Skip to main content

Organize your project - 09

 



These should be the systems, applications, and devices on which you should perform the test:

1. E-mail, print, and file server

2. Firewall

3. Database, Web, and Application Server

4. Client/Server Operating System

5. Tablets, laptops, and workstations

6. Switches and routers

Now, the number of tests you can perform will depend on how many devices and systems you need Perform your test. If your network is small, then you can test every peripheral device. However, the whole The hacking process can be flexible and should depend on what makes the most sense to you.

If you experience problems with peripherals or systems that should be tested first, consider the following factors:

1. The type of operating system or application running on your system

2. Classification and quantity of key information stored in your computer system

3. Systems and applications located in the network.


  • When should you start hacking?


Depending on when you choose to launch a test attack, every attack will succeed. When you Establish a timeline for your testing to ensure that you execute the test on time, which will lead to Minimal interference to other users. You don’t want to cause trouble when the test is rejected Service (DoS) attacks occur during critical business periods when the organization usually has sales You are working for. You don’t want to encounter a system problem and cannot solve it Just before you need to use your own computer.

When arranging the test, make sure that all relevant personnel is involved in your plan. This will help you set up It also provides you with a timetable for when the test should be completed.

Comments