What The Hell Is Penetration Testing??

Module 1: – Overview of Penetration Testing 

  1. What is Penetration Testing?
  2. Why Penetration Testing?
  3. Steps of Penetration Testing?

Ten years ago talk about penetration to a 12 year old, what answer would you have gotten? Penetration is trying to go through a wall whose door is not open, using drilling or hacking or  beating your head to it in hopes that you don’t get hurt. Now what about penetration testing, to that even our answer was to see weather you can destroy the wall or not and the 12 yr olds didn’t know JACK SQUAT so they didn’t say anything. Nowadays ask a 12 year old the same question. Those little demons have matured. They would say that penetration is trying to go through a  wall of security in the computer system and see if it breaks, same way as beating the Wall Of Chine with a baseball bat if you are not well versed in Pen-Testing or a bulldozer if you know what you are doing……Well I don’t think he is gonna say THIS!! This is a mouthful. Most people are so superstitious that the term “Penetration” cause their attitude to go like…..    “∀∗™™¡∼†„”…….DID YOU UNDERSTAND ANY OF THAT??? Me neither. They are sooo panicky in their pants towards the word Penetration such that they think it literally means terrorist. I mean “GROW SOME BALLS”

Now penetration test was  mostly used for destructive purposes. But it can also fix the system. take the Following scenario for example

Anita had a big issue with her system. She asked Sunita to help her out. Sunita is a computer software  engineer She says OK….She logs on to her system from her own system remotely and fixes out the software issues and BAM Anita’s PC is fixed”

Now look closely at the above scenario. Under normal conditions no one is allowed to even touch the PC remotely, but here what Sunita does is she fixes it remotely. Now, technically this accessing the PC remotely thing is illegal and still is considered a taboo. But here life got a little bit easy  for Anita as she got her PC fixed.

Most of the notions that drive people to take up pitchforks towards Penetration Testers or penetrators to you nice people is the social media. They have made us out to be such culprits. That’s not to say these sort of Testers  are good people…because they are not…really. a Pen Tester can further exploit your dumb-asses can make some lives and completely destroy some. They can bring down nations, start world war but those are other types of computer people. GAWDD!! It would be so easy if i could actually use the word. Now Let’s discuss how many types of Pen-Testers are there?

Black Hat  Black Hat– They are mostly freelancer Pen-Testers. Not bound by any rules. they can spread chaos but also have an utmost control over it. Media have portrait Black Hats as Rogues. Nowadays They are more acceptable then they were.

White Hat –  White Hat      They are ‘LEGAL’ hackers. They are actually the penetration testers that are mostly recruited  by major corporations or government organizations. Their job is to access the secure system, find the vulnerability and then make a report of those vulnerabilities and find a way to tackle it. And sometimes, catch bad guys if you have a good day and you are lucky.

Grey Hat  –Grey Hat  These guys are awesome. They walk the line between legal and illegal. They work for the government or any organization and at the same time freelance themselves too.

Suiciders –Suicide HackersThen there are these guys…these guys are the ultimates. These quintessential nutjobs can be called pure good or pure evil. You see most of these guys are the most dangerous terrorist in the world…remember 9/11  “THAT WAS HACKING”. They are not Penetration Testers they are straight up penetrators and then destroyers There life depends upon this act, and there last wish tends to be a weapon of ultimate destruction in the digital world.

In the Next blog I am going to discuss “Why penetration Testing??” and will share some hack basics with you.

 

 

ONLINE COURSES - SELF STUDY

Ethical Hacking Bootcamp

Python Tutorial - Build 7 Apps

Ethical Hacking A to Z Bundle

Ethical Hacking: Beginner to Adv.

Gaurav Mahajan

I am Gaurav Mahajan a blogger,songwriter,code learner, tech enthusiast, food inhaler and overall a nice lazy guy that just loves tech of all forms

Latest posts by Gaurav Mahajan (see all)

Leave a Reply

Your email address will not be published. Required fields are marked *