After collecting all the information you can about your target network, it’s time to use this information for something dicey.
Step 3: Vulnerability Analysis
With all the information about the system vulnerabilities… I know you are excited to fire Metasploit and take the damn network down! But wait a minute… Not all vulnerabilities are worth trying to exploit.
Exploitation means carrying out the vulnerabilities’ actual exploit in a bid to ascertain whether the vulnerability is actually exploitable. This is very important because it’ll help in step 5 of this penetration testing checklist when proving your client with the vulnerabilities that they need to fix immediately.
A good network pentest report should give an overview of the entire penetration testing process. This should be followed by the most critical network vulnerabilities that need to be addressed with utmost urgency possible.
R31/ 32, 2nd floor, Jandu Tower, Vikas marg, Shakarpur, New Delhi 110090
+ (91) - 951 380 5401