< Day Day Up > |
This chapter takes you through a brief and basic methodical penetration test of a fictional company called Little Company Network (LCN). This chapter focuses primarily on the actual attack and the recording of information found on LCN, rather than on the formal contractual process that forms a necessary part of every penetration test. To give an example, Table 16-1 shows a high-level approach to the entire process from beginning to end.
Tip For an excellent document covering a full, methodical approach, see the Open Source Security Testing Methodology Manual (OSSTMM) at http://www.isecom.org/. The rest of the chapter takes you through a fictitious penetration test of a network from two perspectives:
|
< Day Day Up > |