From the course: CompTIA Advanced Security Practitioner (CASP+) (CAS-004) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Pen test steps

Pen test steps

- In this lesson, we're going to talk about the five basic steps of a penetration test. These are, one, get permission and document information about the target network, two, gather information about the target through reconnaissance, three, enumerate the target to identify known vulnerabilities, four, exploit the network to gain user or privilege access, and five, document the results of the test and report them to the organization. The first step is fairly simple. It involves getting permission to conduct the penetration test. This is where the scope of work is going to be created, and the penetration testers and the client are going to agree on the parameters and the scope for the given penetration test. The second step of the penetration test is for the attacker to conduct reconnaissance. Now, reconnaissance is a systematic attempt to locate, gather, identify, and record information about the target network or systems. This can also be known as footprinting. During reconnaissance,…

Contents