Penetration Testing

    Cards (6)

    • White Box Test
      Penetration testing approach where the tester has full knowledge and access to the internal workings of the system or network being tested.
    • Black Box Test
      Penetration testing approach where the tester has no prior knowledge or access to the internal workings of the system or network being tested.
    • Gray Box Test
      Penetration testing approach where the tester has limited knowledge or access to the internal workings of the system or network being tested.
    • Bug Bounty
      Reward program offered by organizations to individuals who identify and report security vulnerabilities in their systems or software.
    • Scope of Work

      Document outlining the objectives, deliverables, timelines, and responsibilities for a specific project or task
    • Rules of Engagement
      Guidelines and constraints that define the scope, methods, and limitations of security testing activities.