real.
Proper penetration testing always ends with specific recommendations for
addressing and fixing the issues that were discovered during the test. On the
whole, this process is used to help secure computers and networks against future
attacks. The general idea is to find security issues by using the same tools and
techniques as an attacker. These findings can then be mitigated before a real
hacker exploits them.
Penetration testing is also known as
Pen testing
PT
Hacking
Ethical hacking
White hat hacking
Offensive security
Red teaming.
It is important to spend a few moments discussing the difference between
penetration testing and vulnerability asses