Home Operation and Maintenance Safety Detailed introduction to penetration testing and vulnerability scanning

Detailed introduction to penetration testing and vulnerability scanning

Nov 28, 2019 pm 05:53 PM
Penetration testing Vulnerability Scan

Detailed introduction to penetration testing and vulnerability scanning

1. Concept

Penetration testing:

There is no standard definition of penetration testing , a common statement reached by some foreign security organizations; an evaluation method to evaluate the security of computer network systems by simulating the attack methods of malicious hackers. This process includes proactive analysis of any weaknesses, technical flaws, or vulnerabilities in the system from a position where an attacker may exist and be in a position to proactively exploit security vulnerabilities.

Penetration testing has two significant characteristics:

1. Penetration testing is a gradual and in-depth process, from shallow to deep, step by step. The heart of the target is the so-called capture drone. 2. On the one hand, penetration testing tests whether the security protection measures of the business system are effective and whether various security policies are implemented from the perspective of the attacker. On the other hand, penetration testing will highlight potential security risks in the form of real events. , after the penetration test is completed, write a penetration test report and feed it back to the customer, and immediately perform security reinforcement to solve the security problems discovered during the test.

Penetration testing classification:

Usually divided into black box testing, white box testing, and gray box testing.

Vulnerability scanning:

Vulnerability scanning, referred to as leakage scanning, refers to detecting the security vulnerabilities of specified remote or local computer systems through scanning and other means based on the vulnerability database. , a security detection that discovers exploitable vulnerabilities.

Missed scanning tools:

We generally use NESSUS, awvs, in our work OpenVAS, NetSparker, OWASP ZAP and other tools.

Vulnerability scanning classification:

Generally divided into network scanning and host scanning.

Through vulnerability scanning, the scanner can discover the configuration information of the remote network or host, the allocation of TCP/UDP ports, the network services provided, the specific information of the server, etc.

Detailed introduction to penetration testing and vulnerability scanning

2. Workflow

General process of penetration testing:

Main There are clear goals, information collection, vulnerability detection, vulnerability verification, information analysis, obtaining required information, information sorting, and forming a test report.

Penetration testing is difficult to operate, and the scope of penetration testing is also targeted and requires human participation. You’ve heard of automated vulnerability scanning, but you’ve never heard of automated penetration testing in the world. During the penetration testing process, information security penetration personnel use a large number of tools and require very experienced experts to conduct testing, which cannot be achieved by training for one or two months.

Vulnerability scanning is to discover existing vulnerabilities in network devices, such as firewalls, routers, switch servers and other applications. The process is automated and mainly targets potential vulnerabilities on the network or application layer. and known vulnerabilities. The vulnerability scanning process does not involve the exploitation of vulnerabilities. Vulnerability scans are performed company-wide, requiring automated tools to handle large volumes of assets. Its scope is wider than penetration testing. Vulnerability scanning products are typically operated by system administrators or security personnel with good networking knowledge, and using these products effectively requires product-specific knowledge.

Vulnerability scanning mainly uses five main technologies: ping scanning, port scanning, OS detection, vulnerability detection, and firewall scanning. Each of these technologies has different goals and principles of application. Ping scanning It works at the Internet layer; port scanning and firewall detection work at the transport layer; OS detection and vulnerability detection work at the Internet test layer, transport layer and application layer. Ping scanning mainly determines the IP address of the host, port scanning detects the open ports of the target host, and then performs OS detection and vulnerability scanning based on the results of the port scanning.

Detailed introduction to penetration testing and vulnerability scanning

Generally large companies will purchase automated vulnerability scanning products and conduct vulnerability scanning regularly every day or every week. It is similar to installing anti-virus software on your computer. You only need to Just scan it and perform anti-virus regularly. Penetration testing is done when new products are launched, or when it is discovered that the company has very important data on the server. For fear of being leaked or stolen, professional security vendors conduct manual penetration testing on a regular basis.

It can be seen that the two do not exist independently, and they need to be used in combination to achieve the best results and ensure the company's information security.

3. Nature

Penetration testing is much more aggressive. It will try to use various technical means to attack the real production environment; on the contrary, vulnerability scanning will only use a non-invasive method. A comprehensive approach to carefully locate and quantify all vulnerabilities in the system.

We can talk about the difference between vulnerability scanning and penetration testing based on cases:

Here we use Nessus as an example to do vulnerability scanning testing, and now the number of IP addresses scanned by Nessus has been Limitation, it seems that only 16 host IPs can be scanned, but as a novice, I got a virtual machine version of Nessus with the help of a friend. First, open https://192.168.205.149:8834 locally. The port for Nessus login is usually 8834. I scanned my virtual machine host locally.

Detailed introduction to penetration testing and vulnerability scanning

The scan results can be exported for local viewing:

Detailed introduction to penetration testing and vulnerability scanning

Detailed introduction to penetration testing and vulnerability scanning

Detailed introduction to penetration testing and vulnerability scanning

The above are the steps for Nessus vulnerability scanning. Generally, the ports opened by the host, running services, system vulnerabilities, overflow vulnerabilities, middleware (lower versions will output medium, high and low vulnerability identification), ssl The problem of low version is that these miss the main output results. As mentioned above, vulnerability scanning is to carefully locate and quantify all vulnerabilities in the system, while penetration testing is to use various attack methods (with authorization) to attack the real environment or test environment. Not limited to social engineering. It takes much more work than vulnerability scanning.

Generally, vulnerability scanning is done on the intranet. The customer gives you a list of host assets, and then you add the IP address of the asset list to the vulnerability scanning device for automated scanning. As for penetration testing (white box, black box, gray box), I mainly do black box testing in penetration testing. Compared to everyone, we all know that the early stage of black box testing is very boring, and you need to find the relevant assets of the target yourself. For example, digging subdomain names, running sensitive directories, scanning ports, etc. The amount of information collected in the early stage will determine the degree of penetration in the later stage. The general penetration test report output format is as follows:

Detailed introduction to penetration testing and vulnerability scanning

4. Consumption cost and time

Compared to what everyone knows about penetration testing Compared with the cost and time of vulnerability scanning, generally speaking, penetration testing requires various preparations in the early stage. The more comprehensive the information assets are collected in the early stage, the deeper the penetration will be in the later stage. It is not only a process from shallow to deep, but also A chain reaction; compared to vulnerability scanning, which takes much less time, vulnerability scanning is generally scheduled and automated.

In short, the best results can be achieved by combining vulnerability scanning and penetration testing to help determine the most suitable control measures for the company, department or practice - both vulnerability scanning and penetration testing are very important. Applied to different purposes, produce different results.

Recommended related articles and tutorials: Web server security

The above is the detailed content of Detailed introduction to penetration testing and vulnerability scanning. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

PHP vulnerability scanning and remediation tips PHP vulnerability scanning and remediation tips May 02, 2024 am 10:15 AM

PHP vulnerability scanning and remediation includes: scanning for vulnerabilities using tools such as Acunetix, Nessus, and BurpSuite. Fix vulnerabilities, such as updating PHP version, installing patches or modifying code. Use security libraries and frameworks. Rescan periodically to confirm the fixes are effective.

Master network security and penetration testing in Go Master network security and penetration testing in Go Nov 30, 2023 am 10:16 AM

With the development of the Internet, network security has become an urgent issue. For technical personnel engaged in network security work, it is undoubtedly necessary to master an efficient, stable, and secure programming language. Among them, Go language has become the first choice of many network security practitioners. Go language, referred to as Golang, is an open source programming language created by Google. The language has outstanding features such as high efficiency, high concurrency, high reliability and high security, so it is widely used in network security and penetration testing.

Explore the potential of Go language in penetration testing Explore the potential of Go language in penetration testing Apr 03, 2024 pm 05:51 PM

Go language has great potential in penetration testing, which is mainly reflected in the following advantages: Parallelization: Go language can run multiple tasks in parallel to improve testing efficiency. Cross-platform: Can run on multiple platforms, expanding the scope of testing. Rich ecosystem: Provides tool libraries for penetration testing, such as BurpSuite and sqlmap. Practical case: It can be used to perform port scanning and try to connect to the specified host and port through net.Dial() to determine whether the port is open.

The whole process of installing metasploit on CentOS and the use of msfconsole The whole process of installing metasploit on CentOS and the use of msfconsole Feb 10, 2024 pm 05:30 PM

LINUX is an open source operating system platform, widely used in various servers and embedded devices. CentOS is an open source distribution built based on Red Hat Enterprise Linux (RHEL) source code and is widely used in enterprise servers and desktop environments. Metasploit is An open source framework for penetration testing and vulnerability exploitation that provides a powerful set of tools and resources for assessing and enhancing the security of your systems. Install CentOS Before installing Metasploit, you first need to install the operating system on CentOS. The following are the steps to install Metasploit on CentOS: 1. Download the CentOS image file: From Ce

Discussion on the application of Go language in penetration testing Discussion on the application of Go language in penetration testing Apr 03, 2024 pm 04:45 PM

The Go language can be used in penetration testing to create custom scanners, automate vulnerability exploits, and reverse engineer malware. In the actual case, Go is used to write a network scanner, define a scanning function, traverse ports to perform scanning, and output port open information.

How to carry out security protection and vulnerability scanning for Java development projects How to carry out security protection and vulnerability scanning for Java development projects Nov 02, 2023 pm 06:55 PM

How to carry out security protection and vulnerability scanning for Java development projects. With the rapid development of the Internet, Java development projects are becoming more and more widely used. However, due to the proliferation of network attacks and vulnerabilities, ensuring the security of Java development projects has become particularly important. This article will introduce how to perform security protection and vulnerability scanning of Java development projects to improve the security of the project. 1. Understand the common types of security vulnerabilities. Before performing security protection and vulnerability scanning on Java development projects, you first need to understand the common types of security vulnerabilities. Common Ja

How to use Go language for efficient penetration testing How to use Go language for efficient penetration testing Apr 04, 2024 am 09:48 AM

Use Go language for efficient penetration testing: Download and install Go: https://go.dev/dl/ Create Go project: gomodinitmy-penetration-testing-tool Install dependencies: gogetgithub.com/projectdiscovery/nuclei/v2/cmd/ nucleigogetgithub.com/projectdiscovery/httpx/cmd/httpx Write code to scan and run the script: gorunmain.go

The development history of network security technology The development history of network security technology Jun 11, 2023 pm 03:41 PM

With the vigorous development of Internet technology, network security has become one of the important factors in the development of global informatization today. With the continuous occurrence of cyber attacks and cyber crimes, protecting network security has become an inevitable choice for us. This article will focus on the development history of network security technology. 1. Cryptozoology Era (1960s-1980s) Network security technology in the cryptography era was mainly developed based on cryptographic ideas. During this period, the computer was just a huge machine, and the use of the Internet was not as widespread as it is now, so limited

See all articles