Hello Friends, Now, I am gonna start the tutorial on Penetration Testing. This Tutorial is gonna be for both Beginners and Experts. I will start everything from scratch and it's gonna be very simple and understandable to everyone. So stay tuned to this blog. In this tutorial, firstly we will see the Networking Penetration Testing. As we know, In the present world, everything is connected to the Internet. Every small device and every small piece of information is available over the Internet. Every device is connected to the Internet.
Let's have a slight overview of What is Penetration Testing??
Penetration Testing or we can say it Pen-Testing is a type of Security Testing that is used to find the vulnerabilities, attacks, viruses, threats, and risks that a Hacker can exploit on software applications, networks, web applications, or on our system. The purpose to learn is to find all the vulnerabilities, attacks, threats, risks, etc. on our system, in our environment, to keep ourselves safe and secure. Penetration Testing can also be called Pen Testing.
Let's see why we need Penetration Testing??
Penetration Testing is necessary because
- In the present scenario, the financial sectors like Banks, Investment Banking, Stock Trading Exchanges want their data safe and secure, and Penetration Testing can make it secure.
- In case, a software of a company is hacked and the organization wants their data not to be leaked, penetration testing will help to find the attacker and to secure the data for future reference.
- Proactive Penetration Testing can be the Best SafeGuard.
Types of Penetration Testing:
- Black Box Penetration Testing
- White Box Penetration Testing
- Gray Box Penetration Testing
- In Black Box, a tester/hacker/person has no idea about the systems to be tested. He is just responsible for collecting the info about the targeted network or system.
- In White Box, the tester provides the complete info about the targeted network or device including the structure of IP address, OS details, full source code to attack the network or device. This is can be done by the internal source that can be an Employee(say Internal Source).
- In Gray Box, the tester is provided with partial knowledge about the targeted network or device from the External Sources who have illegal access to an organization's network interface.
#Linux for Absolute Beginners in Hindi
1 Comments
Very informative 👍🏻👍🏻
ReplyDeleteIf you have any doubts, let me know