Unlike the previous post: The 5 Phases Of Hacking. This procedure mostly resonates with cybersecurity professionals and/or ethical hackers. 1. SCOPING Determining the rules of engagement for the assessment. 2. Reconnaissance Also known as Information Gathering. Gather Relevant information and enumerate the attack surface. 3. Vulnerability Assessment Also known as Scanning and Enumeration. Identify vulnerabilities […]
Categories
The 8 Phases of Cyber Security Testing
- Post author By Stephen Ajulu
- Post date March 19, 2020
- Tags active reconnaissance, artifact collection, artifact destruction, assessment, certified ethical hacker, certified ethical hacking, clearing tracks, covering tracks, cyber awareness, Cyber Security, cyber security analyst, cyber security awareness, cyber security engineer, cyber security professional, cyber security professionals, cyber security testing, cyberops, cybersecurity, cybersecurity analyst, cybersecurity awareness, cybersecurity engineer, cybersecurity framework, cybersecurity jargon explained, cybersecurity professional, cybersecurity professionals, cybersecurity terminology, cybersecurity testing, cyberspace, debriefing, ethical hackers, ethical hacking, ethical hacking enthusiasts, exploit, exploitation, gain access, gaining access, hacker/cybersecurity, how to successfully exploit a system, information security, infosec, infosecurity, lateral movement, maintain access, maintaining access, passive reconnaisssance, penetration framework, penetration test, penetration tester, penetration testing, pentester, pentesting, post exploitation, recon, reconnaissance, reconnaissance and information gathering, report, reporting, scoping, secure, securing, security, security testing, security tips, vulnerabilities, vulnerability, vulnerability scanning, vulnerabylity assessment, zero day exploit