Penetration Testing

Cards (6)

  • White Box Test
    Penetration testing approach where the tester has full knowledge and access to the internal workings of the system or network being tested.
  • Black Box Test
    Penetration testing approach where the tester has no prior knowledge or access to the internal workings of the system or network being tested.
  • Gray Box Test
    Penetration testing approach where the tester has limited knowledge or access to the internal workings of the system or network being tested.
  • Bug Bounty
    Reward program offered by organizations to individuals who identify and report security vulnerabilities in their systems or software.
  • Scope of Work

    Document outlining the objectives, deliverables, timelines, and responsibilities for a specific project or task
  • Rules of Engagement
    Guidelines and constraints that define the scope, methods, and limitations of security testing activities.