What are the types of penetration testing?

Types of Penetration Testing :

  • Black Box Penetration Testing
  • White Box Penetration Testing
  • Grey Box Penetration Testing

Black Box TestingThe main differences are that with black box testing the testers are given very little or no information prior to the penetration test. It is also referred to as "blind testing" because the tester has to find an open route to access the network.

Disadvantages of Black Box Penetration Testing:
  • Particularly, these kinds of test cases are difficult to design.
  • It does not proper plan. Moreover it's kinda trail-error method.

White Box TestingIs when the tester is given full disclosure about the network prior to the penetration testing. This will include IP addresses, source code, network protocols and diagrams. Also known as "Full Disclosure" testing. Sometimes this is also known as structural, glass box, clear box, and open box testing.

Advantages of White Box Penetration Testing
  • This ensures that all independent paths of a module have been exercised.
  • This ensures that all logical decisions have been verified along with their true and false value.
Grey Box Testing 
In between black box and white box testing you will find grey box testing. The penetration tester will be given partial details about the network infrastructure. We don’t need to provide the internal information about the program functions and other operations.

There are different types of Hackers around us:
  • Black Hat Hacker
  • White Hat Hacker
  • Grey Hat Hacker
Black Hat Hacker  Is a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons. This differs from white hat hackers, which are security specialists employed to use hacking methods to find security flaws that black hat hackers may exploit.

Black hat hackers can inflict major damage on both individual computer users and large organizations by stealing personal financial information, compromising the security of major systems, or shutting down or altering the function of websites and networks.

White Hat Hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them. Although the methods used are similar, if not identical, to those employed by malicious hackers, white hat hackers have permission to employ them against the organization that has hired them.

Grey Hat Hacker very few things in life are clear black-and-white categories. In reality, there’s often a gray area. A gray-hat hacker falls somewhere between a black hat and a white hat. A gray hat doesn’t work for their own personal gain or to cause carnage, but they may technically commit crimes and do arguably unethical things.

1 comment:

  1. Data stealing through the internet is a real modern threat. Anybody can become victim of hacker attacks.CyberTraining 365 will enable you to perform Penetration testing of your servers and systems by yourself to make sure your information is well protected.