Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
hacking Module 18

hacking Module 18

Ratings: (0)|Views: 146|Likes:
Published by Jitendra Kumar Dash

More info:

Published by: Jitendra Kumar Dash on Aug 09, 2010
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less





NMCSP2008 Batch-I
Module XVIIIPenetration Testing
Introduction to PT
Most hackers follow a common underlyingapproach when it comes to penetrating a system
In the context of penetration testing, the testeris limited by resources, namely time, skilledresources, access to equipment etc. as outlinedin the penetration testing agreement.
 A pentest simulates methods used by intrudersto gain unauthorized access to an organization¶snetworked systems and then compromise them.
Categories of security assessments
Every organization uses different types of security assessments to validate the level of security on its network resources.
Security assessment categories are security audits, vulnerability assessments andpenetration testing
Each type of security assessment requires thatthe people conducting the assessment havedifferent skills.

Activity (8)

You've already reviewed this. Edit your review.
1 hundred reads
Nasib Silaban liked this
zelnid4 liked this
sungoo liked this
entity_unknown liked this
mrbrightside69 liked this
somenath_singh liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->