Tag Archive: Ethical Hacking

Nov 8 2012

Phases of Penetration Testing


Author: admin | Category: Cyber Security, Information Security, Penetration Testing | Leave a Comment

We covered penetration testing, its types and benefits in our previous posts. In this post, we will deal with phases of penetration testing. As already explained, a penetration test should closely mimic the activities of an attacker. The test is carried out typically in three phases, namely: 1. Pre-attack Phase 2. Attack Phase 3. Post-attack…..

Continue Reading
Nov 7 2012

Types of penetration testing


Author: admin | Category: Featured, Information Security, Penetration Testing | Leave a Comment

If we search in internet for types of penetration testing, we may mainly land up in getting two sources of classification as given below: The first source classifies penetration testing as “Internal” and “External” types and they talk about the variations of these types of testing based on the information available to the testing team…..

Continue Reading
Nov 3 2012

What is Penetration Testing / Ethical Hacking?


Author: admin | Category: Featured, Information Security, Penetration Testing | Leave a Comment

Crackers or hackers penetrate into the information system and take away critical data, like passwords, credit card details and financial records by employing powerful tools. Every day we read about these kinds of security breaches from every nook and corner of the world. Companies and organizations are facing tough time and their credibility is at…..

Continue Reading

Categories

Tags

Archives