Important 4 Steps for Penetration Testing

Module 1 :- Overview Of Penetration Testing

  1. What is Penetration Testing?
  2. Why Penetration Testing?
  3. Steps of Penetration Testing?

All Right all right. now we all know “what is Penetration Testing?”, “Why it is needed?”. Now its time for ‘How it is done?’   

There are four basic steps of Penetration Testing…….Well the fifth one is filing the report but you don’t need to know THAt!! SO, 5 steps of awesomeness. These steps area  as follows:

  1. Information Gathering:

    The more you know about the target, the more easily its going to be for you to influence him. The easier to influence will in turn make you avail to more information, and more influence and more information and on and on and on until you know everything about that target……..OH LOOK!! YOU HAVE A LIFE PARTNER NOW!!Gathering Information

  2. Scanning:

    Information is gathered at  first, now you gotta find out the information available for that moment. That is accomplished by scanning. it is used to know whether the host is up, which port is open and then finding vulnerability a structural weakness if you will. No system is invincible, there is a kryptonite for every superman. THAT’s what the purpose of scanning is, finding the superman system’s kruptonite.  Vulnerability_Scanner

  3. Sniffing:

    Its more like a blood hound activity, finding the weakness and sniff out whatever you can from the cracks or in the system’s case passwords, usernames, secrets normally anything not everyone would want you to see. in kali sniffing techniques include wireshark, ettercap etc. Then the companies will ask you to fix this, and yo ass get paid.Sniffing

  4. Exploitation

     Now the stage is a set, you know the info, the weaknesses, the passwords. Its now time to whoop them up for action. Expliotation deals with exploiting whatever the attacker has gathered in the last 3 steps and then explioting the system, or the organization. Its the final test that a Pen-Tester use to look down on companies and say”YOU ARE WEAK!!” and then the companies ask them for tips on how to fix it.  hacker

Nothing in the world is impenetrable, Invincibility is an illusion used on the people so they can look the other way and get their ass handed to them”


If Appreciate My Work, You should consider:

4 thoughts on “Important 4 Steps for Penetration Testing

  1. hello,
    i want to learn about penetration , where i have to through testing of a linux based multimedia device.

    could you pls assit me on this.

    i have installed kali linux and now need to use it along with my DUT(device under test)

  2. Hey my friend just checking out your page and find you cool an intriguing think you can help me figure best program or help from yourself to retrieve my old password for my gmail thats been haunting me for 4 yrs about and ive even started reading html and background google data codeing and still damm stuck.

  3. Hello my friend! First thank you lots for the entertaining, useful, and clear understanding of pentesting. I have thus far underststood everything that I have came across and my attention is still here.

Leave a Reply

Your email address will not be published. Required fields are marked *