Penetration Testing Tutorial PDF
Penetration Testing Tutorial PDF
Audience
This tutorial has been prepared for beginners to help them understand the basics of
Penetration Testing and how to use it in practice.
Prerequisites
Before proceeding with this tutorial, you should have a basic understanding of software
testing and its related concepts.
All the content and graphics published in this e-book are the property of Tutorials Point (I)
Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish
any contents or a part of contents of this e-book in any manner without written consent
of the publisher.
We strive to update the contents of our website and tutorials as timely and as precisely as
possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt.
Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our
website or its contents including this tutorial. If you discover any errors on our website or
in this tutorial, please notify us at contact@tutorialspoint.com
i
Penetration Testing
Table of Contents
About the Tutorial .................................................................................................................................... i
Audience .................................................................................................................................................. i
Prerequisites ............................................................................................................................................ i
Reconnaissance ....................................................................................................................................... 4
Discovery ................................................................................................................................................ 4
iii
Penetration Testing
iv
Penetration Testing
1. Penetration Testing — Introduction
If a system is not secured, then any attacker can disrupt or take authorized access to that
system. Security risk is normally an accidental error that occurs while developing and
implementing the software. For example, configuration errors, design errors, and software
bugs, etc.
It identifies a simulation environment i.e., how an intruder may attack the system
through white hat attack.
It helps to find weak areas where an intruder can attack to gain access to the
computer’s features and data.
It supports to avoid black hat attack and protects the original data.
1
Penetration Testing
Customer Protection: Breach of even a single customer’s data may cause big
financial damage as well as reputation damage. It protects the organizations who
deal with the customers and keep their data intact.
2
Penetration Testing
2. Penetration Testing — Penetration Testing Method
Reconnaissance
Discovery
Final analysis
Report Preparation
3
Penetration Testing