The 8 Phases of Cyber Security Testing
March 28, 2020
Unlike the previous post: The 5 Phases Of Hacking . This procedure mostly resonates with cybersecurity professionals and/or ethical hackers.
1. Scoping
Determining the rules of engagement for the assessment.
2. Reconnaissance
Also known as Information Gathering. Gather Relevant information and enumerate the attack surface.
3. Vulnerability Assessment
Also known as Scanning and Enumeration. Identify vulnerabilities and quantify risk associated.
4. Penetration Test
Also known as Exploitation or Gaining Access. Pop some shells. Exploit identified vulnerabilities.
5. Lateral Movement
Maintain access, pivot and find more data and assets.
6. Artifact Collection/Destruction
Clean users, software, logs, and files used throughout assessment.
7. Reporting/Debriefing
Prepare and Write Report. Communicate test results and remediation steps with client.
8. Securing
Start the remediation process. Secure the vulnerabilities found according to client’s go ahead.
See Also
- How to Create a Simple Personal URL Shortener
- How to Create a Dev Environment in Windows 10: Part 1
- Resources for Building a Beautiful Progressive JAMstack Blog
- Building a Beautiful Progressive JAMstack Blog Part 2: Day 4 to 7
- Building a Beautiful Progressive JAMstack Blog Part 1: Day 1 to 3