Once the pen testers understand the contours of the network—and the vulnerabilities they can exploit—they hack the system. Pen testers may try a variety of attacks depending on the scope of the test. Some of the most commonly tested attacks include:
– SQL injections: Pen testers try to get a webpage or app to disclose sensitive data by entering malicious code into input fields.
– Cross-site scripting: Pen testers try planting malicious code in a company's website.
– Denial-of-service attacks: Pen testers try to take servers, apps and other network resources offline by flooding them with traffic.
– Social engineering: Pen testers use phishing, baiting, pretexting, or other tactics to trick employees into compromising network security.
During the attack, pen testers explore how malicious hackers can exploit existing vulnerabilities and how they can move through the network once inside. They find out what kinds of data and assets hackers can access. They also test whether existing security measures can detect or prevent their activities.
At the end of the attack, pen testers cover their tracks. This serves two purposes. First, it demonstrates how cybercriminals can hide in a network. Second, it keeps malicious hackers from secretly following the ethical hackers into the system.