{"id":19886,"date":"2021-02-03T00:57:04","date_gmt":"2021-02-02T19:27:04","guid":{"rendered":"https:\/\/valeurbit.com\/blog\/?p=19886"},"modified":"2021-02-12T18:11:22","modified_gmt":"2021-02-12T12:41:22","slug":"pentest-who-needs-it-and-why","status":"publish","type":"post","link":"https:\/\/valeurbit.com\/blog\/pentest-who-needs-it-and-why\/","title":{"rendered":"Pentest: Who Needs It And Why?"},"content":{"rendered":"\n<p>In their search for vulnerabilities, hackers are constantly changing their tools and tactics.&nbsp;To understand whether your digital security measures are working or not, you need to test them for strength.&nbsp;Simply put &#8211; try to hack, almost for real.&nbsp;Only in the case of infrastructure penetration testing, or pentest &#8211; penetration test, hacking is completely under your control, and a successful attempt does not threaten anything.<\/p>\n\n\n\n<p>The main goal of a penetration test is to find vulnerabilities in the client&#8217;s infrastructure and applications that could potentially be exploited by attackers.&nbsp;In addition, penetration testing helps to understand how effective the developed IT security policies are and whether they should be improved.&nbsp;Sometimes penetration tests are carried out to check the readiness of information security specialists to repel attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"article-0\">Who needs a pentest<\/h2>\n\n\n\n<p>For banks and financial institutions, penetration testing is a mandatory procedure.&nbsp;For example, according to the&nbsp;Regulation of the Bank of Russia dated April 17, 2019 N 683-P (clause 3.2)&nbsp;, banks must organize a penetration test to check their Internet resources for vulnerabilities.&nbsp;There are many similar regulatory requirements, and sanctions are provided for failure to comply with them.&nbsp;If the company does not conduct testing, the regulator may fine it.&nbsp;<\/p>\n\n\n\n<p>But it&#8217;s not just about fines.&nbsp;Many commercial and government organizations conduct these checks on a regular basis to ensure that their systems are well protected.&nbsp;Penetration testing is an investment in security, as holes that are not closed in time can lead to multi-million dollar losses in the event of a successful attack.<\/p>\n\n\n\n<p>Also, information about leaks often&nbsp;gets into the press&nbsp;and undermines the trust of customers and partners.&nbsp;But leaks not only spoil the image, they are also subject to fines.&nbsp;The&nbsp;<a href=\"https:\/\/docs.microsoft.com\/ru-ru\/microsoft-365\/compliance\/gdpr?view=o365-worldwide\">GDPR<\/a>&nbsp;(General Data Protection Regulation)&nbsp;applies to these citizens of European countries&nbsp;, companies are fined for such leaks.&nbsp;In this case, the amount of the fine is calculated based on the income of the parent company.&nbsp;In Russia, they are still more loyal to this, but, most likely, fines will also grow, and it is better not to bring the matter to them.&nbsp;<\/p>\n\n\n\n<p>You can read more about the regulation of personal data, including GDPR, in&nbsp;our separate material&nbsp;.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"article-1\">Who is testing<\/h2>\n\n\n\n<p>Penetration testing is a technically complex procedure.&nbsp;One careless action can lead to irreversible consequences &#8211; the fall of the resource or the deletion of critical information.&nbsp;That is why the penetration test should be carried out by experienced specialists who know how to &#8220;hack&#8221; the system and not damage anything.&nbsp;Sometimes they are also called &#8220;white hackers&#8221;.&nbsp;<\/p>\n\n\n\n<p>The parties agree on the shore what needs to be checked.&nbsp;For example, a company needs to find out if it is possible to elevate a user&#8217;s privileges on a system with stolen credentials.&nbsp;After testing is completed, the customer receives a detailed report with recommendations for eliminating and preventing vulnerabilities &#8211; for example, the company can establish a more stringent password policy.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"article-2\">Testing varieties<\/h2>\n\n\n\n<p>The two main types of penetration testing are internal and external.&nbsp;In the case of internal testing, the performer operates inside the client&#8217;s infrastructure with his laptop and, for example, tries to elevate the user&#8217;s privileges.&nbsp;<\/p>\n\n\n\n<p>In the case of external testing, the attack is carried out from the outside.&nbsp;At the same time, experts distinguish between three main methods &#8211; &#8220;black box&#8221;, &#8220;gray box&#8221; and &#8220;white box&#8221;.<\/p>\n\n\n\n<ul><li>Black box method &#8211; the performer does not know anything about the system and tries to hack, relying on his tools and open information.&nbsp;In this way, the actions of common attackers are imitated.&nbsp;In this case, the company checks to what extent its systems are ready to repel typical attacks.<\/li><li>The &#8220;gray box&#8221; method &#8211; the contractor knows the data about the infrastructure.&nbsp;This is an imitation of targeted attacks and attacks involving insiders &#8211; people working for a company and transmitting information to cybercriminals.&nbsp;In this way, you can, for example, understand whether the system for preventing data leakage due to the fault of employees is working.<\/li><li>White box method &#8211; the tester owns all the information and even the source code.&nbsp;This method is used to check whether the system is resistant to hacking by employees of the administrator or developer level.<\/li><\/ul>\n\n\n\n<p>There are also international standards for such testing &#8211; for example, the&nbsp;<a href=\"https:\/\/owasp.org\/www-pdf-archive\/OTGv4.pdf\">OWASP Testing Guide<\/a>&nbsp;.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"article-3\">What does the customer get&nbsp;<\/h2>\n\n\n\n<p>Since testing is done by experienced professionals, they understand what needs to be tweaked to close the loophole for attackers.&nbsp;In the final report, the customer sees a list of vulnerabilities and all the steps that led to the discovery and exploitation of this vulnerability.&nbsp;Sometimes, if it is agreed by the parties, the customer can receive more specific recommendations, up to certain protective solutions or equipment models with the necessary settings.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"article-4\">Outsourced penetration test<\/h2>\n\n\n\n<p>Penetration testing is usually outsourced because the best test is independent.&nbsp;In addition, there are not so many specialists in penetration testing on the market; this is a very scarce specialization due to the extremely high level of required qualifications.&nbsp;Large companies try to trust such sensitive procedures to organizations with a name to be sure of the safety of the results obtained.&nbsp;<\/p>\n\n\n\n<p>Valeurbit is trusted by many market leaders.&nbsp;Based on the results of the analysis, conducted in accordance with international standards, eight vulnerabilities were identified, including unsafe storage and transmission of user data.&nbsp;The bank received step-by-step recommendations, eliminated vulnerabilities and strengthened protection.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In their search for vulnerabilities, hackers are constantly changing their tools and tactics.&nbsp;To understand whether your digital security measures are working or not, you need to test them for strength.&nbsp;Simply put &#8211; try to hack, almost for real.&nbsp;Only in the case of infrastructure penetration testing, or pentest &#8211; penetration test, hacking is completely under your&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Pentest: Who Needs It And Why? | ValeurBit Infosec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/valeurbit.com\/blog\/pentest-who-needs-it-and-why\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pentest: Who Needs It And Why? | ValeurBit Infosec\" \/>\n<meta property=\"og:description\" content=\"In their search for vulnerabilities, hackers are constantly changing their tools and tactics.&nbsp;To understand whether your digital security measures are working or not, you need to test them for strength.&nbsp;Simply put &#8211; try to hack, almost for real.&nbsp;Only in the case of infrastructure penetration testing, or pentest &#8211; penetration test, hacking is completely under your...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/valeurbit.com\/blog\/pentest-who-needs-it-and-why\/\" \/>\n<meta property=\"og:site_name\" content=\"ValeurBit Infosec\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/valeurbitinfo\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-02T19:27:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-12T12:41:22+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@valeurbit\" \/>\n<meta name=\"twitter:site\" content=\"@valeurbit\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\",\"name\":\"Valeurbit Infosec\",\"url\":\"https:\/\/valeurbit.com\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/valeurbitinfo\/\",\"https:\/\/www.instagram.com\/valeurbit\",\"https:\/\/www.linkedin.com\/company\/valeurbit-infosec\/\",\"https:\/\/twitter.com\/valeurbit\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/valeurbit.com\/blog\/wp-content\/uploads\/2021\/02\/Valeurbit-new-logo-center.png\",\"contentUrl\":\"https:\/\/valeurbit.com\/blog\/wp-content\/uploads\/2021\/02\/Valeurbit-new-logo-center.png\",\"width\":1080,\"height\":512,\"caption\":\"Valeurbit Infosec\"},\"image\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#website\",\"url\":\"https:\/\/valeurbit.com\/blog\/\",\"name\":\"ValeurBit Infosec\",\"description\":\"Cyber Security Company\",\"publisher\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/valeurbit.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/valeurbit.com\/blog\/pentest-who-needs-it-and-why\/#webpage\",\"url\":\"https:\/\/valeurbit.com\/blog\/pentest-who-needs-it-and-why\/\",\"name\":\"Pentest: Who Needs It And Why? | ValeurBit Infosec\",\"isPartOf\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#website\"},\"datePublished\":\"2021-02-02T19:27:04+00:00\",\"dateModified\":\"2021-02-12T12:41:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/pentest-who-needs-it-and-why\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/valeurbit.com\/blog\/pentest-who-needs-it-and-why\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/valeurbit.com\/blog\/pentest-who-needs-it-and-why\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/valeurbit.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pentest: Who Needs It And Why?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/valeurbit.com\/blog\/pentest-who-needs-it-and-why\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/pentest-who-needs-it-and-why\/#webpage\"},\"author\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#\/schema\/person\/df20c1cd317765fa8677a3056caeccfa\"},\"headline\":\"Pentest: Who Needs It And Why?\",\"datePublished\":\"2021-02-02T19:27:04+00:00\",\"dateModified\":\"2021-02-12T12:41:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/pentest-who-needs-it-and-why\/#webpage\"},\"wordCount\":963,\"publisher\":{\"@id\":\"https:\/\/valeurbit.com\/blog\/#organization\"},\"articleSection\":[\"Valeurbit\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/valeurbit.com\/blog\/#\/schema\/person\/df20c1cd317765fa8677a3056caeccfa\",\"name\":\"ValeurBit\",\"sameAs\":[\"https:\/\/valeurbit.com\/blog\"],\"url\":\"https:\/\/valeurbit.com\/blog\/author\/valeurbit\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/19886"}],"collection":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/comments?post=19886"}],"version-history":[{"count":0,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/posts\/19886\/revisions"}],"wp:attachment":[{"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/media?parent=19886"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/categories?post=19886"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/valeurbit.com\/blog\/wp-json\/wp\/v2\/tags?post=19886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}