Module 4 Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

13 hours 9 minutes
Video Transcription
Hello and congratulations for completing the vulnerability analysis section of the penetration testing execution standard.
So in summary,
what did we learn?
Well, we looked at vulnerability testing. We discussed what it was. Some example, flawed types and overall goals of testing. Remember, we hope to reduce risk and help in organization become aware of assets and things of that nature within the organization, both known and unknown through the testing process,
we looked at active testing and discussed what that waas.
We looked at automated methods for doing so. General vulnerability scanners, banner grabbing weather application scanners and obfuscation techniques. We looked at passive testing and how that is not actively querying systems through things like metadata analysis and traffic monitoring.
We then got into validation of vulnerabilities and looked at some areas that we can do that such a correlation between tools,
manual testing methods, protocol specific methods and some different avenues that we can then use to start to map out attacks and things of that nature to look for attack vectors. We then rounded it out with ways that we could do research on potential exploits
and to additionally validate vulnerabilities to maybe setting up private labs and things of that nature. So we took touched on what that was. Exploit databases and framework modules will look hardening guides as faras. Using those is a means for validating exploit ability on a system and administrator. Due diligence.
We looked at private research
identifying potential avenues and vectors and disassembly and analysis of application code. So congratulations again. Thank you for your time today. And I look forward to seeing you again soon.
Up Next
Penetration Testing Execution Standard (PTES)

In this course we will lay out the Penetration Testing Execution Standard (PTES) in all its phases and their application for business leaders and Security Professionals alike.

Instructed By