Exploit types

  • Phishing, SQL, Brute Force DDOS

Teaming

  • Red teams, blue teams, purple teams

k 

 

Pen testing tools

open source, enterprise, or an arsenal

Vulnerability scanning

 

Pen testing services

 

Pen Test Pivoting

Advanced red teamers can maximize their engagements with this testing bundle that features Core Impact, an automated pen testing solution, Cobalt Strike, a post-exploitation adversary simulation tool, and OST, an expertly curated offensive security toolset highlighting evasive capabilities.  

Over the years, penetration testing has become an integral component of proactive approaches to security, evaluating and prioritizing risk before breaches occur. Through the exploitation of identified security vulnerabilities, penetration testing can effectively measure the feasibility of systems or end-user compromise and evaluate any related consequences such incidents may have on the involved resources or operations.  

So why are we talking about hacking of an IBM i? I think that's certainly not a headline we see very often, as IBM i systems have been considered un-hackable for years. Anyone who has worked on IBM i has heard some of these statements:  

Popular entertainment would have us believe that hackers are all sophisticated attackers ready to strike the latest vulnerabilities. That is sometimes true, but it’s become increasingly apparent that whether it’s the latest zero-day bug or something that was discovered the same year Apple released the iPad, hackers are equal-opportunity offenders.    

With penetration testing becoming an increasingly universal part of security strategies and compliance requirements, knowledge sharing and analysis grows more critical when defining best practices. As part of our ongoing commitment to improving cyber resilience through proactive security assessments, Fortra's Core Security conducts an annual survey of cybersecurity professionals on the usage and perception of pen testing.