Penetration Tests

Penetration Tests2020-04-02T12:02:06+03:00

Penetration testing, also called pentesting or ethical hacking, is the attempt to test a computer system, network, or web application to find vulnerabilities that an attacker could exploit. The penetration test can be automated with software applications or performed manually. In both cases, the process involves gathering information about the target before the test, identifying possible entry points, trying to find vulnerabilities, and reporting the findings.

The main purpose of the penetration test is to detect security weaknesses. Also penetration tests; can also be used to test an organization’s security policy, its commitment to compliance requirements, the level of security awareness of its employees, and the ability of the organization to identify and respond to security incidents. Generally, information about security weaknesses identified or exploited by penetration testing are grouped and presented to IT and network system administrators to enable them to make strategic decisions and prioritize improvement efforts.

SızmaPenetration TestsTestleri

Frequently Asked Questions About Penetration Testing

Why Should We Perform Penetration Testing?2020-03-13T10:14:02+03:00

Controlling security gaps in your systems by cyber security companies and reporting their strengths and weaknesses to your information is of great importance for your system security.Because despite all your attention and efforts on security, you and your employees have no clue to the methods and tools that attackers can use to exploit the system. Depending on the level of knowledge and experience of the attacker, probabilities and risks change dimension.For this reason, it is a more realistic and productive step to ensure security and increase the security of your “White Hat” teams that can think and act like a hacker and take precautions against these methods by knowing the attack methods.In addition, standards such as PCI, HIPAA, GDPR require pentesting (penetration testing).

What Software is Used for Penetration Testing?2020-03-13T10:13:29+03:00

The software and tools used can be examined under two headlines: software and tools for automatic scanning and software and tools for manual scanning.

Software and Tools Providing Manual Scan:

  • Metasploit
  • Nmap
  • Burp Suite
  • Aircrack-ng
  • John the Ripper
  • SqlMap 

Kali Linux distribution provides such open source penetration testing software and tools installed on the system.

Software and Tools for Automatic Scanning:

  • Nessus
  • NetSparker
  • Acunetix
  • OpenVAS
Types and Methods of Penetration Testing2020-04-02T13:04:54+03:00

Penetration test types in general terms can be summarized as;

  • Local Network Penetration Test
  • External Network Penetration Test
  • Web Application Penetration Testing

Local Network Penetration Testing: Studies are being carried out to find out if your internal network system is really secure and how far the intruders can reach the intrusion network.

External Network Penetration Testing: Studies are being conducted to find out if your external network system is really secure and how far the attackers who infiltrate your external network can reach the system.

Web Application Penetration Testing: Studies are being carried out to find out if your web applications are really secure and how far the attackers who infiltrate your web applications can reach the system.

Penetration test methods in general terms can be summarized as;

  • Blackbox
  • Greybox
  • Whitebox

Blackbox: In the Blackbox test, the tester has no knowledge of the system and its internal functioning. The test is carried out to see what weaknesses a malicious person can use to infiltrate the relevant system for any reason, and what damage it may cause.

Greybox: In the graybox test, the tester has a partial knowledge of the system and its internal functioning. An attacker with limited knowledge of the system is tested to see what kind of damage it can cause.

Whitebox: In the Whitebox test, the tester has full knowledge of the system and the internal functioning of the system. In this method, a test is performed to see what kind of damage can be caused by the information of a person who is already working in your company or has worked before.