Please enable JavaScript.
Coggle requires JavaScript to display documents.
Network Penetration Testing (Stage 2: Discovery ((Vulnerability Analysis…
Network Penetration Testing
Stage One: Planning
Reconnaisance
Preparation for Testing
Establish Rules of Engagement
Stage 2: Discovery
Vulnerability Analysis
Stage 3: Verification
Active / Passive Verification
Verification on Application Interace
Port Scanning
System and Services Identificaiton
User Enumeration
Password Strength
Authentication Bypass
Authentication Bypass
Network Sniffing (DNS, SNMP, SMTP etc)
Network and Security Controls
Stage 4: Reporting
Draft Report
Discussion on Draft Report
Final Report
Presentation
Stage 5: Validation
Patch Implementation Verification