The following are the goals for a successful penetration test:
- Readingrestrictedfiles
- Access to resources
- Altering restricted files
- Reading transaction data
- Executing a programor transaction
- Access to any user account
- Access to supervisor privileges
- Controlling network management systems
- Demonstrating ability to control resources
Penetration Phases:
- Reconnaissance
- Port Scanning
- Service Identification
- Vulnerability Scanning
- War Dialing (If Relevant)
- Vulnerability Scans
- Active exploit and intrusion attempts
- Blind Attack
- Retest remediated vulnerabilities