My Pentesting Space
LinkedIn
  • Welcome to Hackjiji
  • 🕸️web pentesting
    • Basics
    • Web pentest cheatsheet
    • Burpsuite and browser tricks
    • cUrl cheatsheet
    • CVE exploitation
    • JavaScript Obfuscation/Deobfuscation
  • Network pentesting
    • Basics
    • Nmap favorites
    • Host discovery
    • Port scanning
    • Network Services
      • RPC-NFC
      • WINRM - 5895-5896
      • FTP - 21
      • SMB - 445
      • RDP - 3389
      • SSH - 22
      • SMTP - 25
    • Firewall evasion
    • Pivoting and double pivoting
  • Physical pentesting
    • Bad USB - Rubber Duckies
  • Linux pentesting
    • Usefull command's
    • Privilege escalation
  • windows pentesting
    • Windows useful commands
    • Windows Reverse shell codes
    • Privilege escalation
  • Active Directory pentesting
    • Basics
    • AD
    • AAD
  • General
    • Hash cracking
    • Wordlist
    • Encoding/decoding
    • Environment setup
      • Install a new OS on seperated boot sector
      • Hyper-V
      • Virtualbox
    • Reverse-shell-cheatsheet
    • Metasploit cheatsheet
    • Vulnerability research
    • My scanning methodology
  • Events
    • HackTheBox Meetup - LFI2RCE
    • Radio Equans - QR Code Awareness campaign
    • Cybersecurity job campaign
Powered by GitBook
On this page
  • Internal Penetration Testing
  • External Penetration Testing
  1. Network pentesting

Basics

Internal Penetration Testing

Network Penetration testing can be classified into two types: internal and external. In internal pen testing, an attacker may have authorized access or start from a point within the internal network, making insider attacks more formidable since the attackers have valuable knowledge about the network and its components. As a Pentester, it is crucial to be proficient in enumerating target networks, users, services, conducting vulnerability assessments, exploiting vulnerabilities, and acquiring escalated privileges to the target.

External Penetration Testing

External Penetration Testing determines the potential security risks posed outside of the network perimeter. It examines an organization's systems and network for vulnerabilities such as missing patches, weak authentication, unnecessary services, and weak encryption that could be used by attackers to disrupt the confidentiality, availability, or integrity of the network. Vulnerability scanning plays a crucial role in any penetration testing engagement, allowing organizations to address every weakness before attackers exploit them.

Therefore, in-depth security testing often includes port scanning, network scanning, and vulnerability scanning to identify IP/hostname, live hosts, and vulnerabilities. A Pentester can then proceed to list the threats and vulnerabilities found in the organization's network and take specific preventive countermeasures to mitigate them.

PreviousJavaScript Obfuscation/DeobfuscationNextNmap favorites

Last updated 6 months ago