ETHICAL HACKING
UNIT-1
Introduction to Hacking
Hacking
Types of hacking
�
4
6/26/2025
Categories of hackers
Important Terminologies
Phases of hacking
Diagram of phases of hacking
Introduction to Ports & Protocols: Ports, Protocols, Primary Network Types
protocols
1. Network communication: Protocols enable devices to communicate over networks.
Primary networks types
Virtualization & Introduction to Kali Linux
Introduction to Penetration Testing
Categories of Penetration Test
Types of Penetration Tests
Types of Penetration Tests
Structure of Penetration Test Report.
As the name suggests, an executive summary is the portion that is specifically addressed to execu- tives such as the CEO or the CIO of the company. The executive summary is the most essen- tial part of a penetration testing report; a good executive summary can make all the difference between a good report and a bad one.
.Followingaresomeoftheessentialpointsthatyoushouldtakeintoconsiderationwhilewritinganexecutive summary.
Remediation Report
� Risk Assessment and Risk Assessment Matrix
Risk assessment as defined before is the analysis part of the report. It is very crucial for thecustomer because they would want to know the intensity of the damage the vulnerabilities arelikely to cause; similarly, the security executives would also want to know how their team isPerforming.
HAZARD RISK ASSESSEMENT MATRIX
Methodology�
We have discussed a wide variety of methodologies and standards of penetration testing, such as
OSSTMM, NIST, and OWASP. I would also like to include the methodology that was followed
Introduction to Hacking for conducting the penetration test; though its inclusion in the report is optional, it could add great value to your penetration report. In a scenario where you have been asked to follow a certainstandard, talking about the methodology and its steps is a good idea.
The following is a screenshot from one of our penetration testing reports where the NIST
methodology was followed in order to conduct the penetration test. Notice that we include the flowchart on how the methodology works and explain each step precisely.
Reports & Conclusion�
REPORTS
◾http://www.niiconsulting.com/services/security-assessment/NII_Sample_PT_Report.pdf
◾ http://pentestreports.com/
CONCLUSION