PT- unit 1 notes
PT- unit 1 notes
While blue teams defend and red teams attack, both work together to improve
security. Red team findings help blue teams identify and prioritize weaknesses to
fix, while blue teams' defenses challenge red teams to innovate and find new ways
to breach defenses.
The iterative process of red teaming followed by blue team response and improvement
leads to a more resilient security posture over time.
Strategies of Testing,
In penetration testing (pen testing), there are several strategies and
methodologies that testers employ to effectively identify and exploit
vulnerabilities within an organization's systems, networks, and applications. These
strategies help ensure thorough coverage and accurate assessment of security
posture.
Here are some common strategies used in penetration testing:
1. Black Box Testing:
* In black box testing, the penetration tester has little to no prior knowledge
of the target environment. This simulates an external attacker who has no insider
information about the systems. It helps in identifying vulnerabilities that are
visible from an external perspective.
2. White Box Testing:
* White box testing, also known as clear box testing or transparent testing,
provides the penetration tester with full knowledge of the internal workings and
architecture of the systems being tested. This allows for a more in-depth
assessment of vulnerabilities that might not be easily discoverable from an
external perspective.
3. Gray Box Testing:
* Gray box testing strikes a balance between black box and white box testing.
The tester has partial knowledge of the internal workings of the systems, typically
provided by the organization's IT or security team. This approach helps simulate an
attack scenario where an insider threat or a compromised insider may be involved.
4. Internal Testing:
* Internal testing focuses on assessing the security of systems and networks
from within the organization's internal network. It simulates attacks that could
occur from employees, contractors, or others who have legitimate access to internal
resources.
5. External Testing:
* External testing evaluates the security of systems and networks from an
external perspective, as would be the case with malicious attackers attempting to
exploit vulnerabilities over the internet. It includes testing web applications,
email servers, VPNs, and other externally accessible systems.
6. Targeted Testing:
* Targeted testing involves focusing on specific systems, applications, or areas
of concern identified by the organization or based on the results of initial
reconnaissance and vulnerability scanning. It allows for a more concentrated effort
on critical assets or areas with higher risk.
7. Compliance Testing:
* Compliance testing ensures that the organization meets specific regulatory
requirements or industry standards (e.g., PCI DSS, HIPAA). It verifies that
security controls and processes are implemented correctly to protect sensitive data
and comply with legal obligations.
8. Social Engineering Testing:
* Social engineering testing assesses the effectiveness of security controls
against human vulnerabilities. It involves techniques such as phishing emails,
phone calls, or physical entry attempts to manipulate individuals into revealing
sensitive information or granting unauthorized access.
9. Blended Testing:
* Blended testing combines multiple testing strategies and methodologies to
provide a comprehensive assessment of an organization's security posture. For
example, it might include a combination of external and internal testing, along
with social engineering techniques.
10. Continuous Testing:
* Continuous testing integrates penetration testing into an organization's
ongoing cybersecurity program. It involves regular assessments to detect and
mitigate new vulnerabilities as they arise, ensuring that security defenses remain
robust over time.
4. **NIST SP 800-115**
- **Overview**: Provides guidelines for organizations to conduct penetration
testing.
- **Phases**:
- Planning: Defining objectives, scope, and rules of engagement.
- Execution: Conducting the actual penetration test.
- Post-Execution: Analyzing results, reporting findings, and suggesting
remediation.
- **Documentation**: Includes templates and checklists for planning and
reporting.