The tester has access to confidential data. He is given the application’s source and an account in internal network with access to the network. This test evaluates the threats from the employees inside the company.
External Network Pen Test
During this test, the tester is given a complete data on the target network. Such as host address, domains, network graphs, security defenses (firewall …), etc.
Social Engineering
The tester has no data on the network. He applies social engineering techniques or uses web penetrating tools in order to collect data. Pen tester may use common data on the internet.
Web application pen test
Some security issues may arise as a result of an insecure web application development, design or coding. This test targets these threats to prevent the exposure of personal data, credit card info, etc.
Share your thoughts about this post !
Send comment