Tuesday, January 13, 2026
No Result
View All Result
The Crypto HODL
  • Home
  • Bitcoin
  • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Updates
    • Crypto Mining
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Regulations
  • Scam Alert
  • Analysis
  • Videos
Marketcap
  • Home
  • Bitcoin
  • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Updates
    • Crypto Mining
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Regulations
  • Scam Alert
  • Analysis
  • Videos
No Result
View All Result
The Crypto HODL
No Result
View All Result

Penetration testing methodologies and standards

January 25, 2024
in Blockchain
Reading Time: 6 mins read
0 0
A A
0
Home Blockchain
Share on FacebookShare on Twitter


The net area continues to develop quickly, opening extra alternatives for cyberattacks to happen inside a pc system, community, or internet software. To mitigate and put together for such dangers, penetration testing is a crucial step find safety vulnerabilities that an attacker may use.

What’s penetration testing?

A penetration check, or “pen check,” is a safety check that’s run to mock a cyberattack in motion. A cyberattack could embrace a phishing try or a breach of a community safety system. There are several types of penetration testing accessible to a corporation relying on the safety controls wanted. The check may be run manually or with automated instruments by means of the lens of a selected plan of action, or pen testing methodology.

Why penetration testing and who’s concerned?

The phrases “moral hacking” and “penetration testing” are generally used interchangeably, however there’s a distinction. Moral hacking is a broader cybersecurity area that features any use of hacking abilities to enhance community safety. Penetration exams are simply one of many strategies moral hackers use. Moral hackers can also present malware evaluation, threat evaluation, and different hacking instruments and methods to uncover and repair safety weaknesses relatively than trigger hurt.

IBM’s Price of a Information Breach Report 2023 discovered the worldwide common value of a knowledge breach in 2023 to be USD 4.45 million, a 15% improve over 3 years. One solution to mitigate these breaches is by performing correct and pointed penetration testing.

Corporations rent pen testers to launch simulated assaults towards their apps, networks, and different property. By staging pretend assaults, penetration testers assist safety groups uncover essential safety vulnerabilities and enhance total safety posture. These assaults are sometimes carried out by crimson groups, or offensive safety groups. The crimson group simulates an actual attackers’ ways, methods and procedures (TTPs) towards the group’s personal system as a solution to assess safety threat.

There are a number of penetration testing methodologies to think about as you get into the pen testing course of. The group’s selection will depend upon the class of the goal group, the aim of the pen check and the scope of the safety check. There isn’t a one-size-fits-all method. It requires a corporation to know its safety points and safety coverage for there to be a good vulnerability evaluation previous to the pen testing course of.

Watch pen testing demos from X-Power

5 high penetration testing methodologies

One of many first steps within the pen testing course of is deciding on which methodology to observe.

Beneath, we’ll dive into 5 of the most well-liked penetration testing frameworks and pen testing methodologies to assist information stakeholders and organizations to the perfect methodology for his or her particular wants and guarantee it covers all required areas.

1. Open-Supply Safety Testing Methodology Guide

Open-Supply Safety Testing Methodology Guide (OSSTMM) is without doubt one of the hottest requirements of penetration testing. This system is peer-reviewed for safety testing and was created by the Institute for Safety and Open Methodologies (ISECOM).

The strategy relies on a scientific method to pen testing with accessible and adaptable guides for testers. The OSSTMM consists of key options, comparable to an operational focus, channel testing, metrics and belief evaluation in its methodology.

OSSTMM offers a framework for community penetration testing and vulnerability evaluation for pen testing professionals. It’s meant to be a framework for suppliers to seek out and resolve vulnerabilities, comparable to delicate information and points surrounding authentication.

2. Open Internet Utility Safety Undertaking

OWASP, quick for Open Internet Utility Safety Undertaking, is an open-source group devoted to internet software safety.

The non-profit group’s aim is to make all its materials free and simply accessible for anybody who desires to enhance their very own internet software safety. OWASP has its personal High 10 (hyperlink resides outdoors of ibm.com), which is a well-maintained report outlining the largest safety issues and dangers to internet purposes, comparable to cross-site scripting, damaged authentication and getting behind a firewall. OWASP makes use of the highest 10 record as a foundation for its OWASP Testing Information. 

The information is split into three elements: OWASP testing framework for internet software improvement, internet software testing methodology and reporting. The online software methodology can be utilized individually or as part of the net testing framework for internet software penetration testing, cell software penetration testing, API penetration testing, and IoT penetration testing.

3. Penetration Testing Execution Customary

PTES, or Penetration Testing Execution Customary, is a complete penetration testing methodology.

PTES was designed by a group of knowledge safety professionals and is made up of seven essential sections masking all points of pen testing. The aim of PTES is to have technical pointers to stipulate what organizations ought to anticipate from a penetration check and information them all through the method, beginning on the pre-engagement stage.

The PTES goals to be the baseline for penetration exams and supply a standardized methodology for safety professionals and organizations. The information offers a spread of assets, comparable to greatest practices in every stage of the penetration testing course of, from begin to end. Some key options of PTES are exploitation and put up exploitation. Exploitation refers back to the technique of having access to a system by means of penetration methods comparable to social engineering and password cracking. Publish exploitation is when information is extracted from a compromised system and entry is maintained.

4.  Data System Safety Evaluation Framework

Data System Safety Evaluation Framework (ISSAF) is a pen testing framework supported by the Data Programs Safety Group (OISSG).

This system is not maintained and is probably going not the perfect supply for probably the most up-to-date data. Nonetheless, one in every of its essential strengths is that it hyperlinks particular person pen testing steps with particular pen testing instruments. The sort of format generally is a good basis for creating an individualized methodology.

5. Nationwide Institute of Requirements and Expertise  

NIST, quick for the Nationwide Institute of Requirements and Expertise, is a cybersecurity framework that gives a set of pen testing requirements for the federal authorities and outdoors organizations to observe. NIST is an company throughout the U.S. Division of Commerce and must be thought-about the minimal customary to observe.

NIST penetration testing aligns with the steering despatched by NIST. To adjust to such steering, organizations should carry out penetration exams following the pre-determined set of pointers.

Pen testing phases

Set a scope

Earlier than a pen check begins, the testing group and the corporate set a scope for the check. The scope outlines which programs might be examined, when the testing will occur, and the strategies pen testers can use. The scope additionally determines how a lot data the pen testers may have forward of time.

Begin the check

The subsequent step can be to check the scoping plan and assess vulnerabilities and performance. On this step, community and vulnerability scanning may be performed to get a greater understanding of the group’s infrastructure. Inside testing and exterior testing may be performed relying on the group’s wants. There are a number of exams the pen testers can do, together with a black-box check, white-box check, and gray-box check. Every offers various levels of details about the goal system.

As soon as an summary of the community is established, testers can begin analyzing the system and purposes throughout the scope given. On this step, pen testers are gathering as a lot data as doable to know any misconfigurations.

Report on findings

The ultimate step is to report and debrief. On this step, you will need to develop a penetration testing report with all of the findings from the pen check outlining the vulnerabilities recognized. The report ought to embrace a plan for mitigation and the potential dangers if remediation doesn’t happen.

Pen testing and IBM

In the event you attempt to check every thing, you’ll waste your time, funds and assets. By utilizing a communication and collaboration platform with historic information, you may centralize, handle, and prioritize high-risk networks, purposes, gadgets, and different property to optimize your safety testing program. The X-Power® Crimson Portal permits everybody concerned in remediation to view check findings instantly after vulnerabilities are uncovered and schedule safety exams at their comfort.

Discover community penetration testing companies from X-Power

Was this text useful?

SureNo

Content material Author, IBM Consulting



Source link

Tags: methodologiesPenetrationStandardsTesting
Previous Post

Musee d’Orsay to Spotlight DJ Agoria at First NFT Exhibition

Next Post

Could 2024 be XR’s Mainstream Moment, or will it be Another Metaverse Crash?

Related Posts

Conflux (CFX) CFX Deploys v3.0.2 Testnet With Critical RPC Bug Fixes
Blockchain

Conflux (CFX) CFX Deploys v3.0.2 Testnet With Critical RPC Bug Fixes

January 13, 2026
VanEck CEO Flags Crypto as Q1 2026 Risk-On Play Amid Fiscal Clarity
Blockchain

VanEck CEO Flags Crypto as Q1 2026 Risk-On Play Amid Fiscal Clarity

January 13, 2026
Oracle Unveils AI Supply Chain Tool for Retailers at NRF 2026
Blockchain

Oracle Unveils AI Supply Chain Tool for Retailers at NRF 2026

January 12, 2026
AAVE Price Prediction: Targets $190 by January End Despite Current Neutral Momentum
Blockchain

AAVE Price Prediction: Targets $190 by January End Despite Current Neutral Momentum

January 12, 2026
Success Story: Sterling Brasher’s Learning Journey with 101 Blockchains
Blockchain

Success Story: Sterling Brasher’s Learning Journey with 101 Blockchains

January 12, 2026
AVAX Price Prediction: Targets $15.50-$16.50 by Early February
Blockchain

AVAX Price Prediction: Targets $15.50-$16.50 by Early February

January 12, 2026
Next Post
Could 2024 be XR’s Mainstream Moment, or will it be Another Metaverse Crash?

Could 2024 be XR's Mainstream Moment, or will it be Another Metaverse Crash?

OKB Flash Crash Wipes 25% Off Value In Minutes

OKB Flash Crash Wipes 25% Off Value In Minutes

Gmail Enhances AI Email Drafting with Voice Input

Gmail Enhances AI Email Drafting with Voice Input

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Twitter Instagram LinkedIn Telegram RSS
The Crypto HODL

Find the latest Bitcoin, Ethereum, blockchain, crypto, Business, Fintech News, interviews, and price analysis at The Crypto HODL

CATEGORIES

  • Altcoin
  • Analysis
  • Bitcoin
  • Blockchain
  • Crypto Exchanges
  • Crypto Mining
  • Crypto Updates
  • DeFi
  • Ethereum
  • Metaverse
  • NFT
  • Regulations
  • Scam Alert
  • Uncategorized
  • Videos
  • Web3

SITE MAP

  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Copyright © 2023 The Crypto HODL.
The Crypto HODL is not responsible for the content of external sites.

No Result
View All Result
  • Home
  • Bitcoin
  • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Updates
    • Crypto Mining
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Regulations
  • Scam Alert
  • Analysis
  • Videos
Crypto Marketcap

Copyright © 2023 The Crypto HODL.
The Crypto HODL is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In