Wednesday, July 23, 2025
No Result
View All Result
DOLLAR BITCOIN
Shop
  • Home
  • Blockchain
  • Bitcoin
  • Cryptocurrency
  • Altcoin
  • Ethereum
  • Market & Analysis
  • DeFi
  • More
    • Dogecoin
    • NFTs
    • XRP
    • Regulations
  • Shop
    • Bitcoin Book
    • Bitcoin Coin
    • Bitcoin Hat
    • Bitcoin Merch
    • Bitcoin Miner
    • Bitcoin Miner Machine
    • Bitcoin Shirt
    • Bitcoin Standard
    • Bitcoin Wallet
DOLLAR BITCOIN
No Result
View All Result
Home Blockchain

Penetration testing methodologies and standards

n70products by n70products
January 24, 2024
in Blockchain
0
Penetration testing methodologies and standards
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter


The web area continues to develop quickly, opening extra alternatives for cyberattacks to happen inside a pc system, community, or internet software. To mitigate and put together for such dangers, penetration testing is a obligatory step find safety vulnerabilities that an attacker would possibly use.

What’s penetration testing?

A penetration test, or “pen check,” is a safety check that’s run to mock a cyberattack in motion. A cyberattack could embrace a phishing try or a broach of a bodily safety system. There are various kinds of penetration testing obtainable to a company relying on the safety controls wanted. The check could be run manually or with automated instruments via the lens of a particular plan of action, or pen testing methodology.

Why penetration testing and who’s concerned?

The phrases “ethical hacking” and “penetration testing” are generally used interchangeably, however there’s a distinction. Moral hacking is a broader cybersecurity discipline that features any use of hacking abilities to enhance community safety. Penetration assessments are simply one of many strategies moral hackers use. Moral hackers may present malware evaluation, threat evaluation, and different hacking instruments and strategies to repair safety weaknesses quite than trigger hurt.

IBM’s Cost of a Data Breach Report 2023 discovered the worldwide common value of an information breach in 2023 to be USD $4.45 million, a 15% enhance over 3 years. One option to mitigate these breaches is by performing correct and pointed penetration testing.

Firms rent pen testers to launch simulated assaults towards their apps, networks, and different property. By staging pretend assaults, penetration testers assist security teams uncover crucial safety vulnerabilities and enhance general safety posture. These assaults are sometimes carried out by purple groups, or offensive safety crew. The red team simulates an actual attackers’ techniques, strategies and procedures (TTPs) towards the group’s personal system as a option to assess safety threat.

There are a number of penetration testing methodologies to think about as you get into the pen testing course of. The group’s selection will depend upon the class of the goal group, the purpose of the pen check and the scope of the safety check. There isn’t any one-size-fits-all strategy. It requires a company to know its safety points and safety coverage for there to be a good vulnerability evaluation previous to the pen testing course of.

Watch pen testing demos from X-Force

5 high penetration testing methodologies

One of many first steps within the pen testing course of is deciding on which methodology to comply with.

Under, we’ll dive into 5 of the most well-liked penetration testing frameworks and pen testing methodologies to assist information stakeholders and organizations to the very best methodology for his or her particular wants and guarantee it covers all required areas.

1. Open-Supply Safety Testing Methodology Guide

Open-Supply Safety Testing Methodology Guide (OSSTMM) is likely one of the hottest requirements of penetration testing. This technique is peer-reviewed for safety testing and was created by the Institute for Safety and Open Methodologies (ISECOM).

The tactic is predicated on a scientific strategy to pen testing with accessible and adaptable guides for testers. The OSSTMM consists of key options, similar to an operational focus, channel testing, metrics and belief evaluation in its methodology.

OSSTMM gives a framework for community penetration testing and vulnerability evaluation for pen testing professionals. It’s meant to be a framework for suppliers to search out and resolve vulnerabilities, similar to delicate knowledge and points surrounding authentication.

2. Open Net Utility Safety Venture

OWASP, brief for Open Net Utility Safety Venture, is an open-source group devoted to internet software safety.

The non-profit group’s purpose is to make all its materials free and simply accessible for anybody who desires to enhance their very own internet software safety. OWASP has its personal Top 10 (hyperlink resides outdoors of ibm.com), which is a well-maintained report outlining the largest safety issues and dangers to internet functions, similar to cross-site scripting, damaged authentication and getting behind a firewall. OWASP makes use of the highest 10 listing as a foundation for its OWASP Testing Information. 

The information is split into three components: OWASP testing framework for internet software improvement, internet software testing methodology and reporting. The net software methodology can be utilized individually or as part of the net testing framework for internet software penetration testing, cell software penetration testing, API penetration testing, and IoT penetration testing.

3. Penetration Testing Execution Commonplace

PTES, or Penetration Testing Execution Commonplace, is a complete penetration testing methodology.

PTES was designed by a crew of data safety professionals and is made up of seven most important sections masking all features of pen testing. The aim of PTES is to have technical tips to stipulate what organizations ought to count on from a penetration check and information them all through the method, beginning on the pre-engagement stage.

The PTES goals to be the baseline for penetration assessments and supply a standardized methodology for safety professionals and organizations. The information gives a variety of sources, similar to greatest practices in every stage of the penetration testing course of, from begin to end. Some key options of PTES are exploitation and submit exploitation. Exploitation refers back to the means of getting access to a system via penetration strategies similar to social engineering and password cracking. Submit exploitation is when knowledge is extracted from a compromised system and entry is maintained.

4.  Data System Safety Evaluation Framework

Data System Safety Evaluation Framework (ISSAF) is a pen testing framework supported by the Data Techniques Safety Group (OISSG).

This technique is now not maintained and is probably going not the very best supply for essentially the most up-to-date data. Nonetheless, certainly one of its most important strengths is that it hyperlinks particular person pen testing steps with particular pen testing instruments. Any such format generally is a good basis for creating an individualized methodology.

5. Nationwide Institute of Requirements and Know-how  

NIST, brief for the Nationwide Institute of Requirements and Know-how, is a cybersecurity framework that gives a set of pen testing requirements for the federal authorities and outdoors organizations to comply with. NIST is an company throughout the U.S. Division of Commerce and must be thought-about the minimal customary to comply with.

NIST penetration testing aligns with the steerage despatched by NIST. To adjust to such steerage, organizations should carry out penetration assessments following the pre-determined set of tips.

Pen testing phases

Set a scope

Earlier than a pen check begins, the testing crew and the corporate set a scope for the check. The scope outlines which programs might be examined, when the testing will occur, and the strategies pen testers can use. The scope additionally determines how a lot data the pen testers may have forward of time.

Begin the check

The following step could be to check the scoping plan and assess vulnerabilities and performance. On this step, community and vulnerability scanning could be carried out to get a greater understanding of the group’s infrastructure. Inner testing and exterior testing could be carried out relying on the group’s wants. There are a number of assessments the pen testers can do, together with a black-box check, white-box check, and gray-box check. Every gives various levels of details about the goal system.

As soon as an summary of the community is established, testers can begin analyzing the system and functions throughout the scope given. On this step, pen testers are gathering as a lot data as attainable to know any misconfigurations.

Report on findings

The ultimate step is to report and debrief. On this step you will need to develop a penetration testing report with all of the findings from the pen check outlining the vulnerabilities recognized. The report ought to embrace a plan for mitigation and the potential dangers if remediation doesn’t happen.

Pen testing and IBM

In the event you attempt to check every thing, you’ll waste your time, finances and sources. By utilizing a communication and collaboration platform with historic knowledge, you possibly can centralize, handle, and prioritize high-risk networks, functions, gadgets, and different property to optimize your safety testing program. The X-Drive® Crimson Portal allows everybody concerned in remediation to view check findings instantly after vulnerabilities are uncovered and schedule safety assessments at their comfort.

Explore network penetration testing services from X-Force

Was this text useful?

SureNo

Content material Author, IBM Consulting



Source link

Tags: methodologiesPenetrationstandardstesting
Previous Post

Market Clarity: Multiple Bitcoin ETF Addresses Disclosed To The Public

Next Post

‘Hard no’ or ‘Soon’ – What the industry thinks of a spot Ethereum ETF

Next Post
‘Hard no’ or ‘Soon’ – What the industry thinks of a spot Ethereum ETF

'Hard no' or 'Soon' - What the industry thinks of a spot Ethereum ETF

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Premium Content

Dogecoin Pulls Back To ‘The Golden Ratio’ – Analyst Expects A Bullish Reversal

Dogecoin Pulls Back To ‘The Golden Ratio’ – Analyst Expects A Bullish Reversal

February 16, 2025
Ethereum Staking Drops From November 2024 Peak – Is Interest In ETH Fading?

Ethereum Staking Drops From November 2024 Peak – Is Interest In ETH Fading?

February 17, 2025
XRP Price Flashes Strength — Bulls Looking for Continuation

XRP Price Flashes Strength — Bulls Looking for Continuation

July 10, 2025
Bitcoin CME Gap Close About To Happen With Push Toward $83k

Bitcoin CME Gap Close About To Happen With Push Toward $83k

March 30, 2025
100 SMA Crucial for Sustained Gains

100 SMA Crucial for Sustained Gains

August 7, 2024
Bitcoin Primed To Hit New All-Time High Once BTC Breaks Above This Resistance Level, According to Trader Michaël van de Poppe

Bitcoin Primed To Hit New All-Time High Once BTC Breaks Above This Resistance Level, According to Trader Michaël van de Poppe

June 21, 2025

Recent Posts

  • How Ripple Is Taking On SWIFT To Grab 14% Market Share As XRP Price Surges
  • FBI Ends Probe Into Kraken Co-Founder: Report
  • Walmart is selling the latest Apple Pencil Pro for the exact same price as the older Apple Pencil 2nd Gen

Categories

  • Altcoin
  • Bitcoin
  • Blockchain
  • Blog
  • Cryptocurrency
  • DeFi
  • Dogecoin
  • Ethereum
  • Market & Analysis
  • NFTs
  • Regulations
  • XRP

Recommended

How Ripple Is Taking On SWIFT To Grab 14% Market Share As XRP Price Surges

How Ripple Is Taking On SWIFT To Grab 14% Market Share As XRP Price Surges

July 23, 2025
FBI Ends Probe Into Kraken Co-Founder: Report

FBI Ends Probe Into Kraken Co-Founder: Report

July 23, 2025

© 2023 Dollar-Bitcoin | All Rights Reserved

No Result
View All Result
  • Home
  • Blockchain
  • Bitcoin
  • Cryptocurrency
  • Altcoin
  • Ethereum
  • Market & Analysis
  • DeFi
  • More
    • Dogecoin
    • NFTs
    • XRP
    • Regulations
  • Shop
    • Bitcoin Book
    • Bitcoin Coin
    • Bitcoin Hat
    • Bitcoin Merch
    • Bitcoin Miner
    • Bitcoin Miner Machine
    • Bitcoin Shirt
    • Bitcoin Standard
    • Bitcoin Wallet

© 2023 Dollar-Bitcoin | All Rights Reserved

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
💵 Turn Every Dollar Into Crypto Rewards! Wirex lets you spend dollars or bitcoin — and get up to 8% back in crypto instantly. 💸 Exclusive offers dropping soon — stay tuned!
“Offers Launching Soon”
This is default text for notification bar
Learn more
Go to mobile version