can use any of the web application attacks running from backdoors, cross-
site scripting, and SQL-injection. Once an attack is launched, pen testers
use different strategies to try and exploit all vulnerable points. Testers can
either intercept traffic, steal available data, or escalate some of the
privileges in an attempt to see how the system will behave.
4)
Maintaining access
The next step involves investigating how long hackers might last in the
system after they gain access. Testers have to imitate advanced persistent
threats to try to determine how long attackers might last within their
systems. Advanced persistent threat attacks are often executed with the
intention of spending longer periods within the system with the aim of
gaining in-depth access to organizations' systems. Through imitating this
type of attack, testers get to see how long a potential threat could last within
their systems.
5)
Analysis
The final stage involves a thorough analysis of all the activities conducted
during penetration testing. Pen testers write a comprehensive report that
includes;
❖
All sensitive data that was accessed
❖
All vulnerabilities that were exploited
❖
Amount of time is taken within the target before detectio n