Penetration Testing
Penetration testing → security assessment where testers actively attempt to exploit vulnerabilities to determine real-world impact, going beyond vulnerability scanning by proving whether weaknesses can actually be abused.
Rules of Engagement
Rules of engagement → formal agreement that defines the scope, timing, methods, permissions, and limitations of a penetration test to ensure testing is legal, controlled, and aligned with business goals.
Exploiting Vulnerabilities
Exploiting vulnerabilities → phase of penetration testing where multiple attack techniques such as password brute force, social engineering, database injection, or buffer overflows are attempted to gain unauthorized access.
The Process
The process → penetration testing workflow that involves initial access, lateral movement between systems, establishing persistence through backdoors, and accessing normally restricted systems to fully evaluate security weaknesses.
Responsible Disclosure Program
Responsible disclosure program → structured process that allows researchers to report vulnerabilities safely so organizations can fix issues before details are publicly released.
False Positives
False positives → vulnerability scan results that incorrectly report a weakness that does not actually exist, often requiring manual validation to dismiss.
False Negatives
False negatives → vulnerabilities that exist but are missed by scans or tests, creating a dangerous false sense of security.
High-Severity Vulnerabilities
High-severity vulnerabilities → weaknesses that are easy to exploit and cause major impact such as system compromise, data breaches, or service disruption.
Medium-Severity Vulnerabilities
Medium-severity vulnerabilities → weaknesses that require specific conditions or user interaction to exploit and cause moderate impact if abused.
Low-Severity Vulnerabilities
Low-severity vulnerabilities → weaknesses with limited impact or difficult exploitation that still contribute to overall risk when combined with other issues.
CVSS
Common vulnerability scoring system (CVSS) → standardized scoring model used to rate vulnerability severity based on exploitability, impact, and environmental factors.
CVE
Common vulnerabilities and exposures (CVE) → publicly maintained catalog that assigns unique identifiers to known vulnerabilities for consistent tracking and reference.
Exposure Factor
Exposure factor → measure of potential damage from a single security event, representing the percentage of asset value that could be lost during an incident.
Risk Tolerance
Risk tolerance → level of risk an organization is willing to accept based on business priorities, cost, and operational impact, influencing how vulnerabilities are addressed.