From the course: Building an Application Security Program

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Pentesting

Pentesting

- [Narrator] Now let's talk about something many people are familiar with, pen testing. The term is thrown around a lot, but let's talk about what an actual definition is. The Department of Homeland Security defines pen testing as a method of testing where testers target individual binary components of the application to determine whether vulnerabilities can be exploited to compromise the application, its data or its environment resources. A common way to think about this is hacking into the system. Hacking and pen testing are sometimes used interchangeably. You start your pen testing scenario by using the threat model we created earlier. The threat model is going to help you understand which points of the application may be susceptible to the hacking, which ones may have vulnerabilities that you can exploit. After you look at the threat model to understand, you can use tools, either manual or automated to perform the testing…

Contents