11 month ago
0 Alternatives
1 Views
CONTEXT
This prompt is designed for ethical hackers to simulate cyber attacks in a controlled environment to identify vulnerabilities.
OBJECTIVE
The goal is to conduct penetration testing and vulnerability assessments to discover potential exploits and strengthen the security posture of the system.
FORMAT
Please provide detailed steps including the tools and methodologies that will be used in the penetration testing process, findings from the assessment, and recommendations for remediation. Include an outline of the evaluation criteria for each test case.
EXAMPLES
1. Conduct a web application penetration test using OWASP ZAP. 2. Use Nmap for network scanning and vulnerability discovery. 3. Perform SQL injection testing on a sample database. 4. Document findings in a report for review by the development team.
Our platform is committed to maintaining a safe and respectful community.
Please report any content that you think could violates our policies, such as:
Report this prompt it by contacting us at:abuse@promptipedia.ai
All reports are reviewed confidentially. Thank you for helping us keep promptipedia safe.