preview

Operating Systems Dependency on Penetration Testing

Good Essays

Operating Systems Dependency on Penetration Testing

Michael S. Self
University of Maryland University College-Europe

Table of Contents

Abstract………………………………………………………………………………..…………..3
History and Purpose of Penetration Testing……………………….......................…..………….4
Techniques and Tools for Performing Penetration Testing………….………….……..…………5
Example of Penetration Test Process………………………………....………...…….………….6
References…………………………………………………………………………………………7

Abstract
This report will encompass penetration testing of operating systems. It first explains the evolution of penetration testing, and what purpose it serves. It then describes techniques and tools used to perform the tests. The report will conclude with an example of a …show more content…

Disadvantages) Block Box: limited testing because tester knows little about application; White Box: tester may have inside knowledge of program and code with errors may be overlooked; Grey Box: test coverage is limited because source code is not available. As explained in a paper written by the SANS Institute (2002), it is highly suggested that an outside company be contracted to perform the test so more accurate results can be attained. Not being affiliated with the company, the hired team can imitate a more realistic approach an individual might take to gain access or information. When it comes to the selection of tools to use in a pentest there is the choice between automated and manual tests. In an online article written by Fergal Glynn, he explains that penetration testing tools are used as part of a pentest to automate certain tasks, improve testing efficiency, and discover issues that might be difficult to find using manual techniques. There are two common penetration testing tools: static analysis tools and dynamic analysis tools. Static programs analyzes software without actually executing programs, such as performing analysis on the source or object code. Dynamic programs analyze software by executing programs, such as analyzing what

Get Access