Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Penetration or "Pen" testing as it's commonly referred to, was discussed in a previous module, but we include a review here since this type of testing is also an important part of developing secure software. The topics covered in this video are: - White box or clear box testing - source code is fully visible and the tester is typically a programmer with knowledge of the code. - Black box testing - zero knowledge test, simulates an attacker. - Fuzzing - fault injection testing, verifies input validation. - Scanning - map the environment to gather info. - Pen testing - active tests which attempt to exploit weaknesses found from scanning. Finally, in order for pen testing to be complete, the attacker's tracks must be covered in order to foil discovery of the attack. The process is then concluded with reporting.