1.0 Introduction (200 Words) 3Refernces
-What are penetration metodolgies (Basic disucciosn)
- why are they used
2.0 Methodologies behind Penetration Testing
-Describe the following methodologies:
-ISSAF - Information Systems Security Assessment Framework (100 Words)
-OSSTMM - Open Source Security Testing Methodology Manual (100 Words)
-OWASP – Open Web Application Security Project(100 Words)
-Penetration Testing Execution Standard (PTES) (100 Words)
3.0 Penetration Test – Standard Operating Procedure ( 250-300 Words)
- Discussion to perfrom a penetrion test on a Linux Server using IP only
Describe below steps in small detail what is doen in each
-gathering information about the target before the test
-identifying possible entry points(Port scanning),
-attempting to break in (either virtually or for real)
-reporting back the findings.
4.0 Decision Tree (150-200 words)
- What is decission Tree
- Basic description how can it be structured
5.0 Conclusion(150- 200 Words)
-What was disccued in the report
- After analysing it is the best to do PTES bescause it meets standard requirments for the SOP.
19 freelancers are bidding on average €457 for this job
I have read the guidelines of your work, i believe i can provide you with the best quality of work you are anticipating from this [login to view URL] give me a chance to show you the best i can do at your service.
Hi, I have carefully read the project description and am interested in working on it. Please, consider sending a message so that we can discuss the project details more exclusively. Thank you.
I have read your project and I am an expert in this field. I can do this for you within due time and honestly. I also have a few questions to discuss. Kindly contact me and we will discuss time and budget. Thanks