What is a Pentest

What is a Pentest

[vc_row type=”in_container” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”2/3″ tablet_text_alignment=”default” phone_text_alignment=”default”]

What´s a Pentester and how it improve the security

$ Some times the best defense is a good attack.

The word Pentest comes from Penetration Test (pen test) of informatics systems. It is an authorised simulated attack on a computer system that looks for security weaknesses, potentially gaining access to the system’s features and data.

“The process typically identifies the target systems and a particular goal—then reviews available information and undertakes various means to attain the goal. A penetration test target may be a white box (which provides background and system information) or black box (which provides only basic or no information except the company name). A penetration test can help determine whether a system is vulnerable to attack, if the defenses were sufficient, and which defenses (if any) the test defeated.” – Wikipedia

In another words, it´s when a White Hat attack a company or any kind of application or informatics system (all that under contract) to find vulnerabilities and close them.

Normally in a Pentest the white hat must follow some of these methodologies,  OSSTMM (Open Source Security Testing Methodology Manual) or OWASP (Open Web Application Security Project), it´s a protocol to apply where it explain the steps to do, since the beginning (Footprinting) until the lat step, the technical report.

Why it is so important? Well, I´ll give you an example. Looking back in the airports security everything was fine, if you was drug dealer or just a guy with a new knife you can approach the airplane without any difficulty because there weren’t any security stop, but then a terrorist had the idea about hijacked an airplane with a gun and after that all the airports started to implement new security to avoid the same incident again. So with the Pentest happens the same a White Hat will try to break the security to make it stronger, the only difference among a normal hacker around the world and a Pentester is that the second one will do it under a contract with the company to test and some times the company put limits on the scope of the test and that´s definitely not something good because the Black Hat will try everything to reach his goal.

learn, learning, the best security practice, ethical hacking, IT, Admin, Administrator, Server, User, Kali Linux, Phone, Download, Blog, WordPress, Free, Lab, Pentest, Pentester, penetration test

[/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1/3″ tablet_text_alignment=”default” phone_text_alignment=”default”][image_with_animation image_url=”1777″ alignment=”center” animation=”Fade In” box_shadow=”none” max_width=”100%” delay=”400″][team_member image_url=”1722″ team_memeber_style=”meta_below” link_element=”none” color=”Accent-Color” name=”Daniel Morales” job_position=”Writer”][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” bg_color=”#f9f9f9″ scene_position=”center” text_color=”dark” text_align=”left” top_padding=”4%” bottom_padding=”3%” overlay_strength=”0.3″][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”1/1″ tablet_text_alignment=”default” phone_text_alignment=”default”][recent_posts style=”default” category=”all” columns=”3″ title_labels=”true” posts_per_page=”3″][/vc_column][/vc_row]

Share it:

Leave a Reply

Your email address will not be published. Required fields are marked *