Mobile application security audit, penetraton testing

White Box vs. Black Box Penetration Testing

When it comes to hacking, there are many technical aspects that can be difficult to grasp without an extensive background in the field. One of the most common sources of confusion is the comparison between black box penetration testing and white box penetration testing.

White Box Penetration Testing

White box penetration testing can also be called glass box penetration testing or clear box penetration testing. In any case, it's an approach to penetration testing that relies on the knowledge of the target system's internal configuration. It uses this information for the test cases.

For applications, the source code of the application will usually be provided for white box penetration testing. Design information and even interviews with the developers may also be included. For infrastructure penetration tests using the white box method, the test cases will use infrastructure details and network maps.

Regardless of the test case, the goal of a white box penetration test is to get as much info as can be had. The penetration tester is trying to collect as much feedback as they can so that they can gain further insight and, ultimately, understand the system so that they can further elaborate their penetration tests.

Black Box Penetration Testing

A black box penetration test does not require any up-front information to be given to the penetration tester. Instead, the penetration tester will approach the test case like a real hacker would. This means they have little to no background information about the system and they don't have internal maps or other information either.

This allows testing to get started with very little prep work, and it allows the penetration tester to identify weak spots based on what a real-world hacker is most likely to target. However, that can leave some spots of the infrastructure untested.

Making a Decision

Each method has its own set of advantages and drawbacks.

For white box tests, the advantages include:

  • White box penetration tests are deep and thorough
  • These tests maximize the use of time spent testing
  • The testing area tests even areas that black box testing can't reach, like the quality of the code

For black box tests, the advantages include:

  • A black box test is a more realistic attack because it takes the stance of a non-informed potential attacker.
  • It simulates a very realistic scenario, helping a business be on their highest guard.

The biggest disadvantage to a black box penetration test, of course, is that some scenarios can't maximize testing time. Some areas of the infrastructure may also remain unreached and, therefore, untested in a black box scenario. But, the testing of a black box penetration will focus on the areas hackers are most realistically likely to target.

Keeping all of this in mind, there is no right or wrong decision when it comes to choosing a type of penetration testing. It really depends on the scenarios you are looking to test and what you feel will make the most of your resources.

About the Author

Pavel Enderle

Sales Executive at TeskaLabs




You Might Be Interested in Reading These Articles

Why Developers Are Boosting Up Their Mobile Application Security?

Mobile application security is a significant issue for developers. Most try their best to make mobile apps secure and safe for their users. Here are some of the other reasons why developers are boosting up their mobile application security.

Continue reading ...

security development

Published on April 14, 2015

Android: The One That Gets The All the Attention - Developers, Hackers and YOU

Android is considered one of the best operating systems used in smart phones. This operating system is backed by Google, the number one search engine. The Google Play has become an obsession now, enjoying the biggest number of smart phone apps. Many of them are absolutely free. But what if we tell you that Android is the easiest operating system to hack and even customized apps such as Gmail can be hacked. Recently it was checked and confirmed that Gmail is one of the top endangered apps, which can be hacked very easily.

Continue reading ...

android security

Published on January 20, 2015

SeaCat and OpenSSL Heartbleed Bug

After almost two and a half year we hope that the Heartbleed remains in the past. It is not true, unfortunately. Now we have proof that a security vulnerability remains with us for a long time, maybe almost forever even when there exist patches and fixes. The Internet is a battlefield among the good, the bad, and the ugly. Who has better attacking or defending technology wins.

Continue reading ...

security

Published on December 20, 2016