A penetration test, also known as a pentest, is a form of network security probe to determine if there are any vulnerabilities, or areas that could possibly be penetrated by an unauthorized user. Basically, a penetration test is an authorized attack on a company’s network and computer system in order to determine the level of network security, and to expose any vulnerabilities that could put company information or assets at risk.
Differences between vulnerability scanning and penetration testing
Both vulnerability scanning and penetration testing are important for the security of a company or enterprise. Both forms of testing typically attempt to find the same results: vulnerabilities within the system. The methods are only different in the way they are carried out.
A vulnerability scan is typically a scan of the network system in order to find more commonly-used vulnerabilities. A vulnerability scanning tool uses a list of preset vulnerabilities that have been exposed in other computer systems, and scans for these vulnerabilities in order to determine if any of these specific vulnerabilities exist.
A penetration test can be carried out two different ways. A penetration test can be performed using penetration software and tools, or it can be carried out by a professional penetration specialist, typically a well-known professional hacking expert. Of these two methods, the professional penetration specialist is the most effective, as this test is performed by a real hacker—so the same techniques are applied that would be used in an actual attack on the company network by a skilled hacker.
Value of penetration testing
The value of penetration testing consists of several main benefits described below:
Penetration testing methods
Penetration testing is largely successful because it covers all locations within the company network. Even small, insignificant locations must be covered, because these are typically the locations where an attacker will gain access. Once the attacker has gained access to a small part of the network, even if it has limited access, he can use the limited access to gain access to more critical areas—sometimes by calling tech support pretending to be an employee having access issues.
Penetration tests also cover third-party applications, and assess the risk involved with their use. The tests are performed from outside the network, as well as within the network, due to the fact that an attacker could potentially gain access to less critical areas of the network, then use those locations to perform additional attacks in order to gain access to sensitive company information and assets.
Once the tests have been performed and the results analyzed, all problem areas must be patched or solved, and then the tests must be ran again. Once the network is secure, the tests can be stopped, but should be performed frequently in order to keep up with new threats.
Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.
Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.