Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

Penetration Testing vs Other Security Testing

I do not know the difference between penetration testing and other forms of security testing. Could anyone experienced in that area tell me the differnces? I would really appreciate it. On the side note, is there any testing that simulates DoS? I do not know how to defend against it.

like image 746
Petr Avatar asked Jun 25 '10 06:06

Petr


People also ask

What is the difference between security testing and penetration testing?

Security testing reports come with a list of potential vulnerabilities and some security recommendations. Penetration Testing reports are significantly more detailed with risk scores, and guidance for remediation.

Is penetration testing part of security testing?

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.

What are the 3 types of penetration testing?

To uncover the vulnerabilities which can be found in type or kind of Web Application, there are three types of Pen Testing which can be used, which are as follows: Black Box Testing; White Box Testing; Gray Box Testing.


1 Answers

I am penetration tester, and i'm happy to answer this question.

Penetration testing is a usually a form of black box security testing. In a pen test you are trying to break into the server as many times as possible and report back on how they where able to break in. This is often done multiple times to make sure that the patches hold water. This is an important type of security testing because its as real world as it gets. Regular penetration testing is a requirement of the PCI-DSS. Common tools for web application penetration testing are Acunetix($), NTOSpider($$$), w3af(open source) and Wapiti(Open Source). For other types of penetration testing it is common to use Metasploit(open source), OpenVAS(open source), NMAP and THC-Hydra.

By contrast in it white box testing you have full access to the source code. You can enable drugging on the application to get better test results from scanners like Acuenetix. You can also use Source Code Analysis Tools such as RATS(Open Source) and Coverity($$$$$).

There are 2 different forms of Denial Of Service attacks. The most simple is a Distributed Denial of service attack in which the hacker is using a bot net to flood your server with traffic. This traffic could be an ICMP Ping, or even a simple HTTP GET request. Cisco has a number of very expensive products to help prevent this type of attack.

Another form of Denial Of Service is when there is a problem with the server its self. When this type of security flaws are found its often given a CVE number becuase it is a violation of CWE-400. This is commonly due to an arithmetic overflow or stack/heap based memory corruption (a buffer overflow or dangling pointer). To prevent these types of attacks you should make sure that your software is up to date. Its not often that an 0-day DoS attack is used in the wild.

like image 141
rook Avatar answered Oct 16 '22 15:10

rook