Pentesting 101

Estioo
2 min readJul 29, 2023

--

Penetration testing encompasses a wide variety of domains, each with its own specific methodologies, tools, and techniques. Here’s a list of some prominent pentesting areas:

1. Network Penetration Testing: This focuses on identifying vulnerabilities in network infrastructure, protocols, and services. It typically covers:
— External and internal network testing
— Firewall and IDS/IPS evasion
— Protocol-specific attacks

2. Web Application Penetration Testing: Targets vulnerabilities in web applications. Some common issues include:
— SQL Injection (SQLi)
— Cross-Site Scripting (XSS)
— Cross-Site Request Forgery (CSRF)
— Insecure Direct Object References (IDOR)
— Security misconfigurations

3. Mobile Application Penetration Testing: Focuses on vulnerabilities in mobile apps, including:
— Insecure data storage
— Insecure communication
— Inadequate cryptography
— Unauthorized code execution

4. Wireless Penetration Testing: Concentrates on vulnerabilities within wireless networks, such as:
— WEP/WPA/WPA2 security breaches
— Rogue access points
— Insecure wireless configurations

5. Cloud Penetration Testing: Addresses vulnerabilities associated with cloud services (e.g., AWS, Azure, Google Cloud) and configurations.

6. IoT (Internet of Things) Penetration Testing: Focuses on vulnerabilities in connected devices, which can range from smart home devices to industrial control systems.

7. Industrial Control Systems (ICS) & SCADA Penetration Testing: Aims to find vulnerabilities in industrial systems and networks, which are often crucial for the infrastructure of entire cities or industrial plants.

8. Red Teaming: This is an advanced form of penetration testing where a team mimics real-world attacks to test an organization’s security posture. Red teaming often combines multiple types of pentesting in a single engagement.

9. Physical Security Penetration Testing: Evaluates the effectiveness of physical security controls. It might involve trying to bypass building security, accessing secure areas, tailgating, and checking for unprotected assets.

10. Social Engineering: Tests human-related vulnerabilities. This might involve phishing campaigns, baiting (using physical media like USB drives), pretexting (using a fabricated scenario to obtain information), or vishing (voice-based phishing).

11. Application Source Code Review: A more in-depth review where the tester examines the actual source code of an application for vulnerabilities.

12. Container & Orchestrator Penetration Testing: Targets environments that use containers (e.g., Docker) and orchestrators (e.g., Kubernetes) to deploy applications.

13. Thick Client/ Desktop Application Penetration Testing: Focuses on vulnerabilities in desktop-based applications, especially those that communicate with external servers.

14. Embedded Device Penetration Testing: Involves testing devices that have a specific function and operating system embedded in them, like routers, switches, or specialized equipment.

Each of these areas requires a unique skill set, tools, and methodologies. While some pentesters opt to become generalists with a broad understanding of multiple domains, others choose to specialize in one or a few areas to gain deeper expertise.

--

--

Estioo
Estioo

Written by Estioo

Estioo: A lifelong learner & avid reader who embraces AI to enhance writing. Dedicated to genuine research & open to corrections. Peace & Love within.

No responses yet