| Penetration testing has important actual application value for network security , as a kind of new technique keeping away network security. But it is to not easy to find out a appropriate company to implement with penetration testing. Because penetration testing does not realize standardize far, it is still placed a stage that few network security experts solve problem making use of their own experience and abilities independently now. penetration testing theories and techniques still variety and developt continuously .Penetration testing gets the more application gradually abroad as a kind of professional security service. Usually, security penetration testing has explicit scope, target and times restrict abroad, to check the true condition of the enterprise security generally, to make sure the result of the security measures, specially to be applicable to do valuation testing matching with the security audit department, to become a part of the large valuation, to be one of important weapons among network defense tool box. But the method and the tool among them adopt is very difference , they still need the further improvement, otherwise the applied depth and wide degree will be infinite restrict.As for China, on one hand, most enterprises are not aware of the function of penetration testing, on the other hand, only few security information companies can complete penetration testing service outstandingly really. Basically, penetration testing analysis are still placed in the start stage to compare with foreign advanced level , in despite of theories or practices.The research purpose of this paper put forword a suit of integrity scheme using network Penetration testing technique to carry through security evaluation ,aiming at the urgent demand of computer network information security.The base of network Penetration testing is Penetration testing technique,so this paper analyse all working principle of network Penetration testing technique in theory firstly,study relevant defence technique ,aiming at representative Penetration technique in pre-attack and attack stage.Then,this paper study Penetration testing strategy after analyse Penetration testing cases.It put forword a new mended Penetration testing method after analyse and compare old Penetration testing method.It put forword a new Penetration testing flow after analyse old Penetration testing flow.It put forword testing venture elusion measure... |