Penetration Testing Categories

When the scope of the penetration test is defined, the categories & types of penetration test engagement are also defined along with it. The entire penetration test can be Black, Box white Box, or Gray Box Depending upon what the organization wants to test and how it wants the security paradigm to be tested.

Categories of Penetration Test
Categories of Penetration Test

Black Box Penetration Testing

In a¬†black box¬†penetration test, no information is provided about the target. In the case of a network penetration test this mean that the target’s DMZ ( demilitarized zone ), the target operating system, and server version will not be provide by the client/origination . the only thing that will be provide is the target System IP ranges that you would test.

In the case of a Web Application Black Box Penetration testing, The source doe of the Website will not be provided. black-box penetration tester must be familiar with automated scanning tools and methodologies for manual penetration testing.

White Box Penetration Testing

In the Black Box penetration testing, almost all the information provided about the target. In the case of a White Box network penetration Test, which information provided by the Client Like, IP address, Operating System Name, Operating system version, and architecture documentation.

In the case of the White Box Web Application Penetration testing the much information provided by the Client, the Web Application source code is provided, Unlike black-box and gray-box testing, white-box penetration testers are able to perform static/dynamic code analysis.

Gray Box Penetration Testing

In a , some information is provided and some hidden. In case of a network Penetration test, the organization provides the name of the application running behind the and IP address. It doesn’t disclose the exact version of the services running of the target machine.

In the case of the Gray Box Web Application Penetration Test, some information provides by the Client/ Organization. such as test accounts, back end server, and databases is provided to Penetration Tester.

Ethical Hacking Vs Penetration Testing

About Rahul Gehlaut

Cyber Security Researcher, CTF Player. Tech Blog Writer.

View all posts by Rahul Gehlaut →