Recognition: This is the first phase in any intrusion test since it will proceed to the recognition of the assets that are in scope. It is the phase where the attacker seeks to collect all the possible information that helps him to carry out the intrusion.
Scanning: This phase is the most important when evaluating the intrusion test, since it will actively check if what has been found in the previous phase has vulnerabilities it security companies in singapore.
associated with the services found, so it will help us to define how easy or difficult the potential intrusion is.
Exploitation: This phase is the one in which more focus should be placed on an intrusion test since it will allow us to know if penetration into the assets is possible and therefore exploit their vulnerabilities or not.
Access maintenance: This phase is fully dependent on the previous one; If an intrusion has been achieved by exploiting any type of vulnerability, the last two sub-phases begin, consisting of lateral movement being able to try to exploit other assets within the same previously exploited networkand maintaining access to the system leaving a back door to gain access in the future to carry out other attacks.
Trace erasure: Finally, this last phase also depends on the effectiveness of the attack; The aim is to erase any trace that may have remained of the intrusion with the aim that information cannot be obtained from unauthorized access in the event of a possible subsequent investigation of the incident.